Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Variant.Bulz.785643.17886.29229

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Bulz.785643.17886.29229 (renamed file extension from 29229 to exe)
Analysis ID:552971
MD5:83ac585e99b527eeb278702f8f711568
SHA1:a576a927b067c94cdbc1e7b353f60577f5b310f9
SHA256:9e2502b3945f31482623e8e61dcb85b9ebb7d9a4244d9074fa289596c9da513e
Tags:exe
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.topeasyip.company/i5nb/"], "decoy": ["integratedheartspsychology.com", "tappsis.land", "norfg.com", "1531700.win", "oneplusoneexperience.com", "circlessalaries.com", "tlcremodelingcompany.com", "susalud.info", "liyanghua.club", "pink-zemi.com", "orphe.biz", "themodelclarified.com", "candidate.tools", "morotrip.com", "d2dfms.com", "leisuresabah.com", "bjbwx114.com", "lz-fcaini1718-hw0917-bs.xyz", "at-commerce-co.net", "buymypolicy.net", "5151vip73.com", "rentglide.com", "louiecruzbeltran.info", "lanabasargina.com", "lakeforestparkapartments.com", "guangkaiyinwu.com", "bornthin.com", "restaurantkitchenbuilders.com", "ecommerceoptimise.com", "datahk99.com", "markfwalker.com", "granitowawarszawa.com", "theyouthwave.com", "iabg.xyz", "jholbrook.com", "bsc.promo", "xn--grlitzerseebhne-8sb7i.com", "cafeteriasula.com", "plushcrispies.com", "dedicatedvirtualassistance.com", "ventura-taxi.com", "thoethertb434-ocn.xyz", "ylhwcl.com", "bigsyncmusic.biz", "terapiaholisticaemformacao.com", "comidies.com", "171diproad.com", "07dgj.xyz", "vppaintllc.com", "thepatriottutor.com", "wxfive.com", "ceinpsico.com", "tuningelement.store", "asinment.com", "diafraz.xyz", "8crhnwh658ga.biz", "redwolf-tech.com", "ksherfan.com", "sensationalshroom.com", "buy-instagram-followers.net", "treeserviceconsulting.com", "vnln.space", "kate-films.com", "selfmeta.club"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac6a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16ae9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bfc:$sqlite3step: 68 34 1C 7B E1
    • 0x16b18:$sqlite3text: 68 38 2A 90 C5
    • 0x16c3d:$sqlite3text: 68 38 2A 90 C5
    • 0x16b2b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c53:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.302962488.00000000033D3000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 10 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.33c02a4.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1ac6a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
            • 0x16ae9:$sqlite3step: 68 34 1C 7B E1
            • 0x16bfc:$sqlite3step: 68 34 1C 7B E1
            • 0x16b18:$sqlite3text: 68 38 2A 90 C5
            • 0x16c3d:$sqlite3text: 68 38 2A 90 C5
            • 0x16b2b:$sqlite3blob: 68 53 D8 7F 8C
            • 0x16c53:$sqlite3blob: 68 53 D8 7F 8C
            12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
              Click to see the 24 entries

              Sigma Overview

              No Sigma rule has matched

              Jbx Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.topeasyip.company/i5nb/"], "decoy": ["integratedheartspsychology.com", "tappsis.land", "norfg.com", "1531700.win", "oneplusoneexperience.com", "circlessalaries.com", "tlcremodelingcompany.com", "susalud.info", "liyanghua.club", "pink-zemi.com", "orphe.biz", "themodelclarified.com", "candidate.tools", "morotrip.com", "d2dfms.com", "leisuresabah.com", "bjbwx114.com", "lz-fcaini1718-hw0917-bs.xyz", "at-commerce-co.net", "buymypolicy.net", "5151vip73.com", "rentglide.com", "louiecruzbeltran.info", "lanabasargina.com", "lakeforestparkapartments.com", "guangkaiyinwu.com", "bornthin.com", "restaurantkitchenbuilders.com", "ecommerceoptimise.com", "datahk99.com", "markfwalker.com", "granitowawarszawa.com", "theyouthwave.com", "iabg.xyz", "jholbrook.com", "bsc.promo", "xn--grlitzerseebhne-8sb7i.com", "cafeteriasula.com", "plushcrispies.com", "dedicatedvirtualassistance.com", "ventura-taxi.com", "thoethertb434-ocn.xyz", "ylhwcl.com", "bigsyncmusic.biz", "terapiaholisticaemformacao.com", "comidies.com", "171diproad.com", "07dgj.xyz", "vppaintllc.com", "thepatriottutor.com", "wxfive.com", "ceinpsico.com", "tuningelement.store", "asinment.com", "diafraz.xyz", "8crhnwh658ga.biz", "redwolf-tech.com", "ksherfan.com", "sensationalshroom.com", "buy-instagram-followers.net", "treeserviceconsulting.com", "vnln.space", "kate-films.com", "selfmeta.club"]}
              Multi AV Scanner detection for submitted fileShow sources
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeVirustotal: Detection: 43%Perma Link
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeReversingLabs: Detection: 43%
              Yara detected FormBookShow sources
              Source: Yara matchFile source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.45332e0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.44dc2c0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, type: MEMORY
              Antivirus / Scanner detection for submitted sampleShow sources
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeAvira: detected
              Antivirus detection for URL or domainShow sources
              Source: www.topeasyip.company/i5nb/Avira URL Cloud: Label: malware
              Machine Learning detection for sampleShow sources
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeJoe Sandbox ML: detected
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302747431.0000000001A9F000.00000040.00000001.sdmp, SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302556621.0000000001980000.00000040.00000001.sdmp
              Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302747431.0000000001A9F000.00000040.00000001.sdmp, SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302556621.0000000001980000.00000040.00000001.sdmp
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 4x nop then pop esi
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 4x nop then pop edi

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: www.topeasyip.company/i5nb/
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302319122.00000000014EB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              E-Banking Fraud:

              barindex
              Yara detected FormBookShow sources
              Source: Yara matchFile source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.45332e0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.44dc2c0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, type: MEMORY

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.45332e0.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.45332e0.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.44dc2c0.4.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.44dc2c0.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
              Source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.45332e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.45332e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.44dc2c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.44dc2c0.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
              Source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 0_2_014D8122
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 0_2_014D6A08
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 0_2_014D6D2E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 0_2_014D7E10
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 0_2_014D6D72
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 0_2_014D7271
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00401030
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041C95A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041C96E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041D128
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041C38D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041BB9E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00408C90
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00402D8A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00402D90
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041BF8B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00402FB0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BC1C0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4120
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB090
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A720A8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D20A0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A660F5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D701D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A61002
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D138B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A523E3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A603DA
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6231B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C3360
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A722AE
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A732A9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AC2C3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6E2C5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB236
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D2581
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D65A0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A725DD
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BD5E0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B841F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C2430
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6D466
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A667E2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6D616
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9660
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C2990
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B1915
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AF900
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A728EC
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: String function: 019AB150 appears 103 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: String function: 01A35720 appears 65 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: String function: 019FD08C appears 32 times
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_004185F0 NtCreateFile,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_004186A0 NtReadFile,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00418720 NtClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_004187D0 NtAllocateVirtualMemory,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00418642 NtCreateFile,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041869D NtReadFile,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041871A NtClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_004187CB NtAllocateVirtualMemory,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E96E0 NtFreeVirtualMemory,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9660 NtAllocateVirtualMemory,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9860 NtQuerySystemInformation,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019EB040 NtSuspendThread,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019EA3B0 NtGetContextThread,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E95D0 NtClose,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E95F0 NtQueryInformationFile,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9520 NtWaitForSingleObject,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9540 NtReadFile,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9560 NtWriteFile,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9780 NtMapViewOfSection,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E97A0 NtUnmapViewOfSection,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9710 NtQueryInformationToken,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019EA710 NtOpenProcessToken,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9730 NtQueryVirtualMemory,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019EA770 NtOpenThread,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9770 NtSetInformationFile,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9760 NtOpenProcess,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E96D0 NtCreateKey,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9610 NtEnumerateValueKey,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9650 NtQueryValueKey,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9670 NtQueryInformationProcess,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E99A0 NtCreateSection,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E99D0 NtCreateProcessEx,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9910 NtAdjustPrivilegesToken,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E9950 NtQueueApcThread,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E98A0 NtWriteVirtualMemory,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E98F0 NtReadVirtualMemory,
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302319122.00000000014EB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000000.278924225.0000000000D62000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegetDeviceClaimsd.exe8 vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.306336909.0000000007930000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302747431.0000000001A9F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000000.298139804.0000000000F92000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamegetDeviceClaimsd.exe8 vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.303018064.0000000001C2F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeBinary or memory string: OriginalFilenamegetDeviceClaimsd.exe8 vs SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeVirustotal: Detection: 43%
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeReversingLabs: Detection: 43%
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Bulz.785643.17886.exe.logJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302747431.0000000001A9F000.00000040.00000001.sdmp, SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302556621.0000000001980000.00000040.00000001.sdmp
              Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302747431.0000000001A9F000.00000040.00000001.sdmp, SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 0000000C.00000002.302556621.0000000001980000.00000040.00000001.sdmp

              Data Obfuscation:

              barindex
              .NET source code contains potential unpackerShow sources
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 0.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.d60000.0.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.d60000.0.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.3.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.1.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.2.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.0.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.7.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.9.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.1.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.5.unpack, u0005u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 0_2_00D6E0EF push esp; iretd
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041B842 push eax; ret
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041B84B push eax; ret
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_004188F2 push ds; ret
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041B8AC push eax; ret
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00416109 push cs; iretd
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00415237 pushfd ; iretd
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_0041B7F5 push eax; ret
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_00F9E0EF push esp; iretd
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019FD0D1 push ecx; ret
              Source: initial sampleStatic PE information: section name: .text entropy: 7.74258433139
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM3Show sources
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.33c02a4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.340c584.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.302962488.00000000033D3000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Bulz.785643.17886.exe PID: 7128, type: MEMORYSTR
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302962488.00000000033D3000.00000004.00000001.sdmp, SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302962488.00000000033D3000.00000004.00000001.sdmp, SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Tries to detect virtualization through RDTSC time measurementsShow sources
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeRDTSC instruction interceptor: First address: 0000000000408614 second address: 000000000040861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeRDTSC instruction interceptor: First address: 00000000004089AE second address: 00000000004089B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe TID: 7132Thread sleep time: -37702s >= -30000s
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe TID: 4784Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_004088E0 rdtsc
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeAPI coverage: 1.8 %
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeThread delayed: delay time: 37702
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeThread delayed: delay time: 922337203685477
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_004088E0 rdtsc
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A519E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A519E mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8190 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D4190 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A7F1B5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A7F1B5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DA185 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A251BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A251BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A251BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A251BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CC182 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6A189 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6A189 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B61A7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B61A7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B61A7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B61A7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D61A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D61A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A341E8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A3D1F9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BC1C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CD1EF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A631DC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A31E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB1E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B0100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B0100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B0100 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A3138 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D513A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D513A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4120 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4120 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB171 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB171 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A2714D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A2714D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9080 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB080 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DF0BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DF0BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DF0BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E90AF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D20A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A660F5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A660F5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A660F5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A660F5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A70C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A70C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B0C7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B0C7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A40E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A40E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A40E1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D701D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D701D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D701D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D701D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D701D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D701D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D002D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB02A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A74015 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A74015 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A27016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A27016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A27016 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A33019 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D4020 mov edi, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A5050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A5050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A5050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C0050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C0050 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A7057 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A71074 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A62073 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D2397 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DB390 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D138B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D138B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D138B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A5D380 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6138A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A523E3 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A523E3 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A523E3 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D53C5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A253CA mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A253CA mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D03E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA309 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6131B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AF358 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A36365 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A36365 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A36365 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BF370 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BF370 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BF370 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DD294 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DD294 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D12BD mov esi, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D12BD mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D12BD mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B62A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B62A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B62A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B62A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6129A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A52A5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A12D4 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B2E8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B2E8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B2E8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B2E8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A5210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A5210 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A5210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A5210 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A61229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8239 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8239 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8239 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB233 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB233 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB236 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB236 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB236 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB236 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB236 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB236 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CA229 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A5B260 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A5B260 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9240 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E927A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A34257 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A705AC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A705AC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A3591 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D2581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D2581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D2581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D2581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6B581 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D35A1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D65A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D65A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D65A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A15C1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A95F0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A95F0 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D95EC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BD5E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BD5E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A751A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A751A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A751A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A751A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9515 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A2A537 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6E539 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DF527 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DF527 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DF527 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A63518 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A63518 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A63518 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A354C mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A354C mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB540 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB540 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A23540 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CC577 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CC577 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B849B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A649B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A649B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A334A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A334A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A334A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A364B5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A364B5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A1480 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B34B1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B34B1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DD4B0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A64496 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B14A9 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B14A9 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A614FB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D84E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D84E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D84E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D84E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D84E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D84E0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8410 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A4439 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB433 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB433 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB433 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A7740D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A7740D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A7740D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C2430 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C2430 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A9450 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DA44B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB477 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C746D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A3C450 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A3C450 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A78450 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8466 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8466 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B8794 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B17B5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A27794 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A27794 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A27794 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DD7CA mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DD7CA mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A787CF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E37F5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C97ED mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C97ED mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C97ED mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C97ED mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C97ED mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C97ED mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C97ED mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A617D2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D37EB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D37EB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D37EB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D37EB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D37EB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D37EB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D37EB mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DD715 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DD715 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CF716 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D4710 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DA70E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DA70E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DC707 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DC707 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DC707 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB73D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB73D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A7070D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A7070D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A6730 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A6730 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A6730 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DE730 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AA745 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A61751 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A8760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CE760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CE760 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A246A7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A656B6 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A656B6 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A86A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D36CC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D06C0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B76E2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D16E0 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DA61C mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DA61C mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A25623 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B161A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A1618 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AC600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AC600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AC600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C5600 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DC63D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AA63B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AA63B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A61608 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB62E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019BB62E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AE620 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D7620 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D7620 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D7620 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D7620 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D7620 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D7620 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4670 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4670 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4670 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C4670 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A36652 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B766D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A649A4 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A649A4 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A649A4 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A649A4 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A269A6 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AB990 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D2990 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D99BC mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DC9BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019DC9BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019C99BF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A789E7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B99C7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B99C7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B99C7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B99C7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AC9FF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AC9FF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AC9FF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A619D8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B1915 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B1915 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A78966 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A6E962 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A395E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A395E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB944 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019CB944 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A61951 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019AC962 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A3880 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019A3880 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A23884 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_01A23884 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B28AE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B28AE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B28AE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B28AE mov ecx, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B28AE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019B28AE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D78A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019D78A0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess queried: DebugPort
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeCode function: 12_2_019E96E0 NtFreeVirtualMemory,LdrInitializeThunk,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information:

              barindex
              Yara detected FormBookShow sources
              Source: Yara matchFile source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.45332e0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.44dc2c0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected FormBookShow sources
              Source: Yara matchFile source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.45332e0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.44dc2c0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, type: MEMORY

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection111Masquerading1Input Capture1Security Software Discovery221Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSSystem Information Discovery112Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Variant.Bulz.785643.17886.exe43%VirustotalBrowse
              SecuriteInfo.com.Variant.Bulz.785643.17886.exe44%ReversingLabsByteCode-MSIL.Trojan.Bulz
              SecuriteInfo.com.Variant.Bulz.785643.17886.exe100%AviraHEUR/AGEN.1211287
              SecuriteInfo.com.Variant.Bulz.785643.17886.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.3.unpack100%AviraHEUR/AGEN.1211287Download File
              12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.1.unpack100%AviraHEUR/AGEN.1211287Download File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.2.unpack100%AviraHEUR/AGEN.1211287Download File
              0.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.d60000.0.unpack100%AviraHEUR/AGEN.1211287Download File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.0.unpack100%AviraHEUR/AGEN.1211287Download File
              0.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.d60000.0.unpack100%AviraHEUR/AGEN.1211287Download File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.7.unpack100%AviraHEUR/AGEN.1211287Download File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.9.unpack100%AviraHEUR/AGEN.1211287Download File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.1.unpack100%AviraHEUR/AGEN.1211287Download File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
              12.2.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.f90000.5.unpack100%AviraHEUR/AGEN.1211287Download File
              12.0.SecuriteInfo.com.Variant.Bulz.785643.17886.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              www.topeasyip.company/i5nb/4%VirustotalBrowse
              www.topeasyip.company/i5nb/100%Avira URL Cloudmalware
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              No contacted domains info

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              www.topeasyip.company/i5nb/true
              • 4%, Virustotal, Browse
              • Avira URL Cloud: malware
              low

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.comSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                        high
                        http://www.tiro.comSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                          high
                          http://www.goodfont.co.krSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comlSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8SecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                                high
                                http://www.fonts.comSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sandoll.co.krSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.comSecuriteInfo.com.Variant.Bulz.785643.17886.exe, 00000000.00000002.305823260.00000000073E2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown

                                  Contacted IPs

                                  No contacted IP infos

                                  General Information

                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                  Analysis ID:552971
                                  Start date:14.01.2022
                                  Start time:00:16:43
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 13s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:SecuriteInfo.com.Variant.Bulz.785643.17886.29229 (renamed file extension from 29229 to exe)
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:26
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@3/1@0/0
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HDC Information:
                                  • Successful, ratio: 8.1% (good quality ratio 5.8%)
                                  • Quality average: 52%
                                  • Quality standard deviation: 39.9%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  Warnings:
                                  Show All
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                  • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  00:17:43API Interceptor1x Sleep call for process: SecuriteInfo.com.Variant.Bulz.785643.17886.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  No context

                                  Domains

                                  No context

                                  ASN

                                  No context

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Bulz.785643.17886.exe.log
                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1310
                                  Entropy (8bit):5.345651901398759
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                                  MD5:A9EFF9253CAF99EC8665E41D736DDAED
                                  SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                                  SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                                  SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                                  Malicious:true
                                  Reputation:moderate, very likely benign file
                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                  Static File Info

                                  General

                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.729098788142576
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:SecuriteInfo.com.Variant.Bulz.785643.17886.exe
                                  File size:417792
                                  MD5:83ac585e99b527eeb278702f8f711568
                                  SHA1:a576a927b067c94cdbc1e7b353f60577f5b310f9
                                  SHA256:9e2502b3945f31482623e8e61dcb85b9ebb7d9a4244d9074fa289596c9da513e
                                  SHA512:f4a5f197cca552237ca4ca0dbdba4af5e5c0f6bca7a05313a61d96c5021049edeb0b38d8e4ad5ee3b062692038f05254787a57c5c1a0e951e9a9b9f091a304ac
                                  SSDEEP:12288:gyK777777777777OPMfcmnxTLrXEQ0/Ll1PishiMkNMfPjJ8W:jK777777777777OKLQR1Pf+aP6W
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H?.a.................V..........:u... ........@.. ....................................@................................

                                  File Icon

                                  Icon Hash:00828e8e8686b000

                                  Static PE Info

                                  General

                                  Entrypoint:0x46753a
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x61E03F48 [Thu Jan 13 15:03:36 2022 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:v4.0.30319
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                  Entrypoint Preview

                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x674e00x57.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x680000x598.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x6a0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x655400x65600False0.877254161529data7.74258433139IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rsrc0x680000x5980x600False0.426432291667data4.37535552335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x6a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0x680a00x344data
                                  RT_MANIFEST0x683e40x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                  Imports

                                  DLLImport
                                  mscoree.dll_CorExeMain

                                  Version Infos

                                  DescriptionData
                                  Translation0x0000 0x04b0
                                  LegalCopyrightCopyright 2015
                                  Assembly Version1.0.0.0
                                  InternalNamegetDeviceClaimsd.exe
                                  FileVersion1.0.0.0
                                  CompanyName
                                  LegalTrademarks
                                  Comments
                                  ProductNameram machine
                                  ProductVersion1.0.0.0
                                  FileDescriptionram machine
                                  OriginalFilenamegetDeviceClaimsd.exe

                                  Network Behavior

                                  No network behavior found

                                  Code Manipulations

                                  Statistics

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:00:17:34
                                  Start date:14/01/2022
                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe"
                                  Imagebase:0xd60000
                                  File size:417792 bytes
                                  MD5 hash:83AC585E99B527EEB278702F8F711568
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.302962488.00000000033D3000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.302905715.0000000003391000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.303196855.0000000004399000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low

                                  General

                                  Start time:00:17:43
                                  Start date:14/01/2022
                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Bulz.785643.17886.exe
                                  Imagebase:0xf90000
                                  File size:417792 bytes
                                  MD5 hash:83AC585E99B527EEB278702F8F711568
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000000.299984624.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.302341566.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000000.300583047.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low

                                  Disassembly

                                  Code Analysis

                                  Reset < >