Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sixikmerozx.exe

Overview

General Information

Sample Name:sixikmerozx.exe
Analysis ID:680418
MD5:74b12614d25239ca01d1e15146b9971a
SHA1:4be20e783a8b8202620f7d7af9536e49395ea6e4
SHA256:76b8f5ae8f1dabd71afebd7d1ed933ae69072bb1065d330dbb46b7334efffc60
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected AntiVM3
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Uses netsh to modify the Windows network and firewall settings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • sixikmerozx.exe (PID: 1436 cmdline: "C:\Users\user\Desktop\sixikmerozx.exe" MD5: 74B12614D25239CA01D1E15146B9971A)
    • sixikmerozx.exe (PID: 5360 cmdline: C:\Users\user\Desktop\sixikmerozx.exe MD5: 74B12614D25239CA01D1E15146B9971A)
      • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • netsh.exe (PID: 2560 cmdline: C:\Windows\SysWOW64\netsh.exe MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807)
  • cleanup
{"C2 list": ["www.sonicsmeditation.com/m6gi/"], "decoy": ["Al84h56eBywJreCo44UJFw==", "Ki3z3ZODRoyfTtg=", "wgcCbYt4ObGAOI28FJI=", "qJXp08a+RlxCJGolm1FRgC4=", "jSKP89Q8O7cNuMXg2+L/AA==", "MaF6RuHGGVGyjsr5Brg3lBU0dGFmK68=", "eLeVf1zKukiyLl3F2/aK+STK3g==", "raaI7/DGJUdOOn0sw6DUGwIr1g==", "NpD0zH2v7mnF", "FUbJ/QxuYcNVug==", "TYlhmaynBhj8bqDW45zQQMBb", "cUy5CyWToedIsA==", "r1mwjVRTBgMg64rZ", "dM26IucWm8+yF2qkOhE5dSQ=", "ye7Px42v7mnF", "4E8+GeNce/tI/DAs/M5g1oDaoJgY", "uiEQ98sd9pUoTaw7knjT", "IuVYsZUPPuv/c6Tf6pzQQMBb", "tfb/aJGEP+lH/BRMaSq4+HnaoJgY", "2x0ld2U08m1mQI28FJI=", "aDOm89A8V+Ub0V7Z2+L/AA==", "f9k6gVK8KCZhVpI5fVSfnyY=", "RccgdDOPqTVv1CzpYjVVRkhn1YQO6Q==", "UVRJqJycH0dA9Aa9OJm9BbzaoJgY", "79lGOysam51wP428FJI=", "39+6GetiYcNVug==", "Ab0eiYgC9YvzYIn2PwsnGR5O04wm9pHU", "n83XMvqAX+9byuGM2+L/AA==", "ExsLQcxOXg2beBJ1xGzb", "dvRcPsNkYcNVug==", "vzUmCczDP9gPsPJtsoy0sq2Zh0Y=", "3/HKIe9mOt0wYJjO", "SUgNecYWYcNVug==", "3mjkOQdoYdJ2zhzL", "um3PGvpcFQRouA==", "bDap9dMrJrnMYhJ1xGzb", "H/Rhu9rCTgkY8pfIUhUhIafHC0Q=", "v/zRollKmL3SwjGkKZg=", "ezL702mv7mnF", "x4rFWFO5tlJXs+7UIur5IrrPGiTdZTvY", "fD8OWysOhLCZUvL5wHHdIk9n1YQO6Q==", "vVbPGtHtOeEwYJjO", "DM8wAZIA80TRgM+M0g==", "h/nTnTkj868U7j17ike59yRJqNTdZTvY", "I1M3M+vamVC5f76tdF6s4MWpikw=", "vQnvu1Mt2mV0aH3E", "yB1tRt+2LawfrQ==", "RZuD1tWuhQ/cyw1Uww==", "vgULYSLpXlUpEq2ebH+QFCFT", "YE26nVPJDBTLrf4xoyrM", "vzQT36EeUvdXPHt1xGzb", "XAV1yoTd6p4zKnd1xGzb", "pBPz5uBSTc8zLXh1xGzb", "5z06j52Vbe8jDYlPloje", "AvuFIcdAWu33YX91xGzb", "V1s/rKupM2NpQI28FJI=", "GFxJlJyKSO8BYnZ1xGzb", "tq4oDr8qXoNlhfT6u5o=", "F4ZiJ8IRNNPlY6HswKcVRllr1YQO6Q==", "N6QDVy6emCh1Exaf3g==", "OOU5E7UeUYhisNIXGKzQQMBb", "jfzrzpCv7mnF", "ayGUAgt9z/2Q8PqsNRE5dSQ=", "BpwJeIGv7mnF"]}
SourceRuleDescriptionAuthorStrings
00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x6611:$a1: 3C 30 50 4F 53 54 74 09 40
    • 0x1d7b0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0xa94f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    • 0x16b77:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
    00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x16975:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x16421:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x16a77:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x16bef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa51a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1566c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb262:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1c407:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1d51a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18e59:$sqlite3step: 68 34 1C 7B E1
    • 0x18f8c:$sqlite3step: 68 34 1C 7B E1
    • 0x18e9b:$sqlite3text: 68 38 2A 90 C5
    • 0x18fe3:$sqlite3text: 68 38 2A 90 C5
    • 0x18eb2:$sqlite3blob: 68 53 D8 7F 8C
    • 0x19005:$sqlite3blob: 68 53 D8 7F 8C
    00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      Click to see the 28 entries
      SourceRuleDescriptionAuthorStrings
      4.0.sixikmerozx.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.0.sixikmerozx.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x5811:$a1: 3C 30 50 4F 53 54 74 09 40
        • 0x1c9b0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x9b4f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        • 0x15d77:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
        4.0.sixikmerozx.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x15b75:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15621:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15c77:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x15def:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x971a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1486c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa462:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b607:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c71a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        4.0.sixikmerozx.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18059:$sqlite3step: 68 34 1C 7B E1
        • 0x1818c:$sqlite3step: 68 34 1C 7B E1
        • 0x1809b:$sqlite3text: 68 38 2A 90 C5
        • 0x181e3:$sqlite3text: 68 38 2A 90 C5
        • 0x180b2:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18205:$sqlite3blob: 68 53 D8 7F 8C
        0.2.sixikmerozx.exe.4b16438.8.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          Click to see the 3 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: sixikmerozx.exeVirustotal: Detection: 23%Perma Link
          Source: Yara matchFile source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: www.sonicsmeditation.com/m6gi/Avira URL Cloud: Label: malware
          Source: sixikmerozx.exeJoe Sandbox ML: detected
          Source: 4.0.sixikmerozx.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 0.2.sixikmerozx.exe.9d0000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2
          Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.sonicsmeditation.com/m6gi/"], "decoy": ["Al84h56eBywJreCo44UJFw==", "Ki3z3ZODRoyfTtg=", "wgcCbYt4ObGAOI28FJI=", "qJXp08a+RlxCJGolm1FRgC4=", "jSKP89Q8O7cNuMXg2+L/AA==", "MaF6RuHGGVGyjsr5Brg3lBU0dGFmK68=", "eLeVf1zKukiyLl3F2/aK+STK3g==", "raaI7/DGJUdOOn0sw6DUGwIr1g==", "NpD0zH2v7mnF", "FUbJ/QxuYcNVug==", "TYlhmaynBhj8bqDW45zQQMBb", "cUy5CyWToedIsA==", "r1mwjVRTBgMg64rZ", "dM26IucWm8+yF2qkOhE5dSQ=", "ye7Px42v7mnF", "4E8+GeNce/tI/DAs/M5g1oDaoJgY", "uiEQ98sd9pUoTaw7knjT", "IuVYsZUPPuv/c6Tf6pzQQMBb", "tfb/aJGEP+lH/BRMaSq4+HnaoJgY", "2x0ld2U08m1mQI28FJI=", "aDOm89A8V+Ub0V7Z2+L/AA==", "f9k6gVK8KCZhVpI5fVSfnyY=", "RccgdDOPqTVv1CzpYjVVRkhn1YQO6Q==", "UVRJqJycH0dA9Aa9OJm9BbzaoJgY", "79lGOysam51wP428FJI=", "39+6GetiYcNVug==", "Ab0eiYgC9YvzYIn2PwsnGR5O04wm9pHU", "n83XMvqAX+9byuGM2+L/AA==", "ExsLQcxOXg2beBJ1xGzb", "dvRcPsNkYcNVug==", "vzUmCczDP9gPsPJtsoy0sq2Zh0Y=", "3/HKIe9mOt0wYJjO", "SUgNecYWYcNVug==", "3mjkOQdoYdJ2zhzL", "um3PGvpcFQRouA==", "bDap9dMrJrnMYhJ1xGzb", "H/Rhu9rCTgkY8pfIUhUhIafHC0Q=", "v/zRollKmL3SwjGkKZg=", "ezL702mv7mnF", "x4rFWFO5tlJXs+7UIur5IrrPGiTdZTvY", "fD8OWysOhLCZUvL5wHHdIk9n1YQO6Q==", "vVbPGtHtOeEwYJjO", "DM8wAZIA80TRgM+M0g==", "h/nTnTkj868U7j17ike59yRJqNTdZTvY", "I1M3M+vamVC5f76tdF6s4MWpikw=", "vQnvu1Mt2mV0aH3E", "yB1tRt+2LawfrQ==", "RZuD1tWuhQ/cyw1Uww==", "vgULYSLpXlUpEq2ebH+QFCFT", "YE26nVPJDBTLrf4xoyrM", "vzQT36EeUvdXPHt1xGzb", "XAV1yoTd6p4zKnd1xGzb", "pBPz5uBSTc8zLXh1xGzb", "5z06j52Vbe8jDYlPloje", "AvuFIcdAWu33YX91xGzb", "V1s/rKupM2NpQI28FJI=", "GFxJlJyKSO8BYnZ1xGzb", "tq4oDr8qXoNlhfT6u5o=", "F4ZiJ8IRNNPlY6HswKcVRllr1YQO6Q==", "N6QDVy6emCh1Exaf3g==", "OOU5E7UeUYhisNIXGKzQQMBb", "jfzrzpCv7mnF", "ayGUAgt9z/2Q8PqsNRE5dSQ=", "BpwJeIGv7mnF"]}

          Compliance

          barindex
          Source: C:\Users\user\Desktop\sixikmerozx.exeUnpacked PE file: 0.2.sixikmerozx.exe.9d0000.0.unpack
          Source: sixikmerozx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: sixikmerozx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: netsh.pdb source: sixikmerozx.exe, 00000004.00000003.434338386.0000000001211000.00000004.00000020.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000002.441011712.0000000001213000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: sixikmerozx.exe, 00000004.00000003.291189709.0000000001494000.00000004.00000800.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000002.441427893.0000000001630000.00000040.00000800.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000003.278796648.00000000012F8000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000003.445473308.0000000003A1F000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000002.537921897.0000000003CDF000.00000040.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000003.440306228.0000000003837000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000002.535423781.0000000003BC0000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: netsh.pdbGCTL source: sixikmerozx.exe, 00000004.00000003.434338386.0000000001211000.00000004.00000020.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000002.441011712.0000000001213000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: sixikmerozx.exe, sixikmerozx.exe, 00000004.00000003.291189709.0000000001494000.00000004.00000800.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000002.441427893.0000000001630000.00000040.00000800.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000003.278796648.00000000012F8000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000003.445473308.0000000003A1F000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000002.537921897.0000000003CDF000.00000040.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000003.440306228.0000000003837000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000002.535423781.0000000003BC0000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.sonicsmeditation.com/m6gi/
          Source: sixikmerozx.exe, 00000000.00000002.291889881.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://boards.4chan.org
          Source: sixikmerozx.exe, 00000000.00000002.291889881.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://boards.4chan.org/b/
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: sixikmerozx.exe, 00000000.00000002.291889881.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://images.4chan.org/
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: sixikmerozx.exe PID: 1436, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: sixikmerozx.exe PID: 5360, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: netsh.exe PID: 2560, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: sixikmerozx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: sixikmerozx.exe PID: 1436, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: sixikmerozx.exe PID: 5360, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: netsh.exe PID: 2560, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D8C380
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D821D2
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D8170A
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D80472
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D80FC8
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D85230
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D85222
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D856C8
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D856B9
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D85450
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D85440
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D84BD0
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D84BE0
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D85880
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D849E8
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D83E20
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D80F08
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D80F29
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_02D81C68
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_05382118
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_05383528
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_053897C4
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_05382108
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_05380007
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_05380040
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_053800E2
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_0538035B
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_05382F40
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_0538B830
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 0_2_0538B820
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01674120
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165F900
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0172E824
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711002
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_017228EC
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016820A0
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_017220A8
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166B090
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01722B28
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171DBD2
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_017103DA
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168EBB0
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_017222AE
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01721D55
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01650D20
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01722D07
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166D5E0
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_017225DD
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682581
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171D466
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166841F
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01721FF1
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0172DFCE
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01676E30
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171D616
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01722EF7
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: String function: 0165B150 appears 39 times
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016999A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016998F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016995D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016997A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016996E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016999D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0169B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016998A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0169A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699A10 NtQuerySection,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699560 NtWriteFile,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0169AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016995F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699760 NtOpenProcess,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0169A770 NtOpenThread,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0169A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016996D0 NtCreateKey,
          Source: sixikmerozx.exe, 00000000.00000003.269005802.0000000009965000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000000.00000000.250657423.0000000000B33000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSByteArrayTypeI.exe: vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000000.00000002.291889881.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000000.00000002.309975499.0000000009AF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000000.00000002.309852930.0000000009AD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000000.00000002.310647914.0000000009D30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000000.00000002.296671497.00000000047A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000000.00000002.296671497.00000000047A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000004.00000003.292600493.00000000015B3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000004.00000002.448884300.000000000174F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000004.00000003.289072567.000000000140E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000004.00000003.434338386.0000000001211000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenetsh.exej% vs sixikmerozx.exe
          Source: sixikmerozx.exe, 00000004.00000003.434429695.000000000122F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenetsh.exej% vs sixikmerozx.exe
          Source: sixikmerozx.exeBinary or memory string: OriginalFilenameSByteArrayTypeI.exe: vs sixikmerozx.exe
          Source: sixikmerozx.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: sixikmerozx.exeVirustotal: Detection: 23%
          Source: sixikmerozx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\sixikmerozx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\sixikmerozx.exe "C:\Users\user\Desktop\sixikmerozx.exe"
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess created: C:\Users\user\Desktop\sixikmerozx.exe C:\Users\user\Desktop\sixikmerozx.exe
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess created: C:\Users\user\Desktop\sixikmerozx.exe C:\Users\user\Desktop\sixikmerozx.exe
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6db7cd52-e3b7-4ecc-bb1f-388aeef6bb50}\InProcServer32
          Source: C:\Users\user\Desktop\sixikmerozx.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\sixikmerozx.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@5/1@0/0
          Source: sixikmerozx.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\sixikmerozx.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\sixikmerozx.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: sixikmerozx.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: sixikmerozx.exeStatic file information: File size 1479168 > 1048576
          Source: sixikmerozx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: sixikmerozx.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x15b800
          Source: sixikmerozx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: netsh.pdb source: sixikmerozx.exe, 00000004.00000003.434338386.0000000001211000.00000004.00000020.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000002.441011712.0000000001213000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: sixikmerozx.exe, 00000004.00000003.291189709.0000000001494000.00000004.00000800.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000002.441427893.0000000001630000.00000040.00000800.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000003.278796648.00000000012F8000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000003.445473308.0000000003A1F000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000002.537921897.0000000003CDF000.00000040.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000003.440306228.0000000003837000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000002.535423781.0000000003BC0000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: netsh.pdbGCTL source: sixikmerozx.exe, 00000004.00000003.434338386.0000000001211000.00000004.00000020.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000002.441011712.0000000001213000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: sixikmerozx.exe, sixikmerozx.exe, 00000004.00000003.291189709.0000000001494000.00000004.00000800.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000002.441427893.0000000001630000.00000040.00000800.00020000.00000000.sdmp, sixikmerozx.exe, 00000004.00000003.278796648.00000000012F8000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000003.445473308.0000000003A1F000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000002.537921897.0000000003CDF000.00000040.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000003.440306228.0000000003837000.00000004.00000800.00020000.00000000.sdmp, netsh.exe, 00000015.00000002.535423781.0000000003BC0000.00000040.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: C:\Users\user\Desktop\sixikmerozx.exeUnpacked PE file: 0.2.sixikmerozx.exe.9d0000.0.unpack
          Source: C:\Users\user\Desktop\sixikmerozx.exeUnpacked PE file: 0.2.sixikmerozx.exe.9d0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016AD0D1 push ecx; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.317701629090079
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.295805632.0000000003274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: sixikmerozx.exe PID: 1436, type: MEMORYSTR
          Source: sixikmerozx.exe, 00000000.00000002.295805632.0000000003274000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: sixikmerozx.exe, 00000000.00000002.295805632.0000000003274000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\sixikmerozx.exe TID: 4400Thread sleep time: -45877s >= -30000s
          Source: C:\Users\user\Desktop\sixikmerozx.exe TID: 5784Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\netsh.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01725BA5 rdtsc
          Source: C:\Users\user\Desktop\sixikmerozx.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\sixikmerozx.exeAPI coverage: 6.0 %
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeThread delayed: delay time: 45877
          Source: C:\Users\user\Desktop\sixikmerozx.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000007.00000000.363187022.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: sixikmerozx.exe, 00000000.00000002.295805632.0000000003274000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000007.00000000.296325983.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
          Source: explorer.exe, 00000007.00000000.378098529.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: sixikmerozx.exe, 00000000.00000002.295805632.0000000003274000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000007.00000000.363846054.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000007.00000000.363846054.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}t]
          Source: explorer.exe, 00000007.00000000.418515327.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000007.00000000.356448622.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
          Source: explorer.exe, 00000007.00000000.363846054.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}^
          Source: explorer.exe, 00000007.00000000.337948019.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: sixikmerozx.exe, 00000000.00000002.295805632.0000000003274000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: explorer.exe, 00000007.00000000.363187022.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000007.00000000.363846054.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l
          Source: netsh.exe, 00000015.00000002.521889810.0000000003564000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: sixikmerozx.exe, 00000000.00000002.295805632.0000000003274000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01725BA5 rdtsc
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\netsh.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01674120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01674120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01674120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01674120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01674120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01659100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01659100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01659100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016E41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01712073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01721074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01670050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01670050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01724015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01724015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016540E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016540E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016540E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016558EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016990AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01659080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01683B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01683B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01728B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01684BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01684BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01684BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01725BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01661B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01661B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0170D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0170B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0170B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01728A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0169927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01659240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01659240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01659240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01659240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016E4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01694A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01694A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01668A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01655210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01655210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01655210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01655210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01673A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01693D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01677D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01728D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01684D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01684D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01684D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016DA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01708DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016835A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01681DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01681DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01681DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_017205AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_017205AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01682581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0172740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0172740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0172740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_017114FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01728CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01728F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01654F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01654F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0172070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0172070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016937F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01668794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0166766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0167AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0171AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0170FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0165C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01688E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0168A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01711608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016676E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016816E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01728ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016836CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01698EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_0170FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016D46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01720EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01720EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01720EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_016EFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\netsh.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\sixikmerozx.exeCode function: 4_2_01699910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\sixikmerozx.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\sixikmerozx.exeSection unmapped: C:\Windows\SysWOW64\netsh.exe base address: F70000
          Source: C:\Users\user\Desktop\sixikmerozx.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\sixikmerozx.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\sixikmerozx.exeSection loaded: unknown target: C:\Windows\SysWOW64\netsh.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\sixikmerozx.exeSection loaded: unknown target: C:\Windows\SysWOW64\netsh.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\sixikmerozx.exeMemory written: C:\Users\user\Desktop\sixikmerozx.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\sixikmerozx.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\Desktop\sixikmerozx.exeThread register set: target process: 3968
          Source: C:\Users\user\Desktop\sixikmerozx.exeThread register set: target process: 3968
          Source: C:\Windows\SysWOW64\netsh.exeThread register set: target process: 3968
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess created: C:\Users\user\Desktop\sixikmerozx.exe C:\Users\user\Desktop\sixikmerozx.exe
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe
          Source: explorer.exe, 00000007.00000000.353837420.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.411832560.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.378081100.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
          Source: explorer.exe, 00000007.00000000.412629773.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.336910522.00000000080ED000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.382550165.0000000005920000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000007.00000000.412629773.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.354882417.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.297900097.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000007.00000000.412629773.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.354882417.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.297900097.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000007.00000000.296396083.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.411922520.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.353958083.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
          Source: explorer.exe, 00000007.00000000.412629773.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.354882417.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.297900097.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Users\user\Desktop\sixikmerozx.exe VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\sixikmerozx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Users\user\Desktop\sixikmerozx.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 4.0.sixikmerozx.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.sixikmerozx.exe.4b16438.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Shared Modules
          Path Interception512
          Process Injection
          1
          Masquerading
          OS Credential Dumping121
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
          Disable or Modify Tools
          LSASS Memory2
          Process Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)512
          Process Injection
          NTDS12
          System Information Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common4
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items22
          Software Packing
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          sixikmerozx.exe24%VirustotalBrowse
          sixikmerozx.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          4.0.sixikmerozx.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          0.2.sixikmerozx.exe.9d0000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          www.sonicsmeditation.com/m6gi/1%VirustotalBrowse
          www.sonicsmeditation.com/m6gi/100%Avira URL Cloudmalware
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          www.sonicsmeditation.com/m6gi/true
          • 1%, Virustotal, Browse
          • Avira URL Cloud: malware
          low
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bThesixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://boards.4chan.org/b/sixikmerozx.exe, 00000000.00000002.291889881.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers?sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.tiro.comsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designerssixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cThesixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://boards.4chan.orgsixikmerozx.exe, 00000000.00000002.291889881.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleasesixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8sixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fonts.comsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sandoll.co.krsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://images.4chan.org/sixikmerozx.exe, 00000000.00000002.291889881.0000000002FAC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.urwpp.deDPleasesixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.comsixikmerozx.exe, 00000000.00000002.305679953.00000000093D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    No contacted IP infos
                                    Joe Sandbox Version:35.0.0 Citrine
                                    Analysis ID:680418
                                    Start date and time: 08/08/202215:22:112022-08-08 15:22:11 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 8m 32s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:sixikmerozx.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:26
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:1
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@5/1@0/0
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:
                                    • Successful, ratio: 100% (good quality ratio 87.1%)
                                    • Quality average: 71.8%
                                    • Quality standard deviation: 33.3%
                                    HCA Information:
                                    • Successful, ratio: 97%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    TimeTypeDescription
                                    15:24:19API Interceptor2x Sleep call for process: sixikmerozx.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\sixikmerozx.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1308
                                    Entropy (8bit):5.345811588615766
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                    MD5:2E016B886BDB8389D2DD0867BE55F87B
                                    SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                    SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                    SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.2346969519963285
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:sixikmerozx.exe
                                    File size:1479168
                                    MD5:74b12614d25239ca01d1e15146b9971a
                                    SHA1:4be20e783a8b8202620f7d7af9536e49395ea6e4
                                    SHA256:76b8f5ae8f1dabd71afebd7d1ed933ae69072bb1065d330dbb46b7334efffc60
                                    SHA512:6d5869e7e4e10c2b624ae27a7ef7bcc2194d698577a6b016b6ec4fb227b7780895b66ed65221c9868a048727f306bd7636168a2576a4126f40730f9f0c8ea0aa
                                    SSDEEP:24576:UmjyUe/VXKjobJR7cXZ+zIY7maeEGCYmTI6vKtSCb43e9IbUDHDljWXg:UmUpKjobJlpIY7mbEGCdvKP037UEXg
                                    TLSH:36655B5E7A10768FC853CE76CE592C60E7B068AA530BE253A453169D9D6E79BCF000F3
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n.b..............0.................. ........@.. ....................................@................................
                                    Icon Hash:c68ce86ecc8c8ac8
                                    Entrypoint:0x55d60e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x62F06EA6 [Mon Aug 8 02:02:14 2022 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x15d5c00x4b.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x15e0000xd4c0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x16c0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x15b6140x15b800False0.6820474089478418data7.317701629090079IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x15e0000xd4c00xd600False0.2767231308411215data3.7584976792107203IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x16c0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0x15e1780x94a8dBase III DBT, version number 0, next free block index 40
                                    RT_ICON0x1676200x25a8dBase III DBT, version number 0, next free block index 40
                                    RT_ICON0x169bc80x10a8data
                                    RT_ICON0x16ac700x468GLS_BINARY_LSB_FIRST
                                    RT_GROUP_ICON0x16b0d80x3edata
                                    RT_VERSION0x16b1180x3a8data
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    No network behavior found

                                    Click to jump to process

                                    Target ID:0
                                    Start time:15:24:09
                                    Start date:08/08/2022
                                    Path:C:\Users\user\Desktop\sixikmerozx.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\sixikmerozx.exe"
                                    Imagebase:0x9d0000
                                    File size:1479168 bytes
                                    MD5 hash:74B12614D25239CA01D1E15146B9971A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.301670618.0000000004B16000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.295805632.0000000003274000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:4
                                    Start time:15:24:21
                                    Start date:08/08/2022
                                    Path:C:\Users\user\Desktop\sixikmerozx.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\sixikmerozx.exe
                                    Imagebase:0xa80000
                                    File size:1479168 bytes
                                    MD5 hash:74B12614D25239CA01D1E15146B9971A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.276811535.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    Target ID:7
                                    Start time:15:24:30
                                    Start date:08/08/2022
                                    Path:C:\Windows\explorer.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\Explorer.EXE
                                    Imagebase:0x7ff6b8cf0000
                                    File size:3933184 bytes
                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.390288440.000000000D724000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.372555173.000000000D724000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    Target ID:21
                                    Start time:15:25:35
                                    Start date:08/08/2022
                                    Path:C:\Windows\SysWOW64\netsh.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\netsh.exe
                                    Imagebase:0xf70000
                                    File size:82944 bytes
                                    MD5 hash:A0AA3322BB46BBFC36AB9DC1DBBBB807
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000015.00000002.520124794.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000015.00000002.519220440.0000000003390000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000015.00000002.518308713.0000000002FA0000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    No disassembly