Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Variant.Bulz.349164.25568.5993

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Bulz.349164.25568.5993 (renamed file extension from 5993 to exe)
Analysis ID:433042
MD5:c66fe399ec0cb598b2167a348c17f6a2
SHA1:fcc9984283b3596fb575523fb90eb80ce702abe2
SHA256:57f599e4ae63304de5795909f694122665f7c492df8078f7c5abb084d09baa2d
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains method to dynamically call methods (often used by packers)
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.rep.place/pba2/"], "decoy": ["marshabenjamin.com", "ipx-tv.com", "1826bet.net", "free-story-civilizatiom.com", "projecteightstudio.com", "blaxies3.com", "knowyourpharmacy.com", "daviddelavariservices.space", "hawaiidreamevents.com", "chickdeal.net", "toko363.com", "flextech.design", "americanprimativeguitar.com", "sourcesfloor.com", "project6212.com", "eggbeaterhub.xyz", "homefittness.com", "eigenguard.com", "bridgessd.com", "wordabbler.com", "432524.com", "blumlifestyle.com", "cn-liangyu.com", "earwaxsux.com", "n2keg.com", "kthetwobrothers.com", "freetoplaymedia.com", "ncunlimited.com", "mckinleygroupcommandforyou.com", "y-beautyplus.com", "plny.xyz", "luckyliars.com", "succozero.com", "zoorack.net", "myloveclubs.com", "cashstreamsonline.club", "23237a2371.info", "live-now20.xyz", "followtea.com", "xn--vhqqb70qmrhwmvnh0e.xyz", "thocudian.net", "trueradiencesolutions.net", "dictionarykick.com", "banbochfm.com", "privacyphonecover.com", "towandastorage.com", "livingthesustainablelife.com", "freeagencevoyage.com", "veritasfertilityandsurgery.com", "thehindufestival.com", "ollipsisparents.com", "caphesachnguyenchat.com", "xn--egegncel-95a.com", "americanpoolnbilliards.com", "wonderfulwanfield.com", "sheya360.com", "solterasalos40.com", "astarswimschools.net", "vcnse.com", "jinshifj.com", "washingtonreversemtgloans.com", "mutieudao.online", "fluatrec.com", "maggionsurvey.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8972:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x14685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x14171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x14787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x148ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x938a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x133ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa102:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19777:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1a81a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x166a9:$sqlite3step: 68 34 1C 7B E1
    • 0x167bc:$sqlite3step: 68 34 1C 7B E1
    • 0x166d8:$sqlite3text: 68 38 2A 90 C5
    • 0x167fd:$sqlite3text: 68 38 2A 90 C5
    • 0x166eb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16813:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0xc41f8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0xc4582:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x2b0178:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x2b0502:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0xd0295:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x2bc215:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0xcfd81:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x2bbd01:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0xd0397:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x2bc317:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0xd050f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x2bc48f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xc4f9a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x2b0f1a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0xceffc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x2baf7c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xc5d12:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x2b1c92:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0xd5387:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x2c1307:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0xd642a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 6 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8972:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x148ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x938a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x133ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa102:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19777:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1a81a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x166a9:$sqlite3step: 68 34 1C 7B E1
        • 0x167bc:$sqlite3step: 68 34 1C 7B E1
        • 0x166d8:$sqlite3text: 68 38 2A 90 C5
        • 0x167fd:$sqlite3text: 68 38 2A 90 C5
        • 0x166eb:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16813:$sqlite3blob: 68 53 D8 7F 8C
        3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8972:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x14685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x14787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x148ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x938a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x133ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa102:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x19777:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1a81a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 7 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.rep.place/pba2/"], "decoy": ["marshabenjamin.com", "ipx-tv.com", "1826bet.net", "free-story-civilizatiom.com", "projecteightstudio.com", "blaxies3.com", "knowyourpharmacy.com", "daviddelavariservices.space", "hawaiidreamevents.com", "chickdeal.net", "toko363.com", "flextech.design", "americanprimativeguitar.com", "sourcesfloor.com", "project6212.com", "eggbeaterhub.xyz", "homefittness.com", "eigenguard.com", "bridgessd.com", "wordabbler.com", "432524.com", "blumlifestyle.com", "cn-liangyu.com", "earwaxsux.com", "n2keg.com", "kthetwobrothers.com", "freetoplaymedia.com", "ncunlimited.com", "mckinleygroupcommandforyou.com", "y-beautyplus.com", "plny.xyz", "luckyliars.com", "succozero.com", "zoorack.net", "myloveclubs.com", "cashstreamsonline.club", "23237a2371.info", "live-now20.xyz", "followtea.com", "xn--vhqqb70qmrhwmvnh0e.xyz", "thocudian.net", "trueradiencesolutions.net", "dictionarykick.com", "banbochfm.com", "privacyphonecover.com", "towandastorage.com", "livingthesustainablelife.com", "freeagencevoyage.com", "veritasfertilityandsurgery.com", "thehindufestival.com", "ollipsisparents.com", "caphesachnguyenchat.com", "xn--egegncel-95a.com", "americanpoolnbilliards.com", "wonderfulwanfield.com", "sheya360.com", "solterasalos40.com", "astarswimschools.net", "vcnse.com", "jinshifj.com", "washingtonreversemtgloans.com", "mutieudao.online", "fluatrec.com", "maggionsurvey.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeVirustotal: Detection: 45%Perma Link
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeReversingLabs: Detection: 34%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeJoe Sandbox ML: detected
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: IsolatedStorageSecurityOptions.pdbh2 source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: Binary string: IsolatedStorageSecurityOptions.pdb source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000003.00000002.665726046.0000000001930000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 4x nop then pop esi
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 4x nop then pop ebx
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.rep.place/pba2/
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664163112.0000000002EE1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_004181B0 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00418260 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_004182E0 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00418390 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041825B NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041838A NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019996E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019999A0 NtCreateSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019999D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999910 NtAdjustPrivilegesToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019998A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019998F0 NtReadVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0199B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999840 NtDelayExecution,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0199A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999A10 NtQuerySection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999A00 NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999A20 NtResumeThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999A50 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019995D0 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019995F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0199AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999540 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999560 NtWriteFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999780 NtMapViewOfSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019997A0 NtUnmapViewOfSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999710 NtQueryInformationToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0199A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0199A770 NtOpenThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999760 NtOpenProcess,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019996D0 NtCreateKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 0_2_04F22B08
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 0_2_04F20040
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 0_2_04F20034
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 0_2_04F202AE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 0_2_04F20253
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 0_2_04F2025F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00401030
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041C194
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041BA28
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041BB84
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00408C4B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00408C50
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00408C0A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041C5E4
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00402D8B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00402D90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041B642
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041BF98
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00402FB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01972990
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196C1C0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195F900
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01974120
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196B090
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A220A8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019820A0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A228EC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198701D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A2E824
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01956800
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11002
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A830
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197EB9A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198138B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019FEB8A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198EBB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198ABD8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A023E3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019A8BE8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1DBD2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A103DA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A22B28
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1231B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019FCB4F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197AB40
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01973360
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A232A9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A222AE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1E2C5
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A0FA2B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B236
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982581
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12D82
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019865A0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196D5E0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A225DD
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A22D07
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01950D20
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01972D50
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A21D55
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984CD4
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196841F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01972430
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1D466
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A167E2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A21FF1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A2DFCE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A01EB6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A22EF7
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: String function: 019AD08C appears 39 times
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: String function: 019E5720 appears 74 times
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: String function: 0195B150 appears 153 times
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000000.654505180.0000000000B86000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIsolatedStorageSecurityOptions.exe< vs SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.669811504.0000000006080000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000003.00000002.667569220.0000000001BDF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000003.00000000.662192891.0000000000F76000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIsolatedStorageSecurityOptions.exe< vs SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeBinary or memory string: OriginalFilenameIsolatedStorageSecurityOptions.exe< vs SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.ac0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.ac0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.ac0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.ac0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.2.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.2.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Bulz.349164.25568.exe.logJump to behavior
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeVirustotal: Detection: 45%
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeReversingLabs: Detection: 34%
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe'
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: IsolatedStorageSecurityOptions.pdbh2 source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: Binary string: IsolatedStorageSecurityOptions.pdb source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000003.00000002.665726046.0000000001930000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe

          Data Obfuscation:

          barindex
          .NET source code contains method to dynamically call methods (often used by packers)Show sources
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 0.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.ac0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 0.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.ac0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.2.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041607F push ecx; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_004152EE pushad ; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0040AB63 push 00000066h; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041B3F2 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041B3FB push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041B3A5 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0041B45C push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00414D10 pushfd ; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_00414D22 pushfd ; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019AD0D1 push ecx; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.85673320535
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'A6FAOa', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: 0.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.ac0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'A6FAOa', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: 0.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.ac0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'A6FAOa', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.2.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'A6FAOa', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'A6FAOa', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.eb0000.1.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'A6FAOa', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Bulz.349164.25568.exe PID: 6776, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeRDTSC instruction interceptor: First address: 00000000004085E4 second address: 00000000004085EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeRDTSC instruction interceptor: First address: 000000000040896E second address: 0000000000408974 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_004088A0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe TID: 6780Thread sleep time: -99739s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe TID: 6828Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeThread delayed: delay time: 99739
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeThread delayed: delay time: 922337203685477
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: SecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_004088A0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01999860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A149A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A149A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A149A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A149A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984190 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195519E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195519E mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A2F1B5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A2F1B5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198C9BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198C9BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019799BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1A189 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1A189 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019661A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019661A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019661A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019661A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A289E7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019699C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019699C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019699C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019699C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196C1C0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019531E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019E41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A119D8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01959100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01959100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01959100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01960100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01960100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01960100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01953138 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01974120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01974120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01974120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01974120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01974120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1E962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A28966 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195395E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195395E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11951 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01959080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01953880 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01953880 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019990AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628AE mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019878A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019578D6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019578D6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019578D6 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019EB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019570C0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019570C0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A118CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019628FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019540E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019540E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019540E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019558EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01956800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01956800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01956800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A24015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A24015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984020 mov edi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01957057 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01970050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01970050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A21074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11843 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197F86D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01954B94 mov edi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A25BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11BA8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197EB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197EB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A28BB6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019FEB8A mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019FEB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019FEB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019FEB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01961B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01961B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A29BBE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A0D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A023E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A023E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A023E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019853C5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01951BE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A28B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019E6365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019E6365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019E6365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198DA88 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198DA88 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019812BD mov esi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019812BD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019812BD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01951AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019662A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019662A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019662A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019662A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01985AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01985AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1129A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019512D4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01953ACA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A28ADD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01955210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01973A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01968A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01958239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01958239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01958239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01994A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01994A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01954A20 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01954A20 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A0B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A0B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A28A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019E4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01959240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01959240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01959240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01959240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0199927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01995A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01995A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01995A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11A5F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01953591 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A205AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A205AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01982581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01952D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01952D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01952D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01952D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01952D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1B581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1B581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1B581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1B581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A12D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01981DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01981DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01981DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019865A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019865A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019865A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019835A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A08DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019515C1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019595F0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019595F0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A0FDD3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019895EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195751A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195751A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195751A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195751A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A28D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A1E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019FCD04 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01963D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01984D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019DA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A13518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A13518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A13518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01977D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01994D51 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01994D51 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195354C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195354C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01993D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0197C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A03D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01978D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01978D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01978D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01978D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01978D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A08D47 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195649B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0195649B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A29CB3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01951480 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01954CB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198D4B0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019E64B5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019E64B5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A14496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01952CDB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0198CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A114FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A28CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019884E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019884E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019884E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019884E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019884E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019884E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_019D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_0196B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01983C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeCode function: 3_2_01A11C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeMemory allocated: page read and write | page guard
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Masquerading1OS Credential DumpingSecurity Software Discovery221Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSSystem Information Discovery112Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information11LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Variant.Bulz.349164.25568.exe46%VirustotalBrowse
          SecuriteInfo.com.Variant.Bulz.349164.25568.exe35%ReversingLabsWin32.Trojan.Wacatac
          SecuriteInfo.com.Variant.Bulz.349164.25568.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          3.0.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          3.2.SecuriteInfo.com.Variant.Bulz.349164.25568.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          www.rep.place/pba2/2%VirustotalBrowse
          www.rep.place/pba2/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          www.rep.place/pba2/true
          • 2%, Virustotal, Browse
          • Avira URL Cloud: safe
          low

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664163112.0000000002EE1000.00000004.00000001.sdmpfalse
            high
            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssSecuriteInfo.com.Variant.Bulz.349164.25568.exe, 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmpfalse
              high

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:433042
              Start date:11.06.2021
              Start time:08:06:38
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 31s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:SecuriteInfo.com.Variant.Bulz.349164.25568.5993 (renamed file extension from 5993 to exe)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:21
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@3/1@0/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 6.6% (good quality ratio 6.1%)
              • Quality average: 74.4%
              • Quality standard deviation: 30.5%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, UsoClient.exe, wuapihost.exe

              Simulations

              Behavior and APIs

              TimeTypeDescription
              08:07:32API Interceptor1x Sleep call for process: SecuriteInfo.com.Variant.Bulz.349164.25568.exe modified

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Bulz.349164.25568.exe.log
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1314
              Entropy (8bit):5.350128552078965
              Encrypted:false
              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
              Malicious:true
              Reputation:high, very likely benign file
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.40623038199471
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Win16/32 Executable Delphi generic (2074/23) 0.01%
              File name:SecuriteInfo.com.Variant.Bulz.349164.25568.exe
              File size:1011200
              MD5:c66fe399ec0cb598b2167a348c17f6a2
              SHA1:fcc9984283b3596fb575523fb90eb80ce702abe2
              SHA256:57f599e4ae63304de5795909f694122665f7c492df8078f7c5abb084d09baa2d
              SHA512:59993980767c12bb6e536a0ba4ab60b5ea54987a3893fd4044b1078d4f7014304e6e2c147488a138f57342eaba1bca5ec8842753b5bd3ab48360d8b9458598d8
              SSDEEP:24576:6tN220KdM+lT+hwWVAQSW3+0NeBUdtX1q:yDRl0V9N3JwBUE
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z..`.....................V.......2... ...@....@.. ....................................@................................

              File Icon

              Icon Hash:c4c4c4c8ccd4d0c4

              Static PE Info

              General

              Entrypoint:0x4c328e
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x60C2AA7A [Fri Jun 11 00:12:42 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v4.0.30319
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xc32400x4b.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x35134.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xfc0000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0xc31e10x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xc12940xc1400False0.897193109234data7.85673320535IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .sdata0xc40000x1e80x200False0.861328125data6.62325644136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0xc60000x351340x35200False0.210225183824data4.44239053634IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xfc0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0xc64900x668data
              RT_ICON0xc6af80x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 4294965391, next used block 7403512
              RT_ICON0xc6de00x1e8data
              RT_ICON0xc6fc80x128GLS_BINARY_LSB_FIRST
              RT_ICON0xc70f00x35e0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
              RT_ICON0xca6d00xea8data
              RT_ICON0xcb5780x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0
              RT_ICON0xcbe200x6c8data
              RT_ICON0xcc4e80x568GLS_BINARY_LSB_FIRST
              RT_ICON0xcca500x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
              RT_ICON0xdd2780x94a8data
              RT_ICON0xe67200x67e8data
              RT_ICON0xecf080x5488data
              RT_ICON0xf23900x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 2130706432
              RT_ICON0xf65b80x25a8data
              RT_ICON0xf8b600x10a8data
              RT_ICON0xf9c080x988data
              RT_ICON0xfa5900x468GLS_BINARY_LSB_FIRST
              RT_GROUP_ICON0xfa9f80x102data
              RT_GROUP_ICON0xfaafc0x84data
              RT_VERSION0xfab800x3c8data
              RT_MANIFEST0xfaf480x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightPaul Harris 2016
              Assembly Version251.2.0.0
              InternalNameIsolatedStorageSecurityOptions.exe
              FileVersion251.2.0.0
              CompanyNamePaul Harris
              LegalTrademarks
              Comments1992 Alpine A 610
              ProductNameReloadManager
              ProductVersion251.2.0.0
              FileDescriptionReloadManager
              OriginalFilenameIsolatedStorageSecurityOptions.exe

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:08:07:30
              Start date:11/06/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe'
              Imagebase:0xac0000
              File size:1011200 bytes
              MD5 hash:C66FE399EC0CB598B2167A348C17F6A2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.664811462.0000000003EE9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.664247776.0000000002F1F000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              General

              Start time:08:07:34
              Start date:11/06/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.349164.25568.exe
              Imagebase:0xeb0000
              File size:1011200 bytes
              MD5 hash:C66FE399EC0CB598B2167A348C17F6A2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.662601270.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.664522711.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >