Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JULY SOA.exe

Overview

General Information

Sample Name:JULY SOA.exe
Analysis ID:680518
MD5:c059fd1e2ec2df2b8e4af62359868b1b
SHA1:5cfadf7c20971459dadeae535e61bcc6b6175df0
SHA256:6c9947dd57c1a90267929341ffb0a7ff7f225156748160852a78dd83d6943578
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality to register a low level keyboard hook
Machine Learning detection for sample
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Contains functionality to detect virtual machines (SLDT)
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • JULY SOA.exe (PID: 5808 cmdline: "C:\Users\user\Desktop\JULY SOA.exe" MD5: C059FD1E2EC2DF2B8E4AF62359868B1B)
    • schtasks.exe (PID: 2232 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp3EB6.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • JULY SOA.exe (PID: 5668 cmdline: {path} MD5: C059FD1E2EC2DF2B8E4AF62359868B1B)
    • JULY SOA.exe (PID: 4588 cmdline: {path} MD5: C059FD1E2EC2DF2B8E4AF62359868B1B)
    • JULY SOA.exe (PID: 4972 cmdline: {path} MD5: C059FD1E2EC2DF2B8E4AF62359868B1B)
  • DnDcR.exe (PID: 2080 cmdline: "C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe" MD5: C059FD1E2EC2DF2B8E4AF62359868B1B)
    • schtasks.exe (PID: 5508 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp158E.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • DnDcR.exe (PID: 5900 cmdline: {path} MD5: C059FD1E2EC2DF2B8E4AF62359868B1B)
    • DnDcR.exe (PID: 3896 cmdline: {path} MD5: C059FD1E2EC2DF2B8E4AF62359868B1B)
  • DnDcR.exe (PID: 3168 cmdline: "C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe" MD5: C059FD1E2EC2DF2B8E4AF62359868B1B)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "francisco@palumalimited.com", "Password": "+D&GRBh14#(M", "Host": "mail.palumalimited.com"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x1e5640:$a13: get_DnsResolver
      • 0x2f2e80:$a13: get_DnsResolver
      • 0x1e3e4f:$a20: get_LastAccessed
      • 0x2f168f:$a20: get_LastAccessed
      • 0x1e5fbe:$a27: set_InternalServerPort
      • 0x2f37fe:$a27: set_InternalServerPort
      • 0x1e62da:$a30: set_GuidMasterKey
      • 0x2f3b1a:$a30: set_GuidMasterKey
      • 0x1e3f56:$a33: get_Clipboard
      • 0x2f1796:$a33: get_Clipboard
      • 0x1e3f64:$a34: get_Keyboard
      • 0x2f17a4:$a34: get_Keyboard
      • 0x1e525b:$a35: get_ShiftKeyDown
      • 0x2f2a9b:$a35: get_ShiftKeyDown
      • 0x1e526c:$a36: get_AltKeyDown
      • 0x2f2aac:$a36: get_AltKeyDown
      • 0x1e3f71:$a37: get_Password
      • 0x2f17b1:$a37: get_Password
      • 0x1e4a0b:$a38: get_PasswordHash
      • 0x2f224b:$a38: get_PasswordHash
      • 0x1e5a40:$a39: get_DefaultCredentials
      00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 22 entries
          SourceRuleDescriptionAuthorStrings
          16.0.JULY SOA.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            16.0.JULY SOA.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              16.0.JULY SOA.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x32c57:$s10: logins
              • 0x326be:$s11: credential
              • 0x2eca6:$g1: get_Clipboard
              • 0x2ecb4:$g2: get_Keyboard
              • 0x2ecc1:$g3: get_Password
              • 0x2ff9b:$g4: get_CtrlKeyDown
              • 0x2ffab:$g5: get_ShiftKeyDown
              • 0x2ffbc:$g6: get_AltKeyDown
              16.0.JULY SOA.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x30390:$a13: get_DnsResolver
              • 0x2eb9f:$a20: get_LastAccessed
              • 0x30d0e:$a27: set_InternalServerPort
              • 0x3102a:$a30: set_GuidMasterKey
              • 0x2eca6:$a33: get_Clipboard
              • 0x2ecb4:$a34: get_Keyboard
              • 0x2ffab:$a35: get_ShiftKeyDown
              • 0x2ffbc:$a36: get_AltKeyDown
              • 0x2ecc1:$a37: get_Password
              • 0x2f75b:$a38: get_PasswordHash
              • 0x30790:$a39: get_DefaultCredentials
              19.2.DnDcR.exe.43cbec8.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 28 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: JULY SOA.exeVirustotal: Detection: 59%Perma Link
                Source: JULY SOA.exeReversingLabs: Detection: 39%
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeReversingLabs: Detection: 39%
                Source: C:\Users\user\AppData\Roaming\qOHVWexsnI.exeReversingLabs: Detection: 39%
                Source: JULY SOA.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\qOHVWexsnI.exeJoe Sandbox ML: detected
                Source: 16.0.JULY SOA.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 0.2.JULY SOA.exe.3bae2b0.3.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "francisco@palumalimited.com", "Password": "+D&GRBh14#(M", "Host": "mail.palumalimited.com"}
                Source: JULY SOA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: JULY SOA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3be2ad0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3bae2b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3ac8c30.1.raw.unpack, type: UNPACKEDPE
                Source: Joe Sandbox ViewIP Address: 174.136.29.110 174.136.29.110
                Source: global trafficTCP traffic: 192.168.2.3:49766 -> 174.136.29.110:587
                Source: global trafficTCP traffic: 192.168.2.3:49766 -> 174.136.29.110:587
                Source: JULY SOA.exe, 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551552984.0000000003412000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://5yHd6xzSnU.com
                Source: DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DVKGwn.com
                Source: DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
                Source: JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                Source: JULY SOA.exe, 00000010.00000002.532335988.0000000000E8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chamber
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390634314.0000000006156000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
                Source: JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                Source: JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390634314.0000000006156000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
                Source: JULY SOA.exe, 00000010.00000003.390993402.0000000006BD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
                Source: JULY SOA.exe, 00000010.00000002.565897741.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
                Source: JULY SOA.exe, 00000010.00000002.565897741.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
                Source: JULY SOA.exe, 00000010.00000002.563253922.000000000616E000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
                Source: JULY SOA.exe, 00000010.00000003.391149006.0000000006C40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.563149008.0000000006133000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635CB0
                Source: 77EC63BDA74BD0D0E0426DC8F80085060.16.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: JULY SOA.exe, 00000010.00000003.386301095.0000000000EB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3a51ff57fd138
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/CRL2/CA.crl0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
                Source: JULY SOA.exe, 00000000.00000003.259152234.00000000010DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.563149008.0000000006133000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
                Source: JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.palumalimited.com
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
                Source: JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://palumalimited.com
                Source: JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
                Source: JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                Source: JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
                Source: JULY SOA.exe, 00000000.00000002.313583973.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390993402.0000000006BD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
                Source: JULY SOA.exe, 00000000.00000003.272219489.0000000005A83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.
                Source: JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
                Source: JULY SOA.exe, 00000010.00000002.563109744.0000000006121000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: JULY SOA.exe, 00000000.00000003.264734009.0000000005A7D000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.264473152.0000000005A7D000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.264579666.0000000005A7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comyle
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/pc-root2.pdf0
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/root2.crl0
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
                Source: JULY SOA.exe, 00000010.00000003.390993402.0000000006BD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
                Source: JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390634314.0000000006156000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
                Source: JULY SOA.exe, 00000010.00000002.532335988.0000000000E8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
                Source: JULY SOA.exe, 00000010.00000002.532335988.0000000000E8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
                Source: JULY SOA.exe, 00000010.00000002.532335988.0000000000E8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
                Source: JULY SOA.exe, 00000010.00000003.387748722.0000000006C4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
                Source: JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
                Source: JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
                Source: JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
                Source: JULY SOA.exe, 00000010.00000003.387748722.0000000006C4F000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.563149008.0000000006133000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
                Source: JULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000002.335223464.0000000005A70000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: JULY SOA.exe, 00000000.00000003.267569141.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: JULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF6
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comTTFq
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsFT
                Source: JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomaF
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
                Source: JULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd=
                Source: JULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdsed
                Source: JULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
                Source: JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comj
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiva
                Source: JULY SOA.exe, 00000000.00000002.335223464.0000000005A70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueTF
                Source: JULY SOA.exe, 00000000.00000003.259931334.0000000005A94000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259902767.0000000005A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: JULY SOA.exe, 00000000.00000003.259931334.0000000005A94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comX
                Source: JULY SOA.exe, 00000000.00000003.259965341.0000000005A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comc
                Source: JULY SOA.exe, 00000000.00000003.259902767.0000000005A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comx
                Source: JULY SOA.exe, 00000000.00000003.262287409.0000000005A74000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: JULY SOA.exe, 00000000.00000003.262469245.0000000005A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/0
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: JULY SOA.exe, 00000000.00000003.262469245.0000000005A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/r
                Source: JULY SOA.exe, 00000000.00000003.262198978.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnA:
                Source: JULY SOA.exe, 00000000.00000003.262287409.0000000005A74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnLog
                Source: JULY SOA.exe, 00000000.00000003.262198978.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cni:
                Source: JULY SOA.exe, 00000000.00000003.262198978.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cns-ez
                Source: JULY SOA.exe, 00000000.00000003.262198978.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnu-e
                Source: JULY SOA.exe, 00000000.00000003.262287409.0000000005A74000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.262475290.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnudi
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
                Source: JULY SOA.exe, 00000010.00000002.563299618.000000000617E000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390115378.000000000617E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
                Source: JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
                Source: JULY SOA.exe, 00000010.00000003.390687013.0000000006158000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
                Source: JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: JULY SOA.exe, 00000000.00000003.259755927.0000000005A93000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259833527.0000000005A93000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259720705.0000000005A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comd
                Source: JULY SOA.exe, 00000000.00000003.259856547.0000000005A94000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259949062.0000000005A94000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259755927.0000000005A93000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259931334.0000000005A94000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259833527.0000000005A93000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259720705.0000000005A93000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259785076.0000000005A94000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259800398.0000000005A94000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259902767.0000000005A93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comhekc?:
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.261364106.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: JULY SOA.exe, 00000000.00000003.261364106.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krq
                Source: JULY SOA.exe, 00000000.00000003.261364106.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krt
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
                Source: JULY SOA.exe, 00000010.00000003.391149006.0000000006C40000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.563253922.000000000616E000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: JULY SOA.exe, 00000000.00000003.260983281.0000000005A8B000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.261039384.0000000005A8B000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.261021740.0000000005A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comT
                Source: JULY SOA.exe, 00000000.00000003.260478619.0000000005A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comco
                Source: JULY SOA.exe, 00000000.00000003.260434349.0000000005A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comnT
                Source: JULY SOA.exe, 00000000.00000003.260461803.0000000005A8B000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.260478619.0000000005A8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comp
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deI
                Source: JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
                Source: JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: JULY SOA.exe, 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                Source: JULY SOA.exe, 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%appdata
                Source: JULY SOA.exe, 00000010.00000002.563109744.0000000006121000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
                Source: JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eca.hinet.net/repository0
                Source: JULY SOA.exe, 00000010.00000003.391149006.0000000006C40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0
                Source: JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
                Source: JULY SOA.exe, 00000010.00000002.563109744.0000000006121000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
                Source: JULY SOA.exe, 00000010.00000002.563109744.0000000006121000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
                Source: JULY SOA.exe, 00000010.00000002.563109744.0000000006121000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
                Source: JULY SOA.exe, 00000010.00000003.387748722.0000000006C4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
                Source: JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
                Source: JULY SOA.exe, 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
                Source: unknownDNS traffic detected: queries for: mail.palumalimited.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\JULY SOA.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\JULY SOA.exe
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06447760 SetWindowsHookExW 0000000D,00000000,?,?

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\Desktop\JULY SOA.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                System Summary

                barindex
                Source: 16.0.JULY SOA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 16.0.JULY SOA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 19.2.DnDcR.exe.43cbec8.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 19.2.DnDcR.exe.43cbec8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.JULY SOA.exe.3bae2b0.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.JULY SOA.exe.3bae2b0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 19.2.DnDcR.exe.43cbec8.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 19.2.DnDcR.exe.43cbec8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.JULY SOA.exe.3be2ad0.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.JULY SOA.exe.3be2ad0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.JULY SOA.exe.3bae2b0.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.JULY SOA.exe.3bae2b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 19.2.DnDcR.exe.32fd8f4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.JULY SOA.exe.2a4d8b4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.JULY SOA.exe.3ac8c30.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.JULY SOA.exe.3ac8c30.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000010.00000000.308754595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: JULY SOA.exe PID: 5808, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: JULY SOA.exe PID: 4972, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: DnDcR.exe PID: 2080, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 16.0.JULY SOA.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b725F2A01u002d418Fu002d4591u002d8BE2u002dDEB8CFCC3827u007d/u0033AE6CE3Cu002dFED2u002d4848u002d91E4u002d088382D94767.csLarge array initialization: .cctor: array initializer size 11641
                Source: JULY SOA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 16.0.JULY SOA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 16.0.JULY SOA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 19.2.DnDcR.exe.43cbec8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 19.2.DnDcR.exe.43cbec8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.JULY SOA.exe.3bae2b0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.JULY SOA.exe.3bae2b0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 19.2.DnDcR.exe.43cbec8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 19.2.DnDcR.exe.43cbec8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.JULY SOA.exe.3be2ad0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.JULY SOA.exe.3be2ad0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.JULY SOA.exe.3bae2b0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.JULY SOA.exe.3bae2b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 19.2.DnDcR.exe.32fd8f4.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.JULY SOA.exe.2a4d8b4.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.JULY SOA.exe.3ac8c30.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.JULY SOA.exe.3ac8c30.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000010.00000000.308754595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: JULY SOA.exe PID: 5808, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
                Source: Process Memory Space: JULY SOA.exe PID: 5808, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: JULY SOA.exe PID: 4972, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: DnDcR.exe PID: 2080, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
                Source: Process Memory Space: DnDcR.exe PID: 2080, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: DnDcR.exe PID: 3168, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_01074FD0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0107C894
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_01074FC0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0107F350
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0107F360
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6D5B8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6E5C8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B65528
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B62FF0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B64740
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B69898
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B60040
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B64AD8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B65260
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6E5BA
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B65519
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6F650
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6D9B0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6D99F
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B64AC9
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6F278
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6F268
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B65250
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07540F00
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07547F88
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0754CAD0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0754B100
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07540040
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0754C838
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0754B4D0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_075484A0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07547F78
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0754BB18
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07543718
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07543708
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07549BF8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07546FBC
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07549BA8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07540E10
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07544230
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07541E38
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07541E28
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_075432D8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_075432C9
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07543550
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07543540
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0754C538
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07544190
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_0754B858
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07540006
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07547008
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_07543091
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_075430A0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609B652
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06096308
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609B338
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060951C8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060932A8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06096118
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061EDC63
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061EE060
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061E60A8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061EA588
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061E19B0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061E0040
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061E9508
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061E1159
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_061E2DA0
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0626AF38
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06263288
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06264AE8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06445648
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_064432D8
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06440040
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06449440
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0644001E
                Source: JULY SOA.exe, 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs JULY SOA.exe
                Source: JULY SOA.exe, 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRbhfKncGjBvSEEOOUbcR.exe4 vs JULY SOA.exe
                Source: JULY SOA.exe, 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebIJjU.exeH vs JULY SOA.exe
                Source: JULY SOA.exe, 00000000.00000002.313583973.00000000029F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs JULY SOA.exe
                Source: JULY SOA.exe, 00000000.00000002.313583973.00000000029F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRbhfKncGjBvSEEOOUbcR.exe4 vs JULY SOA.exe
                Source: JULY SOA.exe, 00000000.00000002.339227607.00000000074B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs JULY SOA.exe
                Source: JULY SOA.exe, 00000000.00000002.319691103.0000000002FA0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs JULY SOA.exe
                Source: JULY SOA.exe, 00000000.00000000.253007784.0000000000682000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebIJjU.exeH vs JULY SOA.exe
                Source: JULY SOA.exe, 00000010.00000002.522960121.0000000000B38000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs JULY SOA.exe
                Source: JULY SOA.exe, 00000010.00000000.309230290.0000000000436000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRbhfKncGjBvSEEOOUbcR.exe4 vs JULY SOA.exe
                Source: JULY SOA.exe, 00000010.00000003.319095097.00000000060E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebIJjU.exeH vs JULY SOA.exe
                Source: JULY SOA.exeBinary or memory string: OriginalFilenamebIJjU.exeH vs JULY SOA.exe
                Source: JULY SOA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: qOHVWexsnI.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: DnDcR.exe.16.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: JULY SOA.exeVirustotal: Detection: 59%
                Source: JULY SOA.exeReversingLabs: Detection: 39%
                Source: C:\Users\user\Desktop\JULY SOA.exeFile read: C:\Users\user\Desktop\JULY SOA.exeJump to behavior
                Source: JULY SOA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\JULY SOA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\JULY SOA.exe "C:\Users\user\Desktop\JULY SOA.exe"
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp3EB6.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe "C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe "C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe"
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp158E.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe {path}
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp3EB6.tmp
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp158E.tmp
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe {path}
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Users\user\Desktop\JULY SOA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\JULY SOA.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\JULY SOA.exeFile created: C:\Users\user\AppData\Roaming\qOHVWexsnI.exeJump to behavior
                Source: C:\Users\user\Desktop\JULY SOA.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3EB6.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@19/10@4/2
                Source: C:\Users\user\Desktop\JULY SOA.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: JULY SOA.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\JULY SOA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\JULY SOA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeMutant created: \Sessions\1\BaseNamedObjects\vXPoPZNjXXibBWcgZq
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2292:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5496:120:WilError_01
                Source: 16.0.JULY SOA.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 16.0.JULY SOA.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\JULY SOA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\JULY SOA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\JULY SOA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\JULY SOA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\Desktop\JULY SOA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\JULY SOA.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: JULY SOA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: JULY SOA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05BB04B2 push edi; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05BB08F5 push eax; iretd
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05BB2237 push cs; retf
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609165F push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609166B push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091663 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609169B push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609169F push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060916AB push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060916A7 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060916B7 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091789 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609179B push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091793 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060917A1 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060917B9 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060917D1 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060917EB push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609181B push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091817 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091827 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091833 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091863 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091867 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_0609187F push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_06091873 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060918AF push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060918BF push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060918B3 push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060918CB push es; ret
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060918C5 push es; ret
                Source: initial sampleStatic PE information: section name: .text entropy: 7.420583605513861
                Source: initial sampleStatic PE information: section name: .text entropy: 7.420583605513861
                Source: initial sampleStatic PE information: section name: .text entropy: 7.420583605513861
                Source: C:\Users\user\Desktop\JULY SOA.exeFile created: C:\Users\user\AppData\Roaming\qOHVWexsnI.exeJump to dropped file
                Source: C:\Users\user\Desktop\JULY SOA.exeFile created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp3EB6.tmp
                Source: C:\Users\user\Desktop\JULY SOA.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DnDcRJump to behavior
                Source: C:\Users\user\Desktop\JULY SOA.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DnDcRJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\JULY SOA.exeFile opened: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe:Zone.Identifier read attributes | delete
                Source: C:\Users\user\Desktop\JULY SOA.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: JULY SOA.exe PID: 5808, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DnDcR.exe PID: 2080, type: MEMORYSTR
                Source: JULY SOA.exe, 00000000.00000002.313583973.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: JULY SOA.exe, 00000000.00000002.313583973.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\JULY SOA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\JULY SOA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\JULY SOA.exe TID: 1428Thread sleep time: -4611686018427385s >= -30000s
                Source: C:\Users\user\Desktop\JULY SOA.exe TID: 1664Thread sleep count: 9627 > 30
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe TID: 3496Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe TID: 1992Thread sleep count: 9485 > 30
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\JULY SOA.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\JULY SOA.exeWindow / User API: threadDelayed 9627
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeWindow / User API: threadDelayed 9485
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 0_2_05B6FEE1 sldt word ptr [eax]
                Source: C:\Users\user\Desktop\JULY SOA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\JULY SOA.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeThread delayed: delay time: 922337203685477
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: JULY SOA.exe, 00000010.00000002.562310812.00000000060E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                Source: JULY SOA.exe, 00000010.00000003.382664498.0000000006BB7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: JULY SOA.exe, 00000010.00000002.563359578.0000000006181000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.382381731.0000000006180000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWd
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\JULY SOA.exeCode function: 16_2_060982F8 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\JULY SOA.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\JULY SOA.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\JULY SOA.exeMemory written: C:\Users\user\Desktop\JULY SOA.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeMemory written: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp3EB6.tmp
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeProcess created: C:\Users\user\Desktop\JULY SOA.exe {path}
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp158E.tmp
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe {path}
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeProcess created: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe {path}
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Users\user\Desktop\JULY SOA.exe VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Users\user\Desktop\JULY SOA.exe VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\JULY SOA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Users\user\Desktop\JULY SOA.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 16.0.JULY SOA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.DnDcR.exe.43cbec8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3bae2b0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.DnDcR.exe.43cbec8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3be2ad0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3bae2b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3ac8c30.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000000.308754595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JULY SOA.exe PID: 5808, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: JULY SOA.exe PID: 4972, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DnDcR.exe PID: 2080, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DnDcR.exe PID: 3896, type: MEMORYSTR
                Source: C:\Users\user\Desktop\JULY SOA.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\JULY SOA.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\JULY SOA.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\JULY SOA.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\Desktop\JULY SOA.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JULY SOA.exe PID: 4972, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DnDcR.exe PID: 3896, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 16.0.JULY SOA.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.DnDcR.exe.43cbec8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3bae2b0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.DnDcR.exe.43cbec8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3be2ad0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3bae2b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JULY SOA.exe.3ac8c30.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000000.308754595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JULY SOA.exe PID: 5808, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: JULY SOA.exe PID: 4972, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DnDcR.exe PID: 2080, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DnDcR.exe PID: 3896, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                File and Directory Permissions Modification
                2
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Scheduled Task/Job
                1
                Registry Run Keys / Startup Folder
                1
                Scheduled Task/Job
                1
                Disable or Modify Tools
                21
                Input Capture
                114
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)1
                Registry Run Keys / Startup Folder
                1
                Deobfuscate/Decode Files or Information
                1
                Credentials in Registry
                1
                Query Registry
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
                Obfuscated Files or Information
                NTDS311
                Security Software Discovery
                Distributed Component Object Model21
                Input Capture
                Scheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script3
                Software Packing
                LSA Secrets1
                Process Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Masquerading
                Cached Domain Credentials141
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items141
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job111
                Process Injection
                Proc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                Hidden Files and Directories
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 680518 Sample: JULY SOA.exe Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for dropped file 2->70 72 Multi AV Scanner detection for submitted file 2->72 74 11 other signatures 2->74 7 JULY SOA.exe 6 2->7         started        11 DnDcR.exe 5 2->11         started        13 DnDcR.exe 2 2->13         started        process3 file4 42 C:\Users\user\AppData\...\qOHVWexsnI.exe, PE32 7->42 dropped 44 C:\Users\user\AppData\Local\...\tmp3EB6.tmp, XML 7->44 dropped 46 C:\Users\user\AppData\...\JULY SOA.exe.log, ASCII 7->46 dropped 76 Injects a PE file into a foreign processes 7->76 15 JULY SOA.exe 2 5 7->15         started        20 schtasks.exe 1 7->20         started        22 JULY SOA.exe 7->22         started        24 JULY SOA.exe 7->24         started        78 Multi AV Scanner detection for dropped file 11->78 80 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->80 82 Machine Learning detection for dropped file 11->82 84 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 11->84 26 DnDcR.exe 11->26         started        28 schtasks.exe 1 11->28         started        30 DnDcR.exe 11->30         started        signatures5 process6 dnsIp7 48 mail.palumalimited.com 15->48 50 palumalimited.com 174.136.29.110, 49766, 49783, 587 IHNETUS United States 15->50 54 2 other IPs or domains 15->54 36 C:\Users\user\AppData\Roaming\...\DnDcR.exe, PE32 15->36 dropped 38 C:\Windows\System32\drivers\etc\hosts, ASCII 15->38 dropped 40 C:\Users\user\...\DnDcR.exe:Zone.Identifier, ASCII 15->40 dropped 56 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->56 58 Tries to steal Mail credentials (via file / registry access) 15->58 60 Modifies the hosts file 15->60 66 2 other signatures 15->66 32 conhost.exe 20->32         started        52 mail.palumalimited.com 26->52 62 Tries to harvest and steal ftp login credentials 26->62 64 Tries to harvest and steal browser information (history, passwords, etc) 26->64 34 conhost.exe 28->34         started        file8 signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                JULY SOA.exe59%VirustotalBrowse
                JULY SOA.exe39%ReversingLabsByteCode-MSIL.Trojan.Taskun
                JULY SOA.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\qOHVWexsnI.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe39%ReversingLabsByteCode-MSIL.Trojan.Taskun
                C:\Users\user\AppData\Roaming\qOHVWexsnI.exe39%ReversingLabsByteCode-MSIL.Trojan.Taskun
                SourceDetectionScannerLabelLinkDownload
                16.0.JULY SOA.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                palumalimited.com2%VirustotalBrowse
                windowsupdatebg.s.llnwi.net0%VirustotalBrowse
                mail.palumalimited.com5%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
                http://ocsp.suscerte.gob.ve00%URL Reputationsafe
                http://www.fontbureau.comd=0%Avira URL Cloudsafe
                http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
                http://www.chambersign.org10%URL Reputationsafe
                http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz00%URL Reputationsafe
                http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
                http://ca.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://www.suscerte.gob.ve/dpc00%URL Reputationsafe
                http://www.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://www.tiro.comco0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                https://api.ipify.org%0%URL Reputationsafe
                http://policy.camerfirma.com00%URL Reputationsafe
                http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?0%URL Reputationsafe
                http://cps.letsencrypt.org00%URL Reputationsafe
                http://www.sandoll.co.krt0%URL Reputationsafe
                http://crl.ssc.lt/root-b/cacrl.crl00%URL Reputationsafe
                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
                http://www.sandoll.co.krq0%Avira URL Cloudsafe
                https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
                http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.globaltrust.info00%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://ac.economia.gob.mx/last.crl0G0%URL Reputationsafe
                http://www.fontbureau.comcomaF0%Avira URL Cloudsafe
                http://crl.oces.trust2408.com/oces.crl00%URL Reputationsafe
                http://certs.oaticerts.com/repository/OATICA2.crl0%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
                http://www.accv.es000%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcaparta1.crl0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.founder.com.cn/cns-ez0%Avira URL Cloudsafe
                http://www.acabogacia.org00%URL Reputationsafe
                http://mail.palumalimited.com0%Avira URL Cloudsafe
                http://www.agesic.gub.uy/acrn/acrn.crl0)0%URL Reputationsafe
                http://www.rcsc.lt/repository00%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.fontbureau.comF60%Avira URL Cloudsafe
                http://www.carterandcone.comyle0%Avira URL Cloudsafe
                http://x1.c.lencr.org/00%URL Reputationsafe
                http://x1.i.lencr.org/00%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.de0%URL Reputationsafe
                http://certs.oaticerts.com/repository/OATICA2.crt080%URL Reputationsafe
                http://www.fonts.comx0%URL Reputationsafe
                http://www.fontbureau.comsiva0%URL Reputationsafe
                http://www.founder.com.cn/cnLog0%URL Reputationsafe
                http://www.oaticerts.com/repository.0%URL Reputationsafe
                http://www.ancert.com/cps00%URL Reputationsafe
                http://www.fontbureau.comTTFq0%Avira URL Cloudsafe
                https://api.ipify.org%appdata0%URL Reputationsafe
                http://ocsp.accv.es00%URL Reputationsafe
                http://www.founder.com.cn/cni:0%Avira URL Cloudsafe
                http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl00%URL Reputationsafe
                http://www.echoworx.com/ca/root2/cps.pdf00%URL Reputationsafe
                http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz030%URL Reputationsafe
                http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl00%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.monotype.0%URL Reputationsafe
                http://crl.defence.gov.au/pki00%URL Reputationsafe
                http://www.agesic.gub.uy/acrn/cps_acrn.pdf00%URL Reputationsafe
                http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl00%URL Reputationsafe
                https://www.catcert.net/verarrel050%URL Reputationsafe
                http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c00%URL Reputationsafe
                http://www.fontbureau.comdsed0%URL Reputationsafe
                http://www.founder.com.cn/cnu-e0%URL Reputationsafe
                http://www.comsign.co.il/cps00%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://www.e-me.lv/repository00%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                palumalimited.com
                174.136.29.110
                truefalseunknown
                windowsupdatebg.s.llnwi.net
                178.79.225.128
                truefalseunknown
                mail.palumalimited.com
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.certplus.com/CRL/class3.crl0JULY SOA.exe, 00000010.00000003.390993402.0000000006BD5000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ocsp.suscerte.gob.ve0JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.comd=JULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://crl.dhimyotis.com/certignarootca.crl0JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.chambersign.org1JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390634314.0000000006156000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://repository.swisssign.com/0JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crl.ssc.lt/root-c/cacrl.crl0JULY SOA.exe, 00000010.00000003.391149006.0000000006C40000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ca.disig.sk/ca/crl/ca_disig.crl0JULY SOA.exe, 00000010.00000002.532335988.0000000000E8C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.suscerte.gob.ve/dpc0JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.disig.sk/ca/crl/ca_disig.crl0JULY SOA.exe, 00000010.00000002.532335988.0000000000E8C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.tiro.comcoJULY SOA.exe, 00000000.00000003.260478619.0000000005A8B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameJULY SOA.exe, 00000000.00000002.313583973.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 00000013.00000002.434546929.00000000032A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://api.ipify.org%JULY SOA.exe, 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      low
                      http://pki.registradores.org/normativa/index.htm0JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://policy.camerfirma.com0JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.anf.es/es/address-direccion.htmlJULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://www.anf.es/address/)1(0&JULY SOA.exe, 00000010.00000002.563109744.0000000006121000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://cps.letsencrypt.org0JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sandoll.co.krtJULY SOA.exe, 00000000.00000003.261364106.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.ssc.lt/root-b/cacrl.crl0JULY SOA.exe, 00000010.00000002.563253922.000000000616E000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.certicamara.com/dpc/0ZJULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0GJULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sandoll.co.krqJULY SOA.exe, 00000000.00000003.261364106.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://wwww.certigna.fr/autorites/0mJULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwJULY SOA.exe, 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.anf.es/AC/ANFServerCA.crl0JULY SOA.exe, 00000010.00000002.563109744.0000000006121000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.globaltrust.info0JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://ac.economia.gob.mx/last.crl0GJULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390070081.0000000006174000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comcomaFJULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.oces.trust2408.com/oces.crl0JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://eca.hinet.net/repository0JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://certs.oaticerts.com/repository/OATICA2.crlJULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://certs.oati.net/repository/OATICA2.crt0JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.accv.es00JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0JULY SOA.exe, 00000010.00000003.390687013.0000000006158000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://web.ncdc.gov.sa/crl/nrcaparta1.crlJULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.datev.de/zertifikat-policy-int0JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/bTheJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cns-ezJULY SOA.exe, 00000000.00000003.262198978.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.acabogacia.org0JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://mail.palumalimited.comJULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.firmaprofesional.com/cps0JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.563149008.0000000006133000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.agesic.gub.uy/acrn/acrn.crl0)JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.rcsc.lt/repository0JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.typography.netDJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comF6JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://web.certicamara.com/marco-legal0ZJULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.carterandcone.comyleJULY SOA.exe, 00000000.00000003.264734009.0000000005A7D000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.264473152.0000000005A7D000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.264579666.0000000005A7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.quovadisglobal.com/cps0JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.c.lencr.org/0JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://x1.i.lencr.org/0JULY SOA.exe, 00000010.00000002.562505783.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000002.551057155.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.551678919.000000000341A000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://DynDns.comDynDNSnamejidpasswordPsi/PsiDnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fonts.comJULY SOA.exe, 00000000.00000003.259931334.0000000005A94000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.259902767.0000000005A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sandoll.co.krJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.261364106.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deJULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://certs.oaticerts.com/repository/OATICA2.crt08JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fonts.comxJULY SOA.exe, 00000000.00000003.259902767.0000000005A93000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.anf.es/AC/RC/ocsp0cJULY SOA.exe, 00000010.00000002.563109744.0000000006121000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comsivaJULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.founder.com.cn/cnLogJULY SOA.exe, 00000000.00000003.262287409.0000000005A74000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.oaticerts.com/repository.JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.ancert.com/cps0JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comTTFqJULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://api.ipify.org%appdataJULY SOA.exe, 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  low
                                                  http://ocsp.accv.es0JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.founder.com.cn/cni:JULY SOA.exe, 00000000.00000003.262198978.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.echoworx.com/ca/root2/cps.pdf0JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.389668840.0000000006159000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://eca.hinet.net/repository/CRL2/CA.crl0JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.datev.de/zertifikat-policy-std0JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388386158.0000000006C41000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers/cabarga.htmlNJULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.founder.com.cn/cnJULY SOA.exe, 00000000.00000003.262287409.0000000005A74000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000002.336085792.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0JULY SOA.exe, 00000010.00000002.563299618.000000000617E000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.390115378.000000000617E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.fontbureau.com/designers/cabarga.htmlJULY SOA.exe, 00000000.00000003.267569141.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.monotype.JULY SOA.exe, 00000000.00000003.268400141.0000000005A79000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://crl.defence.gov.au/pki0JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.agesic.gub.uy/acrn/cps_acrn.pdf0JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.catcert.net/verarrel05JULY SOA.exe, 00000010.00000003.387953820.0000000006178000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.fontbureau.comdsedJULY SOA.exe, 00000000.00000003.267502782.0000000005A7A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000000.00000003.267065355.0000000005A79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.pki.gva.es/cps0%JULY SOA.exe, 00000010.00000003.390489017.000000000613A000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.cert.fnmt.es/dpcs/0JULY SOA.exe, 00000010.00000003.390747397.0000000006122000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.datev.de/zertifikat-policy-bt0JULY SOA.exe, 00000010.00000002.532335988.0000000000E8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.founder.com.cn/cnu-eJULY SOA.exe, 00000000.00000003.262198978.0000000005AAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.comsign.co.il/cps0JULY SOA.exe, 00000010.00000003.390243547.0000000006149000.00000004.00000800.00020000.00000000.sdmp, JULY SOA.exe, 00000010.00000003.388532755.000000000611C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://127.0.0.1:HTTP/1.1JULY SOA.exe, 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, DnDcR.exe, 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  low
                                                                  http://www.e-me.lv/repository0JULY SOA.exe, 00000010.00000003.387748722.0000000006C4F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  174.136.29.110
                                                                  palumalimited.comUnited States
                                                                  33494IHNETUSfalse
                                                                  IP
                                                                  192.168.2.1
                                                                  Joe Sandbox Version:35.0.0 Citrine
                                                                  Analysis ID:680518
                                                                  Start date and time: 08/08/202218:19:052022-08-08 18:19:05 +02:00
                                                                  Joe Sandbox Product:CloudBasic
                                                                  Overall analysis duration:0h 9m 27s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:light
                                                                  Sample file name:JULY SOA.exe
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                  Number of analysed new started processes analysed:34
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • HDC enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.adwa.spyw.evad.winEXE@19/10@4/2
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HDC Information:Failed
                                                                  HCA Information:
                                                                  • Successful, ratio: 86%
                                                                  • Number of executed functions: 0
                                                                  • Number of non-executed functions: 0
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Adjust boot time
                                                                  • Enable AMSI
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 173.222.108.210, 173.222.108.226, 178.79.225.128, 95.140.230.192, 40.125.122.176, 20.54.89.106, 20.223.24.244, 52.242.101.226
                                                                  • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, arc.msn.com, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, e12564.dspb.akamaiedge.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  TimeTypeDescription
                                                                  18:20:27API Interceptor571x Sleep call for process: JULY SOA.exe modified
                                                                  18:20:43AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run DnDcR C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe
                                                                  18:20:52AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run DnDcR C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe
                                                                  18:21:22API Interceptor150x Sleep call for process: DnDcR.exe modified
                                                                  No context
                                                                  No context
                                                                  No context
                                                                  No context
                                                                  No context
                                                                  Process:C:\Users\user\Desktop\JULY SOA.exe
                                                                  File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                                                                  Category:dropped
                                                                  Size (bytes):61712
                                                                  Entropy (8bit):7.995044632446497
                                                                  Encrypted:true
                                                                  SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                                                                  MD5:589C442FC7A0C70DCA927115A700D41E
                                                                  SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                                                                  SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                                                                  SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                                                                  Process:C:\Users\user\Desktop\JULY SOA.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):290
                                                                  Entropy (8bit):2.934941215103815
                                                                  Encrypted:false
                                                                  SSDEEP:3:kkFklEBPtfllXlE/6hpllGhlR6pFRltB+SliQlP8F+RlTRe86A+iRlERMta9b3+O:kKE+N+SkQlPlEGYRMY9z+4KlDA3RUe/
                                                                  MD5:719153A58838CD7A751A8F220607D108
                                                                  SHA1:4A69BECA63D809EE4220D1DD784CF902A5EBFF40
                                                                  SHA-256:2E1C5BA075B29F9FC4A3FD8DD3EA0E59456AF2B614C43AFDAEF48925B28ABE6A
                                                                  SHA-512:8ED806F0558FF6CF3135AE1189A21BCE52BF7226A9C420831F5FD4F800C764336A52E7BCACED9ABD83D420FCB4D162F14CC56F49ED2B9DB45DC357642745E997
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:p...... ........u.......(....................................................... .........L.........................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...
                                                                  Process:C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.355304211458859
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                  MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                  SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                  SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                  SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                  Process:C:\Users\user\Desktop\JULY SOA.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.355304211458859
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                  MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                  SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                  SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                  SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                  Malicious:true
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                  Process:C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1643
                                                                  Entropy (8bit):5.191960058252804
                                                                  Encrypted:false
                                                                  SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBdtn:cbh47TlNQ//rydbz9I3YODOLNdq3N
                                                                  MD5:2DE66077C08D213284FB641F42335869
                                                                  SHA1:426563B3B48D9533906C35B70F5CE005AF6BC6CB
                                                                  SHA-256:362F33AD691EC088848B51FE8057FDE1D6DB513927C110845ED007973F7D048A
                                                                  SHA-512:433FC5057017E06EC517377178C27A2D0279A98496ADF4A41EFE992B037A16CEAF3EB303EC6849D64BFC8187D9D1D55D23AA2CD104C91511121D20BBB0E5E422
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                  Process:C:\Users\user\Desktop\JULY SOA.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1643
                                                                  Entropy (8bit):5.191960058252804
                                                                  Encrypted:false
                                                                  SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBdtn:cbh47TlNQ//rydbz9I3YODOLNdq3N
                                                                  MD5:2DE66077C08D213284FB641F42335869
                                                                  SHA1:426563B3B48D9533906C35B70F5CE005AF6BC6CB
                                                                  SHA-256:362F33AD691EC088848B51FE8057FDE1D6DB513927C110845ED007973F7D048A
                                                                  SHA-512:433FC5057017E06EC517377178C27A2D0279A98496ADF4A41EFE992B037A16CEAF3EB303EC6849D64BFC8187D9D1D55D23AA2CD104C91511121D20BBB0E5E422
                                                                  Malicious:true
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                  Process:C:\Users\user\Desktop\JULY SOA.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):889344
                                                                  Entropy (8bit):7.417227413730486
                                                                  Encrypted:false
                                                                  SSDEEP:24576:QEsjwi9BHtgLY40Sz1Zwfqh894DUM5fo:yRBN8Y40Sz36BK
                                                                  MD5:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  SHA1:5CFADF7C20971459DADEAE535E61BCC6B6175DF0
                                                                  SHA-256:6C9947DD57C1A90267929341FFB0A7FF7F225156748160852A78DD83D6943578
                                                                  SHA-512:55B08020B882BFFA2E564098FE0EFFD718CD6FB63B89A2BE884BDC392C08BE89459F7ADD20BDFD7DE1A65A99CFB7D5A84ABA08CA4355DE94EA863AF939F45BA3
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 39%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............P..|............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....{... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......................................................................0..........*....0...........(!...*..0..:.........("... ... /...a%..^E................+... @@B.Z .J_.a+.*...0..3.......s#........s$........s%........s&........s'........*..0..?........ .... [:].a%..^E................+.~....o(..... %..%Z .+p.a+..*..0..R........ ".C. M...a%..^E............+.......+)~....o)..... k.4.Z ....a+.. .2..Z DL..a+..*...0..R........ u.a} ..e.a%..^E........+...........+)~....o*.....
                                                                  Process:C:\Users\user\Desktop\JULY SOA.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):26
                                                                  Entropy (8bit):3.95006375643621
                                                                  Encrypted:false
                                                                  SSDEEP:3:ggPYV:rPYV
                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                  Malicious:true
                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                  Process:C:\Users\user\Desktop\JULY SOA.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):889344
                                                                  Entropy (8bit):7.417227413730486
                                                                  Encrypted:false
                                                                  SSDEEP:24576:QEsjwi9BHtgLY40Sz1Zwfqh894DUM5fo:yRBN8Y40Sz36BK
                                                                  MD5:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  SHA1:5CFADF7C20971459DADEAE535E61BCC6B6175DF0
                                                                  SHA-256:6C9947DD57C1A90267929341FFB0A7FF7F225156748160852A78DD83D6943578
                                                                  SHA-512:55B08020B882BFFA2E564098FE0EFFD718CD6FB63B89A2BE884BDC392C08BE89459F7ADD20BDFD7DE1A65A99CFB7D5A84ABA08CA4355DE94EA863AF939F45BA3
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 39%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............P..|............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....{... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......................................................................0..........*....0...........(!...*..0..:.........("... ... /...a%..^E................+... @@B.Z .J_.a+.*...0..3.......s#........s$........s%........s&........s'........*..0..?........ .... [:].a%..^E................+.~....o(..... %..%Z .+p.a+..*..0..R........ ".C. M...a%..^E............+.......+)~....o)..... k.4.Z ....a+.. .2..Z DL..a+..*...0..R........ u.a} ..e.a%..^E........+...........+)~....o*.....
                                                                  Process:C:\Users\user\Desktop\JULY SOA.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):835
                                                                  Entropy (8bit):4.694294591169137
                                                                  Encrypted:false
                                                                  SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcP
                                                                  MD5:6EB47C1CF858E25486E42440074917F2
                                                                  SHA1:6A63F93A95E1AE831C393A97158C526A4FA0FAAE
                                                                  SHA-256:9B13A3EA948A1071A81787AAC1930B89E30DF22CE13F8FF751F31B5D83E79FFB
                                                                  SHA-512:08437AB32E7E905EB11335E670CDD5D999803390710ED39CBC31A2D3F05868D5D0E5D051CCD7B06A85BB466932F99A220463D27FAC29116D241E8ADAC495FA2F
                                                                  Malicious:true
                                                                  Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1
                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):7.417227413730486
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                  File name:JULY SOA.exe
                                                                  File size:889344
                                                                  MD5:c059fd1e2ec2df2b8e4af62359868b1b
                                                                  SHA1:5cfadf7c20971459dadeae535e61bcc6b6175df0
                                                                  SHA256:6c9947dd57c1a90267929341ffb0a7ff7f225156748160852a78dd83d6943578
                                                                  SHA512:55b08020b882bffa2e564098fe0effd718cd6fb63b89a2be884bdc392c08be89459f7add20bdfd7de1a65a99cfb7d5a84aba08ca4355de94ea863af939f45ba3
                                                                  SSDEEP:24576:QEsjwi9BHtgLY40Sz1Zwfqh894DUM5fo:yRBN8Y40Sz36BK
                                                                  TLSH:5B155BA9319071DFD923CA31CAA41C74EB617C77A71B921794673298DB3E987DF200B2
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............P..|............... ........@.. ....................................@................................
                                                                  Icon Hash:00828e8e8686b000
                                                                  Entrypoint:0x4d9afe
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x62F09691 [Mon Aug 8 04:52:33 2022 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                  Instruction
                                                                  jmp dword ptr [00402000h]
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xd9ab00x4b.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xda0000x11f0.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000xd7b040xd7c00False0.7431821679461182data7.420583605513861IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0xda0000x11f00x1200False0.3936631944444444data5.051410354326853IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xdc0000xc0x200False0.041015625data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountry
                                                                  RT_VERSION0xda0a00x334data
                                                                  RT_MANIFEST0xda3d40xe15XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators
                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Aug 8, 2022 18:21:04.948134899 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:05.083220005 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.083420038 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:05.273957968 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.274281025 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:05.411305904 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.412811041 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:05.550263882 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.673643112 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:05.816494942 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.816524029 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.816540956 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.816554070 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.816620111 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:05.818304062 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:05.818408012 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:05.842231989 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:05.977404118 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:06.087069988 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:15.787471056 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:15.922790051 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:15.924426079 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.059607029 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.060353994 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.199578047 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.200393915 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.335732937 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.336157084 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.510190964 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.510229111 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.510598898 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.645215988 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.645272970 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.646442890 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.646557093 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.647399902 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.647458076 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:21:16.781286955 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.781354904 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.781837940 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.781985044 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.790127039 CEST58749766174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:21:16.900490999 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:13.665323973 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:13.800867081 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:13.801105976 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:13.974426985 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:13.974801064 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:14.110100985 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:14.146116018 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:14.283982992 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:14.483633041 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:14.677851915 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:14.824517012 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:14.824542046 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:14.824558020 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:14.824564934 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:14.824764967 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:14.824806929 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:14.828706026 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:14.983639002 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:15.217648983 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:15.353404045 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:15.593067884 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:16.751756907 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:16.887917042 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:16.888345957 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.024554014 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.024955034 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.164678097 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.165038109 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.300569057 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.300832987 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.476304054 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.479221106 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.479465008 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.617343903 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.617388010 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.618134975 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.618186951 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.618196011 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.618211031 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:17.754057884 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.754098892 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.754127979 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.754143953 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.770174026 CEST58749783174.136.29.110192.168.2.3
                                                                  Aug 8, 2022 18:22:17.967497110 CEST49783587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:41.594635010 CEST49766587192.168.2.3174.136.29.110
                                                                  Aug 8, 2022 18:22:41.769206047 CEST58749766174.136.29.110192.168.2.3
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Aug 8, 2022 18:21:03.302783012 CEST4932753192.168.2.38.8.8.8
                                                                  Aug 8, 2022 18:21:03.595026016 CEST53493278.8.8.8192.168.2.3
                                                                  Aug 8, 2022 18:21:04.810533047 CEST5139153192.168.2.38.8.8.8
                                                                  Aug 8, 2022 18:21:04.827919960 CEST53513918.8.8.8192.168.2.3
                                                                  Aug 8, 2022 18:22:13.003118992 CEST5979553192.168.2.38.8.8.8
                                                                  Aug 8, 2022 18:22:13.284246922 CEST53597958.8.8.8192.168.2.3
                                                                  Aug 8, 2022 18:22:13.325135946 CEST5939053192.168.2.38.8.8.8
                                                                  Aug 8, 2022 18:22:13.617414951 CEST53593908.8.8.8192.168.2.3
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                  Aug 8, 2022 18:21:03.302783012 CEST192.168.2.38.8.8.80xaf9aStandard query (0)mail.palumalimited.comA (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:21:04.810533047 CEST192.168.2.38.8.8.80x4ab1Standard query (0)mail.palumalimited.comA (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:22:13.003118992 CEST192.168.2.38.8.8.80xb412Standard query (0)mail.palumalimited.comA (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:22:13.325135946 CEST192.168.2.38.8.8.80xd476Standard query (0)mail.palumalimited.comA (IP address)IN (0x0001)
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                  Aug 8, 2022 18:21:03.595026016 CEST8.8.8.8192.168.2.30xaf9aNo error (0)mail.palumalimited.compalumalimited.comCNAME (Canonical name)IN (0x0001)
                                                                  Aug 8, 2022 18:21:03.595026016 CEST8.8.8.8192.168.2.30xaf9aNo error (0)palumalimited.com174.136.29.110A (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:21:04.827919960 CEST8.8.8.8192.168.2.30x4ab1No error (0)mail.palumalimited.compalumalimited.comCNAME (Canonical name)IN (0x0001)
                                                                  Aug 8, 2022 18:21:04.827919960 CEST8.8.8.8192.168.2.30x4ab1No error (0)palumalimited.com174.136.29.110A (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:21:09.125080109 CEST8.8.8.8192.168.2.30x7fa2No error (0)windowsupdatebg.s.llnwi.net178.79.225.128A (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:21:09.125080109 CEST8.8.8.8192.168.2.30x7fa2No error (0)windowsupdatebg.s.llnwi.net95.140.230.192A (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:21:13.981113911 CEST8.8.8.8192.168.2.30xebaaNo error (0)windowsupdatebg.s.llnwi.net95.140.230.192A (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:21:13.981113911 CEST8.8.8.8192.168.2.30xebaaNo error (0)windowsupdatebg.s.llnwi.net95.140.230.128A (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:22:13.284246922 CEST8.8.8.8192.168.2.30xb412No error (0)mail.palumalimited.compalumalimited.comCNAME (Canonical name)IN (0x0001)
                                                                  Aug 8, 2022 18:22:13.284246922 CEST8.8.8.8192.168.2.30xb412No error (0)palumalimited.com174.136.29.110A (IP address)IN (0x0001)
                                                                  Aug 8, 2022 18:22:13.617414951 CEST8.8.8.8192.168.2.30xd476No error (0)mail.palumalimited.compalumalimited.comCNAME (Canonical name)IN (0x0001)
                                                                  Aug 8, 2022 18:22:13.617414951 CEST8.8.8.8192.168.2.30xd476No error (0)palumalimited.com174.136.29.110A (IP address)IN (0x0001)
                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                  Aug 8, 2022 18:21:05.273957968 CEST58749766174.136.29.110192.168.2.3220-fastest.vivawebhost.com ESMTP Exim 4.95 #2 Mon, 08 Aug 2022 12:21:05 -0400
                                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                                  220 and/or bulk e-mail.
                                                                  Aug 8, 2022 18:21:05.274281025 CEST49766587192.168.2.3174.136.29.110EHLO 472847
                                                                  Aug 8, 2022 18:21:05.411305904 CEST58749766174.136.29.110192.168.2.3250-fastest.vivawebhost.com Hello 472847 [102.129.143.3]
                                                                  250-SIZE 52428800
                                                                  250-8BITMIME
                                                                  250-PIPELINING
                                                                  250-PIPE_CONNECT
                                                                  250-AUTH PLAIN LOGIN
                                                                  250-STARTTLS
                                                                  250 HELP
                                                                  Aug 8, 2022 18:21:05.412811041 CEST49766587192.168.2.3174.136.29.110STARTTLS
                                                                  Aug 8, 2022 18:21:05.550263882 CEST58749766174.136.29.110192.168.2.3220 TLS go ahead
                                                                  Aug 8, 2022 18:22:13.974426985 CEST58749783174.136.29.110192.168.2.3220-fastest.vivawebhost.com ESMTP Exim 4.95 #2 Mon, 08 Aug 2022 12:22:14 -0400
                                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                                  220 and/or bulk e-mail.
                                                                  Aug 8, 2022 18:22:13.974801064 CEST49783587192.168.2.3174.136.29.110EHLO 472847
                                                                  Aug 8, 2022 18:22:14.110100985 CEST58749783174.136.29.110192.168.2.3250-fastest.vivawebhost.com Hello 472847 [102.129.143.3]
                                                                  250-SIZE 52428800
                                                                  250-8BITMIME
                                                                  250-PIPELINING
                                                                  250-PIPE_CONNECT
                                                                  250-AUTH PLAIN LOGIN
                                                                  250-STARTTLS
                                                                  250 HELP
                                                                  Aug 8, 2022 18:22:14.146116018 CEST49783587192.168.2.3174.136.29.110STARTTLS
                                                                  Aug 8, 2022 18:22:14.283982992 CEST58749783174.136.29.110192.168.2.3220 TLS go ahead

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:18:20:10
                                                                  Start date:08/08/2022
                                                                  Path:C:\Users\user\Desktop\JULY SOA.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\JULY SOA.exe"
                                                                  Imagebase:0x680000
                                                                  File size:889344 bytes
                                                                  MD5 hash:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.319820199.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  Reputation:low

                                                                  Target ID:8
                                                                  Start time:18:20:32
                                                                  Start date:08/08/2022
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp3EB6.tmp
                                                                  Imagebase:0xa90000
                                                                  File size:185856 bytes
                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:10
                                                                  Start time:18:20:33
                                                                  Start date:08/08/2022
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7c9170000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:12
                                                                  Start time:18:20:34
                                                                  Start date:08/08/2022
                                                                  Path:C:\Users\user\Desktop\JULY SOA.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:{path}
                                                                  Imagebase:0x80000
                                                                  File size:889344 bytes
                                                                  MD5 hash:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low

                                                                  Target ID:15
                                                                  Start time:18:20:35
                                                                  Start date:08/08/2022
                                                                  Path:C:\Users\user\Desktop\JULY SOA.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:{path}
                                                                  Imagebase:0x30000
                                                                  File size:889344 bytes
                                                                  MD5 hash:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low

                                                                  Target ID:16
                                                                  Start time:18:20:36
                                                                  Start date:08/08/2022
                                                                  Path:C:\Users\user\Desktop\JULY SOA.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:{path}
                                                                  Imagebase:0x6b0000
                                                                  File size:889344 bytes
                                                                  MD5 hash:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.535440551.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.308754595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.308754595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000010.00000000.308754595.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                  Reputation:low

                                                                  Target ID:19
                                                                  Start time:18:20:52
                                                                  Start date:08/08/2022
                                                                  Path:C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe"
                                                                  Imagebase:0xea0000
                                                                  File size:889344 bytes
                                                                  MD5 hash:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000013.00000002.450194726.0000000004362000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 39%, ReversingLabs
                                                                  Reputation:low

                                                                  Target ID:21
                                                                  Start time:18:21:01
                                                                  Start date:08/08/2022
                                                                  Path:C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe"
                                                                  Imagebase:0xab0000
                                                                  File size:889344 bytes
                                                                  MD5 hash:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Reputation:low

                                                                  Target ID:24
                                                                  Start time:18:21:28
                                                                  Start date:08/08/2022
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qOHVWexsnI" /XML "C:\Users\user\AppData\Local\Temp\tmp158E.tmp
                                                                  Imagebase:0xa90000
                                                                  File size:185856 bytes
                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:25
                                                                  Start time:18:21:29
                                                                  Start date:08/08/2022
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7c9170000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:26
                                                                  Start time:18:21:30
                                                                  Start date:08/08/2022
                                                                  Path:C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:{path}
                                                                  Imagebase:0x70000
                                                                  File size:889344 bytes
                                                                  MD5 hash:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low

                                                                  Target ID:27
                                                                  Start time:18:21:31
                                                                  Start date:08/08/2022
                                                                  Path:C:\Users\user\AppData\Roaming\DnDcR\DnDcR.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:{path}
                                                                  Imagebase:0xbc0000
                                                                  File size:889344 bytes
                                                                  MD5 hash:C059FD1E2EC2DF2B8E4AF62359868B1B
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001B.00000002.536397827.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low

                                                                  No disassembly