Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JiH0aUfOU6.exe

Overview

General Information

Sample name:JiH0aUfOU6.exe
Analysis ID:1593605
MD5:9b979d3d3f37bcb0525fe001b19be432
SHA1:7e7edfd66d742e4dad4bea84aceb2a4ece7c817d
SHA256:634dd946969fd0ea89693faa9943907a7d539c722dc63a5dbd4b23a2bee6daae
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to harvest and steal Bitcoin Wallet information
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara detected Keylogger Generic

Classification

  • System is w10x64native
  • JiH0aUfOU6.exe (PID: 2040 cmdline: "C:\Users\user\Desktop\JiH0aUfOU6.exe" MD5: 9B979D3D3F37BCB0525FE001B19BE432)
    • JiH0aUfOU6.tmp (PID: 484 cmdline: "C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmp" /SL5="$10446,2802098,845824,C:\Users\user\Desktop\JiH0aUfOU6.exe" MD5: E587511F17C07622F2E88BDE6DC2A499)
      • Autoit3.exe (PID: 5648 cmdline: "C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe" C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\script.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD)
        • RegAsm.exe (PID: 7508 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • AutoIt3.exe (PID: 8300 cmdline: "C:\kchhcfb\AutoIt3.exe" C:\kchhcfb\caehccg.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD)
    • RegAsm.exe (PID: 8356 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 8364 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • AutoIt3.exe (PID: 8420 cmdline: "C:\kchhcfb\AutoIt3.exe" C:\kchhcfb\caehccg.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD)
    • RegAsm.exe (PID: 8448 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.794286967682.0000000002A72000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: Autoit3.exe PID: 5648JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        Process Memory Space: RegAsm.exe PID: 7508JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: AutoIt3.exe PID: 8300JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            Click to see the 2 entries

            System Summary

            barindex
            Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems): Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe" C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\script.a3x, ParentImage: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe, ParentProcessId: 5648, ParentProcessName: Autoit3.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 7508, ProcessName: RegAsm.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\kchhcfb\AutoIt3.exe" C:\kchhcfb\caehccg.a3x, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe, ProcessId: 5648, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\caehccg
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-17T11:59:08.468563+010020283713Unknown Traffic192.168.11.304986823.212.251.204443TCP
            2025-01-17T12:00:11.891570+010020283713Unknown Traffic192.168.11.304987223.212.251.204443TCP
            2025-01-17T12:03:21.382965+010020283713Unknown Traffic192.168.11.304987423.212.251.204443TCP
            2025-01-17T12:05:27.804918+010020283713Unknown Traffic192.168.11.304987623.212.251.204443TCP
            2025-01-17T12:07:34.277690+010020283713Unknown Traffic192.168.11.304987723.212.251.204443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-17T11:59:17.460667+010020355951Domain Observed Used for C2 Detected185.196.10.2256001192.168.11.3049869TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: JiH0aUfOU6.exeAvira: detected
            Source: JiH0aUfOU6.exeReversingLabs: Detection: 39%
            Source: JiH0aUfOU6.exeVirustotal: Detection: 41%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: JiH0aUfOU6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: JiH0aUfOU6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: wntdll.pdbUGP source: Autoit3.exe, 00000005.00000002.793964374781.0000000004618000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793959685277.000000000447C000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793959276341.000000000459F000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794119196690.00000000047FF000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126821854.0000000004878000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794119647077.00000000046DC000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198842202.000000000458F000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205176005.0000000004608000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794199308020.000000000446C000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Autoit3.exe, 00000005.00000002.793964374781.0000000004618000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793959685277.000000000447C000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793959276341.000000000459F000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794119196690.00000000047FF000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126821854.0000000004878000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794119647077.00000000046DC000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198842202.000000000458F000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205176005.0000000004608000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794199308020.000000000446C000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00644005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00644005
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064C2FF FindFirstFileW,FindNextFileW,FindClose,5_2_0064C2FF
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064494A GetFileAttributesW,FindFirstFileW,FindClose,5_2_0064494A
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064CD14 FindFirstFileW,FindClose,5_2_0064CD14
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,5_2_0064CD9F
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_0064F5D8
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_0064F735
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064FA36 FindFirstFileW,Sleep,FindNextFileW,FindClose,5_2_0064FA36
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00643CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00643CE2
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FE08FD FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,5_2_00FE08FD
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FDE22D GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,5_2_00FDE22D
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FE0A05 FindFirstFileA,GetLastError,5_2_00FE0A05
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00734005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_00734005
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073C2FF FindFirstFileW,FindNextFileW,FindClose,8_2_0073C2FF
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073494A GetFileAttributesW,FindFirstFileW,FindClose,8_2_0073494A
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073CD14 FindFirstFileW,FindClose,8_2_0073CD14
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,8_2_0073CD9F
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0073F5D8
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0073F735
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073FA36 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_0073FA36
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00733CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_00733CE2
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_011F219D FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,8_2_011F219D
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_011F22A5 FindFirstFileA,GetLastError,8_2_011F22A5
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_011EFACD GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,8_2_011EFACD

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 185.196.10.22:56001 -> 192.168.11.30:49869
            Source: global trafficTCP traffic: 192.168.11.30:49869 -> 185.196.10.22:56001
            Source: Joe Sandbox ViewASN Name: SIMPLECARRIERCH SIMPLECARRIERCH
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49872 -> 23.212.251.204:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49868 -> 23.212.251.204:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49876 -> 23.212.251.204:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49874 -> 23.212.251.204:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49877 -> 23.212.251.204:443
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006529BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,5_2_006529BA
            Source: RegAsm.exe, 00000006.00000002.799015556310.00000000056E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
            Source: RegAsm.exe, 00000006.00000002.799015556310.00000000056E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
            Source: RegAsm.exe, 00000006.00000002.799015556310.00000000056E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: RegAsm.exe, 00000006.00000002.799000215143.0000000000C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enl8
            Source: RegAsm.exe, 00000006.00000002.798999302706.0000000000BA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
            Source: RegAsm.exe, 00000006.00000002.798999302706.0000000000BA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.ce
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958923693.00000000044E5000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793961065482.00000000006A9000.00000002.00000001.01000000.00000007.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794121454959.0000000000799000.00000002.00000001.01000000.0000000A.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118840089.0000000004745000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000000.794156362171.0000000000799000.00000002.00000001.01000000.0000000A.sdmp, AutoIt3.exe, 0000000B.00000003.794198505492.00000000044D5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002C95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dll
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002C95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exe
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002C95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exe
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000A.00000002.794286967682.0000000002A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000A.00000002.794286967682.0000000002A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000A.00000002.794286967682.0000000002A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe
            Source: JiH0aUfOU6.exeString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000006.00000002.799001778724.0000000002C95000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000A.00000002.794286967682.0000000002A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000006.00000002.799001778724.0000000002C95000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000A.00000002.794286967682.0000000002A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000006.00000002.799001778724.0000000002C95000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000A.00000002.794286967682.0000000002A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: https://www.autoitscript.com/autoit3/
            Source: AutoIt3.exe.5.drString found in binary or memory: https://www.globalsign.com/repository/0
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AE3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793964098384.000000000440A000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958628330.00000000045C3000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793958879378.00000000044F0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118434840.0000000004823000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794118766961.0000000004750000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126660039.000000000466A000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198102926.00000000045B3000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198442002.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205032608.00000000043FA000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.3.dr, AutoIt3.exe.5.drString found in binary or memory: https://www.globalsign.com/repository/06
            Source: JiH0aUfOU6.exe, 00000002.00000003.793909959428.0000000002C30000.00000004.00001000.00020000.00000000.sdmp, JiH0aUfOU6.exe, 00000002.00000003.793910642068.000000007F5EB000.00000004.00001000.00020000.00000000.sdmp, JiH0aUfOU6.tmp, 00000003.00000000.793913322339.00000000009B1000.00000020.00000001.01000000.00000005.sdmp, JiH0aUfOU6.tmp.2.drString found in binary or memory: https://www.innosetup.com/
            Source: JiH0aUfOU6.exe, 00000002.00000003.793909959428.0000000002C30000.00000004.00001000.00020000.00000000.sdmp, JiH0aUfOU6.exe, 00000002.00000003.793910642068.000000007F5EB000.00000004.00001000.00020000.00000000.sdmp, JiH0aUfOU6.tmp, 00000003.00000000.793913322339.00000000009B1000.00000020.00000001.01000000.00000005.sdmp, JiH0aUfOU6.tmp.2.drString found in binary or memory: https://www.remobjects.com/ps
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00654632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,5_2_00654632
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00654830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00654830
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00744830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,8_2_00744830
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00654632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,5_2_00654632
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00640508 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,5_2_00640508
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0066D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,5_2_0066D164
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0075D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,8_2_0075D164
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 5648, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 8300, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: AutoIt3.exe PID: 8420, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF25F9 CreateDesktopA,CreateProcessA,CreateProcessA,CreateProcessA,CreateProcessA,WaitForSingleObject,5_2_00FF25F9
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF5A81 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,5_2_00FF5A81
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01207321 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,8_2_01207321
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00644254: CreateFileW,DeviceIoControl,CloseHandle,5_2_00644254
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00638F2E DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,5_2_00638F2E
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00645778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,5_2_00645778
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00735778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,8_2_00735778
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005E16635_2_005E1663
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005E9C805_2_005E9C80
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006023F55_2_006023F5
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006684005_2_00668400
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006165025_2_00616502
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0061265E5_2_0061265E
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005EE6F05_2_005EE6F0
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0060282A5_2_0060282A
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006189BF5_2_006189BF
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00616A745_2_00616A74
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00660A3A5_2_00660A3A
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005F0BE05_2_005F0BE0
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0060CD515_2_0060CD51
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0063EDB25_2_0063EDB2
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00648E445_2_00648E44
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00660EB75_2_00660EB7
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00616FE65_2_00616FE6
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006033B75_2_006033B7
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005FD45D5_2_005FD45D
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0060F4095_2_0060F409
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005E94E05_2_005E94E0
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005FF6285_2_005FF628
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006016B45_2_006016B4
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005EF6A05_2_005EF6A0
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006078C35_2_006078C3
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0060DBA55_2_0060DBA5
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00601BA85_2_00601BA8
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00619CE55_2_00619CE5
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005FDD285_2_005FDD28
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00601FC05_2_00601FC0
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0060BFD65_2_0060BFD6
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF53D95_2_00FF53D9
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF53D25_2_00FF53D2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC51D06_2_00EC51D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00ECD9786_2_00ECD978
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00ECE2486_2_00ECE248
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC55306_2_00EC5530
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00ECD6306_2_00ECD630
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC51BF6_2_00EC51BF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00ECB2286_2_00ECB228
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC23E86_2_00EC23E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC24F36_2_00EC24F3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC24DC6_2_00EC24DC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC248A6_2_00EC248A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC24646_2_00EC2464
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC44506_2_00EC4450
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC24516_2_00EC2451
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC24246_2_00EC2424
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC23E86_2_00EC23E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC55216_2_00EC5521
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC1E206_2_00EC1E20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC1E096_2_00EC1E09
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_00EC2FA06_2_00EC2FA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05668D386_2_05668D38
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_056692226_2_05669222
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0566DFA86_2_0566DFA8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0566ABE86_2_0566ABE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_057B47206_2_057B4720
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_057BD3F06_2_057BD3F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_057BB5956_2_057BB595
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_057B2CC06_2_057B2CC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_057BBEF06_2_057BBEF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_057BD3DF6_2_057BD3DF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058486506_2_05848650
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058410E16_2_058410E1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058400406_2_05840040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058400076_2_05840007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05849C206_2_05849C20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058439386_2_05843938
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058769A06_2_058769A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0587875D6_2_0587875D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058787666_2_05878766
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058762DF6_2_058762DF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05870D086_2_05870D08
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05878C746_2_05878C74
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_058769906_2_05876990
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0587884E6_2_0587884E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05CD447D6_2_05CD447D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05CD53606_2_05CD5360
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05CDC5D26_2_05CDC5D2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05CDC5706_2_05CDC570
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05CDC6806_2_05CDC680
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05CD50C26_2_05CD50C2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05CD50D06_2_05CD50D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_05CD53546_2_05CD5354
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_075122286_2_07512228
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_075170186_2_07517018
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_075616B86_2_075616B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_075765E06_2_075765E0
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006D16638_2_006D1663
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006D9C808_2_006D9C80
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006F23F58_2_006F23F5
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_007584008_2_00758400
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_007065028_2_00706502
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0070265E8_2_0070265E
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006DE6F08_2_006DE6F0
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006F282A8_2_006F282A
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_007089BF8_2_007089BF
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00706A748_2_00706A74
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00750A3A8_2_00750A3A
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006E0BE08_2_006E0BE0
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006FCD518_2_006FCD51
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0072EDB28_2_0072EDB2
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00738E448_2_00738E44
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00750EB78_2_00750EB7
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00706FE68_2_00706FE6
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006F33B78_2_006F33B7
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006ED45D8_2_006ED45D
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006FF4098_2_006FF409
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006D94E08_2_006D94E0
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006EF6288_2_006EF628
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006DF6A08_2_006DF6A0
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006F16B48_2_006F16B4
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006F78C38_2_006F78C3
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006F1BA88_2_006F1BA8
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006FDBA58_2_006FDBA5
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00709CE58_2_00709CE5
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006EDD288_2_006EDD28
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006F1FC08_2_006F1FC0
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006FBFD68_2_006FBFD6
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01206C728_2_01206C72
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01206C798_2_01206C79
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
            Source: C:\kchhcfb\AutoIt3.exeCode function: String function: 006E1A36 appears 34 times
            Source: C:\kchhcfb\AutoIt3.exeCode function: String function: 006F8B30 appears 42 times
            Source: C:\kchhcfb\AutoIt3.exeCode function: String function: 006F0D17 appears 70 times
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: String function: 00600D17 appears 70 times
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: String function: 00608B30 appears 42 times
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: String function: 005F1A36 appears 34 times
            Source: JiH0aUfOU6.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
            Source: JiH0aUfOU6.tmp.2.drStatic PE information: Number of sections : 11 > 10
            Source: JiH0aUfOU6.exeStatic PE information: Number of sections : 11 > 10
            Source: JiH0aUfOU6.exe, 00000002.00000000.793908667713.0000000000619000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs JiH0aUfOU6.exe
            Source: JiH0aUfOU6.exe, 00000002.00000003.793910642068.000000007F8EA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs JiH0aUfOU6.exe
            Source: JiH0aUfOU6.exe, 00000002.00000003.793909959428.0000000002D4E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs JiH0aUfOU6.exe
            Source: JiH0aUfOU6.exeBinary or memory string: OriginalFileName vs JiH0aUfOU6.exe
            Source: JiH0aUfOU6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, sSuX93MZsYEcAG0TpT6.csCryptographic APIs: 'CreateDecryptor'
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, sSuX93MZsYEcAG0TpT6.csCryptographic APIs: 'CreateDecryptor'
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, sSuX93MZsYEcAG0TpT6.csCryptographic APIs: 'CreateDecryptor'
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, sSuX93MZsYEcAG0TpT6.csCryptographic APIs: 'CreateDecryptor'
            Source: classification engineClassification label: mal100.spyw.evad.winEXE@15/7@0/1
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064A6AD GetLastError,FormatMessageW,5_2_0064A6AD
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00638DE9 AdjustTokenPrivileges,CloseHandle,5_2_00638DE9
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00639399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,5_2_00639399
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00728DE9 AdjustTokenPrivileges,CloseHandle,8_2_00728DE9
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00729399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,8_2_00729399
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064B976 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,5_2_0064B976
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00644148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,5_2_00644148
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064C9DA CoInitialize,CoCreateInstance,CoUninitialize,5_2_0064C9DA
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064443D FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,5_2_0064443D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\fe5d05a685
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeFile created: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmpJump to behavior
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
            Source: JiH0aUfOU6.exeReversingLabs: Detection: 39%
            Source: JiH0aUfOU6.exeVirustotal: Detection: 41%
            Source: JiH0aUfOU6.exeString found in binary or memory: /LOADINF="filename"
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeFile read: C:\Users\user\Desktop\JiH0aUfOU6.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\JiH0aUfOU6.exe "C:\Users\user\Desktop\JiH0aUfOU6.exe"
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeProcess created: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmp "C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmp" /SL5="$10446,2802098,845824,C:\Users\user\Desktop\JiH0aUfOU6.exe"
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe "C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe" C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\script.a3x
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: unknownProcess created: C:\kchhcfb\AutoIt3.exe "C:\kchhcfb\AutoIt3.exe" C:\kchhcfb\caehccg.a3x
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: unknownProcess created: C:\kchhcfb\AutoIt3.exe "C:\kchhcfb\AutoIt3.exe" C:\kchhcfb\caehccg.a3x
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeProcess created: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmp "C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmp" /SL5="$10446,2802098,845824,C:\Users\user\Desktop\JiH0aUfOU6.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe "C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exe" C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\script.a3xJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: version.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: winmm.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: mpr.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: version.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: winmm.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: mpr.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: JiH0aUfOU6.exeStatic file information: File size 3796818 > 1048576
            Source: JiH0aUfOU6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: wntdll.pdbUGP source: Autoit3.exe, 00000005.00000002.793964374781.0000000004618000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793959685277.000000000447C000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793959276341.000000000459F000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794119196690.00000000047FF000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126821854.0000000004878000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794119647077.00000000046DC000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198842202.000000000458F000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205176005.0000000004608000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794199308020.000000000446C000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Autoit3.exe, 00000005.00000002.793964374781.0000000004618000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793959685277.000000000447C000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793959276341.000000000459F000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794119196690.00000000047FF000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794126821854.0000000004878000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794119647077.00000000046DC000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794198842202.000000000458F000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000002.794205176005.0000000004608000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000000B.00000003.794199308020.000000000446C000.00000004.00001000.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, sSuX93MZsYEcAG0TpT6.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, sSuX93MZsYEcAG0TpT6.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0065C6D9 LoadLibraryA,GetProcAddress,5_2_0065C6D9
            Source: JiH0aUfOU6.exeStatic PE information: section name: .didata
            Source: JiH0aUfOU6.tmp.2.drStatic PE information: section name: .didata
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00608B75 push ecx; ret 5_2_00608B88
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005FCBF1 push eax; retf 5_2_005FCBF8
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FDF01D push 00FDF049h; ret 5_2_00FDF041
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF6015 push 00FF6041h; ret 5_2_00FF6039
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF6014 push 00FF6041h; ret 5_2_00FF6039
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF31D5 push 00FF3221h; ret 5_2_00FF3219
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FE6191 push 00FE61BDh; ret 5_2_00FE61B5
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FEF155 push 00FEF200h; ret 5_2_00FEF1F8
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FEF153 push 00FEF200h; ret 5_2_00FEF1F8
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FDF2E6 push 00FDF5E9h; ret 5_2_00FDF5E1
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF32D5 push 00FF3301h; ret 5_2_00FF32F9
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FDF2AD push 00FDF2D9h; ret 5_2_00FDF2D1
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF329D push 00FF32C9h; ret 5_2_00FF32C1
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF3265 push 00FF3291h; ret 5_2_00FF3289
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF322D push 00FF3259h; ret 5_2_00FF3251
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FEF205 push 00FEF295h; ret 5_2_00FEF28D
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF63CE push 00FF6455h; ret 5_2_00FF644D
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF33B5 push 00FF33E1h; ret 5_2_00FF33D9
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF53A1 push 00FF53CDh; ret 5_2_00FF53C5
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF139D push 00FF13C9h; ret 5_2_00FF13C1
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF337D push 00FF33A9h; ret 5_2_00FF33A1
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF337B push 00FF33A9h; ret 5_2_00FF33A1
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF330D push 00FF3339h; ret 5_2_00FF3331
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF14F1 push 00FF151Dh; ret 5_2_00FF1515
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF14B9 push 00FF14E5h; ret 5_2_00FF14DD
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF6461 push 00FF6487h; ret 5_2_00FF647F
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF6429 push 00FF6455h; ret 5_2_00FF644D
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF6421 push 00FF6455h; ret 5_2_00FF644D
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF2411 push 00FF248Eh; ret 5_2_00FF2486
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF240F push 00FF248Eh; ret 5_2_00FF2486
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF15D1 push 00FF15FDh; ret 5_2_00FF15F5
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, Btu9tePebTQXjVvGwAT.csHigh entropy of concatenated method names: 'WkSeM9ni2S', 'YWQekt7PuU', 'ugHePntybR', 'IyDeUI6V7H', 's45erotgfq', 'IrNelL6RPJ', 'QeNewUSXIw', 'EbwPSBq2RW', 'aJ1eFkKR0r', 'mWoeYe7dw6'
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, sSuX93MZsYEcAG0TpT6.csHigh entropy of concatenated method names: 'RrRNaAzdHOU6Sm950Pw', 'InfF8izpNHNbZgyZE04', 'dVjk7dIuwk', 'vh0ry9Sq2v', 'SV0k2q3gWV', 'kTUk5gbIoh', 'BuCknx1l19', 'fMSkSFAUkS', 'Wntq0dbrJ5o', 'lGMMxor06R'
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, gOmuMgIrJc4M0GvuLa.csHigh entropy of concatenated method names: 'iQBMyJlAjx', 'phg6dQbwmxxAeH5xPdM', 'EBCKtgbFybcfIBimWDG', 'SJajWyYuA', 'EVRXQ0AhN', 'iO9RlAGdf', 'mP4W3WkP2', 'JAdkODFl1', 'MYhP7yy6V', 'u4PrpucS3'
            Source: 6.2.RegAsm.exe.3bf0c90.3.raw.unpack, lygJTCPdTTckQ8GfU2g.csHigh entropy of concatenated method names: 'ThRPWxE45e', 'NBHPMIOttu', 'jmUPkB9JSn', 'd82PPNhHLN', 'oBaPUt2aC9', 'gtrPrMdwPa', 'CxcPlg1UwW', 'hONPw6hdSD', 'FcrPF1NaOS', 'MysPYJCXJm'
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, Btu9tePebTQXjVvGwAT.csHigh entropy of concatenated method names: 'WkSeM9ni2S', 'YWQekt7PuU', 'ugHePntybR', 'IyDeUI6V7H', 's45erotgfq', 'IrNelL6RPJ', 'QeNewUSXIw', 'EbwPSBq2RW', 'aJ1eFkKR0r', 'mWoeYe7dw6'
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, sSuX93MZsYEcAG0TpT6.csHigh entropy of concatenated method names: 'RrRNaAzdHOU6Sm950Pw', 'InfF8izpNHNbZgyZE04', 'dVjk7dIuwk', 'vh0ry9Sq2v', 'SV0k2q3gWV', 'kTUk5gbIoh', 'BuCknx1l19', 'fMSkSFAUkS', 'Wntq0dbrJ5o', 'lGMMxor06R'
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, gOmuMgIrJc4M0GvuLa.csHigh entropy of concatenated method names: 'iQBMyJlAjx', 'phg6dQbwmxxAeH5xPdM', 'EBCKtgbFybcfIBimWDG', 'SJajWyYuA', 'EVRXQ0AhN', 'iO9RlAGdf', 'mP4W3WkP2', 'JAdkODFl1', 'MYhP7yy6V', 'u4PrpucS3'
            Source: 6.2.RegAsm.exe.73c0000.5.raw.unpack, lygJTCPdTTckQ8GfU2g.csHigh entropy of concatenated method names: 'ThRPWxE45e', 'NBHPMIOttu', 'jmUPkB9JSn', 'd82PPNhHLN', 'oBaPUt2aC9', 'gtrPrMdwPa', 'CxcPlg1UwW', 'hONPw6hdSD', 'FcrPF1NaOS', 'MysPYJCXJm'
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeFile created: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpFile created: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\_isetup\_setup64.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeFile created: C:\kchhcfb\AutoIt3.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpFile created: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce caehccgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce caehccgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce caehccgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce caehccgJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006659B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,5_2_006659B3
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005F5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_005F5EDA
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_007559B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,8_2_007559B3
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006E5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,8_2_006E5EDA
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006033B7 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_006033B7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\92F976A0251E9247E50EC0FD39D377B7 be7173f6dded1b27d331d8f4ccf32807Jump to behavior
            Source: C:\Users\user\Desktop\JiH0aUfOU6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: EC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2AB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4AB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2880000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2A40000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4A40000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2CB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4CB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9604Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1770Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-QF4D1.tmp\JiH0aUfOU6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\_isetup\_setup64.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeAPI coverage: 5.7 %
            Source: C:\kchhcfb\AutoIt3.exeAPI coverage: 5.6 %
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3316Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 8244Thread sleep count: 9604 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 8244Thread sleep count: 218 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 8384Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 8468Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00644005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00644005
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064C2FF FindFirstFileW,FindNextFileW,FindClose,5_2_0064C2FF
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064494A GetFileAttributesW,FindFirstFileW,FindClose,5_2_0064494A
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064CD14 FindFirstFileW,FindClose,5_2_0064CD14
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,5_2_0064CD9F
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_0064F5D8
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_0064F735
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0064FA36 FindFirstFileW,Sleep,FindNextFileW,FindClose,5_2_0064FA36
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00643CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00643CE2
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FE08FD FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,5_2_00FE08FD
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FDE22D GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,5_2_00FDE22D
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FE0A05 FindFirstFileA,GetLastError,5_2_00FE0A05
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00734005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_00734005
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073C2FF FindFirstFileW,FindNextFileW,FindClose,8_2_0073C2FF
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073494A GetFileAttributesW,FindFirstFileW,FindClose,8_2_0073494A
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073CD14 FindFirstFileW,FindClose,8_2_0073CD14
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,8_2_0073CD9F
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0073F5D8
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0073F735
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0073FA36 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_0073FA36
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00733CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_00733CE2
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_011F219D FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,8_2_011F219D
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_011F22A5 FindFirstFileA,GetLastError,8_2_011F22A5
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_011EFACD GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,8_2_011EFACD
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005F5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_005F5D13
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: AutoIt3.exe, 0000000B.00000002.794201246647.0000000000DC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware
            Source: Autoit3.exe, Autoit3.exe, 00000005.00000002.793961731763.0000000001027000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793961589460.0000000000FD7000.00000040.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793961281375.0000000000F74000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793954669168.0000000001012000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793954669168.0000000001063000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793961731763.0000000001002000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, AutoIt3.exe, 00000008.00000002.794122273819.0000000001085000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794123321639.00000000011E8000.00000040.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794114493537.0000000001173000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794122273819.00000000010B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft hyper-v video
            Source: AutoIt3.exe, 0000000B.00000002.794201246647.0000000000DC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cSFksJlMugAfJJiCpQzTvHPkiOXPpWhGFSwxpdVRxiinwPGhY0
            Source: Autoit3.exe, 00000005.00000002.793961731763.0000000001027000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793961589460.0000000000FD7000.00000040.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793954669168.000000000100D000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793961951679.000000000105E000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000003.793954669168.000000000105C000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793961731763.0000000001002000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794122273819.0000000001085000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794123321639.00000000011E8000.00000040.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000003.794114493537.000000000111D000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 00000008.00000002.794122939163.000000000116E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
            Source: RegAsm.exe, 00000006.00000002.799015556310.00000000056C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: Autoit3.exe, AutoIt3.exeBinary or memory string: ksJlMugAfJJiCpQzTvHPkiOXPpWhGFSwxpdVRxiinwPGhUIcRINemJjwnThIXtDiaSZYcFozQAClCBmoqTgYgjbYvufIlbsZGmuAQCTOeDegsMqvyazDdYRHIcBaADUJoIqcFMiwYOguJvZrEcIojiaKbAJwvkkMhtTxNwibjQaWdIJEkbCZFGLBqZvDWvHnFGlcEGMmcVFDAQiqcWeVrZaGXiiWDYSXmMHzucFVIOubyDBtdQsJwILHgoVXnVTmQXxT
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeAPI call chain: ExitProcess graph end nodegraph_5-112141
            Source: C:\kchhcfb\AutoIt3.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FEF6EF LdrInitializeThunk,5_2_00FEF6EF
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006545D5 BlockInput,5_2_006545D5
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005F5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,5_2_005F5240
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00615CAC EncodePointer,EncodePointer,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,5_2_00615CAC
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0065C6D9 LoadLibraryA,GetProcAddress,5_2_0065C6D9
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_01001346 mov eax, dword ptr fs:[00000030h]5_2_01001346
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF53D9 mov eax, dword ptr fs:[00000030h]5_2_00FF53D9
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF53D9 mov eax, dword ptr fs:[00000030h]5_2_00FF53D9
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF53D2 mov eax, dword ptr fs:[00000030h]5_2_00FF53D2
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FF53D2 mov eax, dword ptr fs:[00000030h]5_2_00FF53D2
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00FEF4ED mov eax, dword ptr fs:[00000030h]5_2_00FEF4ED
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01200D8D mov eax, dword ptr fs:[00000030h]8_2_01200D8D
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01206C72 mov eax, dword ptr fs:[00000030h]8_2_01206C72
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01206C72 mov eax, dword ptr fs:[00000030h]8_2_01206C72
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01206C79 mov eax, dword ptr fs:[00000030h]8_2_01206C79
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01206C79 mov eax, dword ptr fs:[00000030h]8_2_01206C79
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_01212BE6 mov eax, dword ptr fs:[00000030h]8_2_01212BE6
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006388CD GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,5_2_006388CD
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0060A354 SetUnhandledExceptionFilter,5_2_0060A354
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0060A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0060A385
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006FA354 SetUnhandledExceptionFilter,8_2_006FA354
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_006FA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_006FA385
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeMemory protected: page readonly | page read and write | page write copy | page execute and read and write | page guard | page no cacheJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00639369 LogonUserW,5_2_00639369
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005F5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,5_2_005F5240
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00641AC6 SendInput,keybd_event,5_2_00641AC6
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006451E2 mouse_event,5_2_006451E2
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_006388CD GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,5_2_006388CD
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00644F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,5_2_00644F1C
            Source: JiH0aUfOU6.tmp, 00000003.00000003.794118663736.0000000003AD5000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000005.00000002.793960905346.0000000000696000.00000002.00000001.01000000.00000007.sdmp, Autoit3.exe, 00000005.00000003.793958923693.00000000044D7000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerD
            Source: Autoit3.exe, AutoIt3.exeBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager@
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0060885B cpuid 5_2_0060885B
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,5_2_00FDE405
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: GetLocaleInfoA,5_2_00FE33D5
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: GetLocaleInfoA,5_2_00FE3389
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,5_2_00FDE50F
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: GetLocaleInfoA,GetACP,5_2_00FE4921
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: GetLocaleInfoA,5_2_00FDED29
            Source: C:\kchhcfb\AutoIt3.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,8_2_011EFCA5
            Source: C:\kchhcfb\AutoIt3.exeCode function: GetLocaleInfoA,GetACP,8_2_011F61C1
            Source: C:\kchhcfb\AutoIt3.exeCode function: GetLocaleInfoA,8_2_011F05C9
            Source: C:\kchhcfb\AutoIt3.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,8_2_011EFDAF
            Source: C:\kchhcfb\AutoIt3.exeCode function: GetLocaleInfoA,8_2_011F4C29
            Source: C:\kchhcfb\AutoIt3.exeCode function: GetLocaleInfoA,8_2_011F4C75
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\kchhcfb\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\kchhcfb\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\kchhcfb\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\kchhcfb\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\kchhcfb\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00620030 GetLocalTime,5_2_00620030
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00620722 GetUserNameW,5_2_00620722
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0061416A GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,5_2_0061416A
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_005F5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_005F5D13
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: pibnejdfjmmkpcnlpebklmnkoeoihofecqTronLinkrnkbihfbeogaeaoehlefnkodbefgpgknnsMetaMasktfhbohimaelbohpjbbldcngcnapndodjpuBinance Chain WalletvffnbelfdoeiohenkjibnmadjiehjhajbwYoroixcjelfplplebdjjenllpjcblmjkfcffneyJaxx Libertyzfihkakfobkmkjojpchpfgcmhfjnmnfpi{BitApp Wallet|kncchdigobghenbbaddojjnnaogfppfj}iWallet~aiifbnbfobpmeekipheeijimdpnlpgpp
            Source: RegAsm.exe, 00000006.00000002.799018640142.0000000005937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: PayPal,,,Bank,,,Banking,,,Crypto,,,Exodus,,,Bitcoin,,,Shopify,,,Invest,,,Investing,,,Payment,,,Amazon,,,Ebay,,,Quickbooks,,,Intuit,,,PhoneLink
            Source: RegAsm.exe, 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
            Source: Autoit3.exe, 00000005.00000003.793960060253.0000000004479000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
            Source: AutoIt3.exeBinary or memory string: WIN_81
            Source: AutoIt3.exeBinary or memory string: WIN_XP
            Source: AutoIt3.exeBinary or memory string: WIN_XPe
            Source: AutoIt3.exeBinary or memory string: WIN_VISTA
            Source: AutoIt3.exeBinary or memory string: WIN_7
            Source: AutoIt3.exeBinary or memory string: WIN_8
            Source: AutoIt3.exe.5.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
            Source: Yara matchFile source: 0000000A.00000002.794286967682.0000000002A72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.799001778724.0000000002AC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7508, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 8364, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_0065696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,5_2_0065696E
            Source: C:\Users\user\AppData\Local\Temp\is-2FTC5.tmp\Autoit3.exeCode function: 5_2_00656E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,5_2_00656E32
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_0074696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,8_2_0074696E
            Source: C:\kchhcfb\AutoIt3.exeCode function: 8_2_00746E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,8_2_00746E32
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            321
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            Create Account
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Command and Scripting Interpreter
            2
            Valid Accounts
            2
            Valid Accounts
            2
            Obfuscated Files or Information
            Security Account Manager1
            File and Directory Discovery
            SMB/Windows Admin Shares21
            Input Capture
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            Registry Run Keys / Startup Folder
            21
            Access Token Manipulation
            2
            Software Packing
            NTDS257
            System Information Discovery
            Distributed Component Object Model3
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets451
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
            Registry Run Keys / Startup Folder
            1
            Masquerading
            Cached Domain Credentials341
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Valid Accounts
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Modify Registry
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt341
            Virtualization/Sandbox Evasion
            /etc/passwd and /etc/shadow3
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron21
            Access Token Manipulation
            Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd12
            Process Injection
            Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1593605 Sample: JiH0aUfOU6.exe Startdate: 17/01/2025 Architecture: WINDOWS Score: 100 44 Suricata IDS alerts for network traffic 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 4 other signatures 2->50 8 JiH0aUfOU6.exe 2 2->8         started        11 AutoIt3.exe 2->11         started        13 AutoIt3.exe 2->13         started        process3 file4 32 C:\Users\user\AppData\...\JiH0aUfOU6.tmp, PE32 8->32 dropped 15 JiH0aUfOU6.tmp 3 5 8->15         started        18 RegAsm.exe 3 11->18         started        20 RegAsm.exe 11->20         started        22 RegAsm.exe 2 13->22         started        process5 file6 36 C:\Users\user\AppData\Local\...\Autoit3.exe, PE32 15->36 dropped 38 C:\Users\user\AppData\Local\...\script.a3x, zlib 15->38 dropped 40 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 15->40 dropped 24 Autoit3.exe 1 4 15->24         started        process7 file8 34 C:\kchhcfb\AutoIt3.exe, PE32 24->34 dropped 52 Found many strings related to Crypto-Wallets (likely being stolen) 24->52 28 RegAsm.exe 1 2 24->28         started        signatures9 process10 dnsIp11 42 185.196.10.22, 49869, 49870, 56001 SIMPLECARRIERCH Switzerland 28->42 54 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 28->54 56 Found many strings related to Crypto-Wallets (likely being stolen) 28->56 58 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 28->58 60 3 other signatures 28->60 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.