Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Variant.Bulz.495766.21629.30464

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Bulz.495766.21629.30464 (renamed file extension from 30464 to exe)
Analysis ID:433461
MD5:755aff3a424238b026f8d547783ecbd8
SHA1:d3c73271b3751043cdeb732e4c473fe462fbcd24
SHA256:41cba03f4c6ce7e24b6f2d9f146a8cb82e9a43236859e82f14b225c2232adc5b
Tags:exe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • SecuriteInfo.com.Variant.Bulz.495766.21629.exe (PID: 5760 cmdline: 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe' MD5: 755AFF3A424238B026F8D547783ECBD8)
    • MSBuild.exe (PID: 6036 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "Graceboy123@vivaldi.net", "Password": "4Lmm4pew4Z3EVCn", "Host": "smtp.vivaldi.net"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.0.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.0.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      Networking:

                      barindex
                      Sigma detected: MSBuild connects to smtp portShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 31.209.137.12, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 6036, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49743

                      System Summary:

                      barindex
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ParentCommandLine: 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe' , ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe, ParentProcessId: 5760, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 6036

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 2.0.MSBuild.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "Graceboy123@vivaldi.net", "Password": "4Lmm4pew4Z3EVCn", "Host": "smtp.vivaldi.net"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeVirustotal: Detection: 37%Perma Link
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeReversingLabs: Detection: 30%
                      Source: 2.0.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\alpHSWIRpA\src\obj\Debug\LockCookie.pdb source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\alpHSWIRpA\src\obj\Debug\LockCookie.pdb(c source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe

                      Networking:

                      barindex
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 31.209.137.12:587
                      Source: Joe Sandbox ViewIP Address: 31.209.137.12 31.209.137.12
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 31.209.137.12:587
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownDNS traffic detected: queries for: smtp.vivaldi.net
                      Source: MSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: MSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: MSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: http://XkSLco.com
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211190070.0000000003141000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://smtp.vivaldi.net
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.213272834.0000000006680000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comm
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000003.200243346.0000000006693000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnn
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000003.202971106.00000000066B9000.00000004.00000001.sdmp, SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeString found in binary or memory: http://www.google.com
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000003.203722944.00000000066B9000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.w
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: MSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: MSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%h
                      Source: MSBuild.exe, 00000002.00000002.468955537.0000000002EB5000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.469422139.0000000002F3E000.00000004.00000001.sdmpString found in binary or memory: https://ntXEiMB2Wl.net
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: MSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 2.0.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bABCC7686u002d42EAu002d49CEu002d967Eu002dC66648BE0313u007d/u0032334AB87u002dAF54u002d440Bu002d8DB9u002d5512AE4216F6.csLarge array initialization: .cctor: array initializer size 11959
                      Source: 2.2.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bABCC7686u002d42EAu002d49CEu002d967Eu002dC66648BE0313u007d/u0032334AB87u002dAF54u002d440Bu002d8DB9u002d5512AE4216F6.csLarge array initialization: .cctor: array initializer size 11959
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0310C2B0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_031099A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786B688
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786C0D1
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786CF10
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786AE28
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_07867CB0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_07867700
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_078676F1
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786F468
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_07860281
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_07860290
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786A1B0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786F1C0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_07860007
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_07860040
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786BF19
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786AE17
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_0786DDB8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_064967F9
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_06496808
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_00C72050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00CC481A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00CCA598
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00CC8D00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00CCF2F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00EE46A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00EE45B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00EED260
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC9378
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCA418
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC0040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC003C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC5740
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC573B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC4A10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCEB18
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC6D10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01155700
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0115BA18
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_011569B0
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.209922320.0000000000DC8000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLockCookie.exe6 vs SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.216361890.00000000084F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKygo.dll* vs SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBzKeZYkVrZOlbcFoquvemoWnfnzgWf.exe4 vs SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.215912050.0000000008130000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeBinary or memory string: OriginalFilenameLockCookie.exe6 vs SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 2.0.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.0.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@3/1@1/1
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Bulz.495766.21629.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeVirustotal: Detection: 37%
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeReversingLabs: Detection: 30%
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe:Zone.IdentifierJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe'
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic file information: File size 1559552 > 1048576
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x154400
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\alpHSWIRpA\src\obj\Debug\LockCookie.pdb source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\alpHSWIRpA\src\obj\Debug\LockCookie.pdb(c source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeCode function: 0_2_00C773C3 push 0000006Fh; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00CC93E8 pushfd ; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC9FE0 push E000CB47h; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCD04B push 68E800CBh; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB2F0 push ebp; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB2A0 push ebp; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC329F push es; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC329B push es; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC3251 push es; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC3247 push es; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB3E8 push esi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB338 push ebp; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB331 push esi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB4A0 push esi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB498 push esi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB5E8 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB5E0 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC65C8 pushad ; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB598 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB541 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC66B8 pushfd ; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB688 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB638 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB630 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FC6610 push esp; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB778 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB771 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB721 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB868 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB861 push edi; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FCB818 push edi; retf
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.40188775709
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Bulz.495766.21629.exe PID: 5760, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 240000
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239875
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239750
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239641
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239531
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239406
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239297
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239188
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239047
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238938
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238828
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238719
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238610
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238453
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238344
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238235
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238094
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237985
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237844
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237703
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237594
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237485
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237344
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237235
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237094
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236953
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236844
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236703
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236594
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236469
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236344
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236203
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236094
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235985
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235860
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235703
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235594
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235485
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235344
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235219
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235094
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 234985
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 234844
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 234703
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeWindow / User API: threadDelayed 6606
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeWindow / User API: threadDelayed 560
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2117
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 7743
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -6456360425798339s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -240000s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -239875s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -239750s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -239641s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -239531s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -239406s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -239297s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -239188s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -239047s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -238938s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -238828s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -238719s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -238610s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -238453s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -238344s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -238235s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -238094s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -237985s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -237844s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -237703s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -237594s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -237485s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -237344s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -237235s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -237094s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -236953s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -236844s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -236703s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -236594s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -236469s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -236344s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -236203s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 5556Thread sleep time: -103054s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -236094s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -235985s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -235860s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -235703s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -235594s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -235485s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -235344s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -235219s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -235094s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -234985s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -234844s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 160Thread sleep time: -234703s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe TID: 3396Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4912Thread sleep time: -11990383647911201s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4928Thread sleep count: 2117 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4928Thread sleep count: 7743 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 240000
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239875
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239750
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239641
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239531
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239406
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239297
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239188
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 239047
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238938
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238828
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238719
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238610
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238453
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238344
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238235
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 238094
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237985
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237844
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237703
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237594
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237485
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237344
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237235
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 237094
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236953
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236844
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236703
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236594
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236469
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236344
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236203
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 103054
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 236094
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235985
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235860
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235703
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235594
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235485
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235344
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235219
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 235094
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 234985
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 234844
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 234703
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: MSBuild.exe, 00000002.00000002.472066088.0000000005C10000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: MSBuild.exe, 00000002.00000002.472066088.0000000005C10000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: MSBuild.exe, 00000002.00000002.472066088.0000000005C10000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: MSBuild.exe, 00000002.00000002.472272962.0000000005D08000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: MSBuild.exe, 00000002.00000002.472066088.0000000005C10000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00CC84C0 LdrInitializeThunk,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 438000
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43A000
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 94C008
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: MSBuild.exe, 00000002.00000002.466828073.0000000001500000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: MSBuild.exe, 00000002.00000002.466828073.0000000001500000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: MSBuild.exe, 00000002.00000002.466828073.0000000001500000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: MSBuild.exe, 00000002.00000002.466828073.0000000001500000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.463542809.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.463542809.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Bulz.495766.21629.exe PID: 5760, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6036, type: MEMORY
                      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6036, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.463542809.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.463542809.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Bulz.495766.21629.exe PID: 5760, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6036, type: MEMORY
                      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.495766.21629.exe.41f3898.1.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection212Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Credentials in Registry1Security Software Discovery211Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Variant.Bulz.495766.21629.exe38%VirustotalBrowse
                      SecuriteInfo.com.Variant.Bulz.495766.21629.exe30%ReversingLabsWin32.Trojan.AgentTesla

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.0.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      2.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://api.ipify.org%h0%Avira URL Cloudsafe
                      http://XkSLco.com0%Avira URL Cloudsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://r3.i.lencr.org/00%URL Reputationsafe
                      http://r3.i.lencr.org/00%URL Reputationsafe
                      http://r3.i.lencr.org/00%URL Reputationsafe
                      http://r3.i.lencr.org/00%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.monotype.w0%Avira URL Cloudsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.founder.com.cn/cnn0%URL Reputationsafe
                      http://www.founder.com.cn/cnn0%URL Reputationsafe
                      http://www.founder.com.cn/cnn0%URL Reputationsafe
                      http://www.founder.com.cn/cnn0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      https://ntXEiMB2Wl.net0%Avira URL Cloudsafe
                      http://www.fontbureau.comm0%URL Reputationsafe
                      http://www.fontbureau.comm0%URL Reputationsafe
                      http://www.fontbureau.comm0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      smtp.vivaldi.net
                      31.209.137.12
                      truefalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                          high
                          http://www.fontbureau.comSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                              high
                              http://DynDns.comDynDNSMSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/?SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://cps.letsencrypt.org0MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers?SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                  high
                                  https://api.ipify.org%hMSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://XkSLco.comMSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.tiro.comSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://smtp.vivaldi.netMSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designersSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.goodfont.co.krSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.carterandcone.comlSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://r3.i.lencr.org/0MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.monotype.wSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000003.203722944.00000000066B9000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.typography.netDSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnnSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000003.200243346.0000000006693000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000003.202971106.00000000066B9000.00000004.00000001.sdmp, SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                            high
                                            http://x1.c.lencr.org/0MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://x1.i.lencr.org/0MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://ntXEiMB2Wl.netMSBuild.exe, 00000002.00000002.468955537.0000000002EB5000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.469422139.0000000002F3E000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.commSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.213272834.0000000006680000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://r3.o.lencr.org0MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8SecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                              high
                                              https://api.ipify.org%GETMozilla/5.0MSBuild.exe, 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              low
                                              http://www.fonts.comSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.sandoll.co.krSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleaseSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cnSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211190070.0000000003141000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.sakkal.comSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.214654547.0000000007892000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSecuriteInfo.com.Variant.Bulz.495766.21629.exe, 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://cps.root-x1.letsencrypt.org0MSBuild.exe, 00000002.00000002.469288125.0000000002F12000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown

                                                  Contacted IPs

                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs

                                                  Public

                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  31.209.137.12
                                                  smtp.vivaldi.netIceland
                                                  51896HRINGDU-ASISfalse

                                                  General Information

                                                  Joe Sandbox Version:32.0.0 Black Diamond
                                                  Analysis ID:433461
                                                  Start date:11.06.2021
                                                  Start time:22:38:25
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 8m 24s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:light
                                                  Sample file name:SecuriteInfo.com.Variant.Bulz.495766.21629.30464 (renamed file extension from 30464 to exe)
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:23
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.spre.troj.spyw.evad.winEXE@3/1@1/1
                                                  EGA Information:Failed
                                                  HDC Information:Failed
                                                  HCA Information:
                                                  • Successful, ratio: 99%
                                                  • Number of executed functions: 0
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Adjust boot time
                                                  • Enable AMSI
                                                  Warnings:
                                                  Show All
                                                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                  • TCP Packets have been reduced to 100
                                                  • Excluded IPs from analysis (whitelisted): 40.88.32.150, 204.79.197.200, 13.107.21.200, 104.43.139.144, 20.49.157.6, 184.30.20.56, 20.54.26.129, 20.82.210.154, 92.122.213.194, 92.122.213.247
                                                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                                  Simulations

                                                  Behavior and APIs

                                                  TimeTypeDescription
                                                  22:40:01API Interceptor45x Sleep call for process: SecuriteInfo.com.Variant.Bulz.495766.21629.exe modified
                                                  22:40:17API Interceptor788x Sleep call for process: MSBuild.exe modified

                                                  Joe Sandbox View / Context

                                                  IPs

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  31.209.137.12COMMERCIAL INVOICE.exeGet hashmaliciousBrowse
                                                    Scan 07.07.2021# 99147.exeGet hashmaliciousBrowse
                                                      Quotes 04.06.2021.exeGet hashmaliciousBrowse
                                                        Quotes 07.06.2021.exeGet hashmaliciousBrowse
                                                          Proforma Invoice.pdf.exeGet hashmaliciousBrowse
                                                            PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                              Scan 03.06.2021.exeGet hashmaliciousBrowse
                                                                PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                                  PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                                    Scan 31.05.2021.exeGet hashmaliciousBrowse
                                                                      PAYMENT FOR MS FOB 4-25.exeGet hashmaliciousBrowse
                                                                        11,000euro.exeGet hashmaliciousBrowse
                                                                          PURCHASE ORDER..exeGet hashmaliciousBrowse
                                                                            PO2000254..exeGet hashmaliciousBrowse
                                                                              BL Draft and Packing List.exeGet hashmaliciousBrowse
                                                                                Purchase order.exeGet hashmaliciousBrowse
                                                                                  Y0wdyuqBy1mI2Y0.exeGet hashmaliciousBrowse
                                                                                    Items specifications.exeGet hashmaliciousBrowse
                                                                                      SOA.exeGet hashmaliciousBrowse
                                                                                        orders list.exeGet hashmaliciousBrowse

                                                                                          Domains

                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                          smtp.vivaldi.netCOMMERCIAL INVOICE.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Scan 07.07.2021# 99147.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Quotes 04.06.2021.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Quotes 07.06.2021.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Proforma Invoice.pdf.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Scan 03.06.2021.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Scan 31.05.2021.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PAYMENT FOR MS FOB 4-25.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          11,000euro.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PURCHASE ORDER..exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PO2000254..exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          BL Draft and Packing List.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Purchase order.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Y0wdyuqBy1mI2Y0.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Items specifications.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          SOA.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          orders list.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12

                                                                                          ASN

                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                          HRINGDU-ASISCOMMERCIAL INVOICE.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Scan 07.07.2021# 99147.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Quotes 04.06.2021.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Quotes 07.06.2021.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Proforma Invoice.pdf.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Scan 03.06.2021.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PAYMENT FOR MS FOB 3-2027.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Scan 31.05.2021.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PAYMENT FOR MS FOB 4-25.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          11,000euro.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PURCHASE ORDER..exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          PO2000254..exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          BL Draft and Packing List.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Purchase order.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Y0wdyuqBy1mI2Y0.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          Items specifications.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          SOA.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12
                                                                                          orders list.exeGet hashmaliciousBrowse
                                                                                          • 31.209.137.12

                                                                                          JA3 Fingerprints

                                                                                          No context

                                                                                          Dropped Files

                                                                                          No context

                                                                                          Created / dropped Files

                                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Bulz.495766.21629.exe.log
                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):1400
                                                                                          Entropy (8bit):5.344635889251176
                                                                                          Encrypted:false
                                                                                          SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEg:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHV
                                                                                          MD5:394E646B019FF472CE37EE76A647A27F
                                                                                          SHA1:BD5872D88EE9CD2299B5F0E462C53D9E7040D6DA
                                                                                          SHA-256:2295A0B1F6ACD75FB5D038ADE65725EDF3DDF076107AEA93E4A864E35974AE2A
                                                                                          SHA-512:7E95510C85262998AECC9A06A73A5BF6352304AF6EE143EC7E48A17473773F33A96A2F4146446444789B8BCC9B83372A227DC89C3D326A2E142BCA1E1A9B4809
                                                                                          Malicious:true
                                                                                          Reputation:moderate, very likely benign file
                                                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                                                                          Static File Info

                                                                                          General

                                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Entropy (8bit):7.312014372881712
                                                                                          TrID:
                                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                                          File name:SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                                                                                          File size:1559552
                                                                                          MD5:755aff3a424238b026f8d547783ecbd8
                                                                                          SHA1:d3c73271b3751043cdeb732e4c473fe462fbcd24
                                                                                          SHA256:41cba03f4c6ce7e24b6f2d9f146a8cb82e9a43236859e82f14b225c2232adc5b
                                                                                          SHA512:12b6e09d9c23b459e1d4ba9955a746be2e8ca6a9f905986522416551fd90e6b906126ffa1e3695ec525204e3e7dd8ae034acb01d7704b13f3c588783c9d79710
                                                                                          SSDEEP:24576:OzSYNeBUdtwsEgwsHe/z8YEoqSg5LlJfH6zMIDsxTt8T2i9PGMbto2/siDUeuc/T:dYwBUwsEgwsHe5U/BldOSe+0eosic4YC
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..`..............P..D..........Rc... ........@.. .......................@............@................................

                                                                                          File Icon

                                                                                          Icon Hash:e0c6a169f4bed870

                                                                                          Static PE Info

                                                                                          General

                                                                                          Entrypoint:0x556352
                                                                                          Entrypoint Section:.text
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x400000
                                                                                          Subsystem:windows gui
                                                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                          Time Stamp:0x60C31E4C [Fri Jun 11 08:26:52 2021 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:v4.0.30319
                                                                                          OS Version Major:4
                                                                                          OS Version Minor:0
                                                                                          File Version Major:4
                                                                                          File Version Minor:0
                                                                                          Subsystem Version Major:4
                                                                                          Subsystem Version Minor:0
                                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                          Entrypoint Preview

                                                                                          Instruction
                                                                                          jmp dword ptr [00402000h]
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al

                                                                                          Data Directories

                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1563000x4f.text
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1580000x28344.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1820000xc.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x1561c80x1c.text
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                          Sections

                                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          .text0x20000x1543580x154400False0.700508156916data7.40188775709IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                          .rsrc0x1580000x283440x28400False0.599773146351data6.35187960045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .reloc0x1820000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                          Resources

                                                                                          NameRVASizeTypeLanguageCountry
                                                                                          RT_ICON0x1581a00x468GLS_BINARY_LSB_FIRST
                                                                                          RT_ICON0x1586180x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                                                                          RT_ICON0x1596d00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                                          RT_ICON0x15bc880x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                                                                          RT_ICON0x15fec00x10828dBase III DBT, version number 0, next free block index 40
                                                                                          RT_ICON0x1706f80xf255PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                          RT_GROUP_ICON0x17f9600x5adata
                                                                                          RT_VERSION0x17f9cc0x386data
                                                                                          RT_MANIFEST0x17fd640x5daXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                          Imports

                                                                                          DLLImport
                                                                                          mscoree.dll_CorExeMain

                                                                                          Version Infos

                                                                                          DescriptionData
                                                                                          Translation0x0000 0x04b0
                                                                                          LegalCopyrightCopyright 2015 Benz
                                                                                          Assembly Version1.6.0.65
                                                                                          InternalNameLockCookie.exe
                                                                                          FileVersion1.6.0.65
                                                                                          CompanyNameTown and Country Convenience Stores
                                                                                          LegalTrademarks
                                                                                          Comments
                                                                                          ProductNameCDWorkFlow
                                                                                          ProductVersion1.6.0.65
                                                                                          FileDescriptionCDWorkFlow
                                                                                          OriginalFilenameLockCookie.exe

                                                                                          Network Behavior

                                                                                          Network Port Distribution

                                                                                          TCP Packets

                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Jun 11, 2021 22:39:06.265878916 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.277220011 CEST49697443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.303915024 CEST49700443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.304405928 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.321443081 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.322617054 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.323179007 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.323216915 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.323338985 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.323386908 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.324944019 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.325073004 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.330882072 CEST4434969792.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.334189892 CEST4434969792.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.334244013 CEST4434969792.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.334283113 CEST4434969792.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.334319115 CEST4434969792.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.334364891 CEST4434969792.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.334387064 CEST49697443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.334435940 CEST49697443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.334444046 CEST49697443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.334448099 CEST49697443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.334453106 CEST49697443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.340457916 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.358108997 CEST4434970092.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.359081030 CEST4434970092.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.359152079 CEST4434970092.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.359189987 CEST4434970092.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.359219074 CEST4434970092.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.359216928 CEST49700443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.359267950 CEST49700443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.359276056 CEST49700443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.359281063 CEST49700443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.361131907 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.361818075 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.361859083 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.361896038 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.361916065 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.361934900 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.361947060 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.361953020 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.364557028 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.364623070 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.364646912 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.378262043 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.382041931 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.382098913 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.382139921 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.382149935 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.382164001 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.382191896 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.382209063 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.382231951 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.382253885 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.382282972 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.382289886 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.382347107 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.384634018 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.384708881 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.397409916 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.397866964 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.397913933 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.398026943 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.398073912 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.855281115 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.867005110 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.889128923 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.893404007 CEST49700443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.912456989 CEST49697443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.912870884 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.912921906 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.912995100 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.913045883 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.913933992 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.913985014 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.914016962 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.914037943 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.914185047 CEST49698443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.916258097 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.916300058 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.916405916 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.918585062 CEST4434970292.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.918768883 CEST49702443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.924046993 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.924483061 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.924525976 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.924575090 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.924619913 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.926600933 CEST4434969992.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.926736116 CEST49699443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.946232080 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.946636915 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.946682930 CEST4434969692.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.946738005 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.946775913 CEST49696443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.947607040 CEST4434970092.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.948251009 CEST4434970092.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.948291063 CEST4434970092.122.145.220192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.948328018 CEST49700443192.168.2.392.122.145.220
                                                                                          Jun 11, 2021 22:39:06.948368073 CEST49700443192.168.2.392.122.145.220

                                                                                          UDP Packets

                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Jun 11, 2021 22:39:05.731982946 CEST5754453192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:05.782258987 CEST53575448.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:05.893630981 CEST5598453192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:05.952163935 CEST53559848.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:06.634912014 CEST6418553192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:06.685136080 CEST53641858.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:07.827167988 CEST6511053192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:07.880311012 CEST53651108.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:08.739110947 CEST5836153192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:08.789448977 CEST53583618.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:09.805201054 CEST6349253192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:09.858577967 CEST53634928.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:10.771236897 CEST6083153192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:10.824378014 CEST53608318.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:11.664033890 CEST6010053192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:11.720141888 CEST53601008.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:12.610152006 CEST5319553192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:12.660428047 CEST53531958.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:13.526396990 CEST5014153192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:13.577056885 CEST53501418.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:14.422760963 CEST5302353192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:14.473393917 CEST53530238.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:15.320560932 CEST4956353192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:15.371273041 CEST53495638.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:16.249819040 CEST5135253192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:16.302109003 CEST53513528.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:17.213639975 CEST5934953192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:17.265398979 CEST53593498.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:18.048686028 CEST5708453192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:18.100938082 CEST53570848.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:18.947227001 CEST5882353192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:18.998800993 CEST53588238.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:19.720165968 CEST5756853192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:19.770487070 CEST53575688.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:20.510678053 CEST5054053192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:20.563721895 CEST53505408.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:21.316565037 CEST5436653192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:21.367058992 CEST53543668.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:37.668231010 CEST5303453192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:37.732057095 CEST53530348.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:45.046896935 CEST5776253192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:45.121165991 CEST53577628.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:39:52.277676105 CEST5543553192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:39:52.344403028 CEST53554358.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:40:14.034076929 CEST5071353192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:40:14.101481915 CEST53507138.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:40:20.769404888 CEST5613253192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:40:20.830141068 CEST53561328.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:40:52.005362034 CEST5898753192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:40:52.066768885 CEST53589878.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:40:53.651407957 CEST5657953192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:40:53.717915058 CEST53565798.8.8.8192.168.2.3
                                                                                          Jun 11, 2021 22:40:57.994457006 CEST6063353192.168.2.38.8.8.8
                                                                                          Jun 11, 2021 22:40:58.056253910 CEST53606338.8.8.8192.168.2.3

                                                                                          DNS Queries

                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                          Jun 11, 2021 22:40:57.994457006 CEST192.168.2.38.8.8.80x45f6Standard query (0)smtp.vivaldi.netA (IP address)IN (0x0001)

                                                                                          DNS Answers

                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                          Jun 11, 2021 22:40:58.056253910 CEST8.8.8.8192.168.2.30x45f6No error (0)smtp.vivaldi.net31.209.137.12A (IP address)IN (0x0001)

                                                                                          SMTP Packets

                                                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                                                          Jun 11, 2021 22:40:58.887758017 CEST5874974331.209.137.12192.168.2.3220 smtp.vivaldi.net ESMTP Postfix (Ubuntu)
                                                                                          Jun 11, 2021 22:40:58.888362885 CEST49743587192.168.2.331.209.137.12EHLO 045012
                                                                                          Jun 11, 2021 22:40:58.977018118 CEST5874974331.209.137.12192.168.2.3250-smtp.vivaldi.net
                                                                                          250-PIPELINING
                                                                                          250-SIZE 36700160
                                                                                          250-ETRN
                                                                                          250-STARTTLS
                                                                                          250-ENHANCEDSTATUSCODES
                                                                                          250-8BITMIME
                                                                                          250-DSN
                                                                                          250 SMTPUTF8
                                                                                          Jun 11, 2021 22:40:58.977689981 CEST49743587192.168.2.331.209.137.12STARTTLS
                                                                                          Jun 11, 2021 22:40:59.066626072 CEST5874974331.209.137.12192.168.2.3220 2.0.0 Ready to start TLS

                                                                                          Code Manipulations

                                                                                          Statistics

                                                                                          Behavior

                                                                                          Click to jump to process

                                                                                          System Behavior

                                                                                          General

                                                                                          Start time:22:39:59
                                                                                          Start date:11/06/2021
                                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.495766.21629.exe'
                                                                                          Imagebase:0xc70000
                                                                                          File size:1559552 bytes
                                                                                          MD5 hash:755AFF3A424238B026F8D547783ECBD8
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:.Net C# or VB.NET
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.211514974.0000000004141000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.211263032.0000000003190000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          Reputation:low

                                                                                          General

                                                                                          Start time:22:40:06
                                                                                          Start date:11/06/2021
                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                          Imagebase:0x770000
                                                                                          File size:261728 bytes
                                                                                          MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:.Net C# or VB.NET
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.467134618.0000000002C51000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.208728671.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.463542809.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.463542809.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          Reputation:moderate

                                                                                          Disassembly

                                                                                          Code Analysis

                                                                                          Reset < >