Size | 289.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | fe3dffdc4a273c8d4b2cd301a1d98abf |
SHA1 | 00e1b5fbe988040bc1d8d730a6409b191c9d44d3 |
SHA256 | 1be9e53de49352dd005694defe603db6ff2091c0e413c8517adca3772de411f3 |
SHA512 |
2078739d0456c541ae0ccf5a8c475bd5dd80b6c488470eec70f3a295e0b5a8676addc49e56ab6fe1eed59aacd4ce5fd6b8b7407158caaf539367b98b09b97b46
|
CRC32 | A03BD41B |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | April 8, 2025, 11:35 a.m. | April 8, 2025, 11:43 a.m. | 445 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-08 11:32:53,062 [analyzer] DEBUG: Starting analyzer from: C:\tmpwwr_kc 2025-04-08 11:32:53,062 [analyzer] DEBUG: Pipe server name: \??\PIPE\XxidFYjVFxbMyvUU 2025-04-08 11:32:53,078 [analyzer] DEBUG: Log pipe server name: \??\PIPE\jjWoFfBUGlmpiAlSzrBWb 2025-04-08 11:32:53,687 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-08 11:32:53,687 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-08 11:32:54,921 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-08 11:32:55,140 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-04-08 11:32:55,155 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-08 11:32:55,155 [analyzer] DEBUG: Started auxiliary module Human 2025-04-08 11:32:55,155 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-08 11:32:55,155 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-08 11:32:55,312 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-08 11:32:55,312 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-08 11:32:55,312 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-08 11:32:55,312 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-08 11:32:55,500 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\00e1b5fbe988040bc1d8d730a6409b191c9d44d3.exe' with arguments '' and pid 2832 2025-04-08 11:32:55,671 [analyzer] DEBUG: Loaded monitor into process with pid 2832 2025-04-08 11:32:56,280 [analyzer] INFO: Added new file to list with pid 2832 and path C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe 2025-04-08 11:32:56,500 [analyzer] INFO: Injected into process with pid 1352 and name u'hyma.exe' 2025-04-08 11:32:56,687 [analyzer] DEBUG: Loaded monitor into process with pid 1352 2025-04-08 11:32:57,467 [analyzer] DEBUG: Loaded monitor into process with pid 1492 2025-04-08 11:32:57,467 [analyzer] INFO: Injected into process with pid 1492 and name u'taskhost.exe' 2025-04-08 11:32:57,812 [analyzer] DEBUG: Loaded monitor into process with pid 1592 2025-04-08 11:32:57,812 [analyzer] INFO: Injected into process with pid 1592 and name u'dwm.exe' 2025-04-08 11:32:58,171 [analyzer] DEBUG: Loaded monitor into process with pid 1724 2025-04-08 11:32:58,171 [analyzer] INFO: Injected into process with pid 1724 and name u'explorer.exe' 2025-04-08 11:32:58,187 [analyzer] WARNING: Received request to inject Cuckoo processes, skipping it. 2025-04-08 11:32:58,703 [analyzer] DEBUG: Loaded monitor into process with pid 608 2025-04-08 11:32:58,703 [analyzer] INFO: Injected into process with pid 608 and name u'mobsync.exe' 2025-04-08 11:32:58,717 [analyzer] WARNING: Received request to inject Cuckoo processes, skipping it. 2025-04-08 11:32:59,515 [analyzer] INFO: Process with pid 608 has terminated 2025-04-08 11:33:06,655 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback. 2025-04-08 11:33:06,655 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback. 2025-04-08 11:33:06,655 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback. 2025-04-08 11:33:06,655 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback. 2025-04-08 11:33:06,655 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback. 2025-04-08 11:33:06,655 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback. 2025-04-08 11:33:06,655 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback. 2025-04-08 11:33:06,733 [analyzer] INFO: io=NULL 2025-04-08 11:33:06,733 [analyzer] DEBUG: Error resolving function jscript9!JsGlobalObjectDefaultEvalHelper through our custom callback. 2025-04-08 11:33:06,733 [analyzer] DEBUG: Loaded monitor into process with pid 2776 2025-04-08 11:33:06,733 [analyzer] INFO: Injected into process with pid 2776 and name u'WinMail.exe' 2025-04-08 11:33:06,750 [analyzer] INFO: Added new file to list with pid 2832 and path C:\Users\Administrator\AppData\Local\Temp\tmp82dfcd5b.bat 2025-04-08 11:33:06,875 [analyzer] INFO: Injected into process with pid 220 and name u'cmd.exe' 2025-04-08 11:33:07,092 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2832. 2025-04-08 11:33:07,125 [analyzer] DEBUG: Loaded monitor into process with pid 220 2025-04-08 11:33:07,250 [analyzer] INFO: Added pid 220 for u'C:\\Users\\Administrator\\AppData\\Local\\Temp\\tmp82dfcd5b.bat' 2025-04-08 11:33:07,375 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 220. 2025-04-08 11:33:07,515 [analyzer] INFO: Process with pid 2832 has terminated 2025-04-08 11:33:07,515 [analyzer] INFO: Process with pid 220 has terminated 2025-04-08 10:38:43,493 [analyzer] INFO: Added new file to list with pid 2776 and path C:\Users\Administrator\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore 2025-04-08 10:38:43,572 [analyzer] INFO: Added new file to list with pid 2776 and path C:\Users\Administrator\AppData\Local\Microsoft\Windows Mail\edb.chk 2025-04-08 10:38:44,056 [analyzer] INFO: Added new file to list with pid 2776 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735 2025-04-08 10:38:44,056 [analyzer] INFO: Added new file to list with pid 2776 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735 2025-04-08 10:38:44,213 [analyzer] INFO: Added new file to list with pid 2776 and path C:\Users\Administrator\AppData\Local\Temp\CabA845.tmp 2025-04-08 10:38:44,338 [analyzer] INFO: Added new file to list with pid 2776 and path C:\Users\Administrator\AppData\Local\Temp\TarA856.tmp 2025-04-08 10:38:53,134 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-04-08 10:38:53,479 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 1352. 2025-04-08 10:38:53,759 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1492. 2025-04-08 10:38:53,884 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1592. 2025-04-08 10:38:53,963 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1724. 2025-04-08 10:38:54,040 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 2776. 2025-04-08 10:38:54,322 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-08 10:38:54,322 [lib.api.process] INFO: Successfully terminated process with pid 1352. 2025-04-08 10:38:54,322 [lib.api.process] INFO: Successfully terminated process with pid 1492. 2025-04-08 10:38:54,322 [lib.api.process] INFO: Successfully terminated process with pid 1592. 2025-04-08 10:38:54,338 [lib.api.process] INFO: Successfully terminated process with pid 1724. 2025-04-08 10:38:54,338 [lib.api.process] INFO: Successfully terminated process with pid 2776. 2025-04-08 10:38:54,697 [analyzer] INFO: Analysis completed.
2025-04-08 11:35:44,909 [cuckoo.core.scheduler] DEBUG: Task #6249990: no machine available yet 2025-04-08 11:35:45,942 [cuckoo.core.scheduler] DEBUG: Task #6249990: no machine available yet 2025-04-08 11:35:46,984 [cuckoo.core.scheduler] DEBUG: Task #6249990: no machine available yet 2025-04-08 11:35:48,020 [cuckoo.core.scheduler] DEBUG: Task #6249990: no machine available yet 2025-04-08 11:35:49,057 [cuckoo.core.scheduler] DEBUG: Task #6249990: no machine available yet 2025-04-08 11:35:50,122 [cuckoo.core.scheduler] DEBUG: Task #6249990: no machine available yet 2025-04-08 11:35:51,183 [cuckoo.core.scheduler] INFO: Task #6249990: acquired machine win7x645 (label=win7x645) 2025-04-08 11:35:51,184 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.205 for task #6249990 2025-04-08 11:35:51,591 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1990003 (interface=vboxnet0, host=192.168.168.205) 2025-04-08 11:35:52,599 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x645 2025-04-08 11:35:53,191 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x645 to vmcloak 2025-04-08 11:38:12,914 [cuckoo.core.guest] INFO: Starting analysis #6249990 on guest (id=win7x645, ip=192.168.168.205) 2025-04-08 11:38:13,919 [cuckoo.core.guest] DEBUG: win7x645: not ready yet 2025-04-08 11:38:18,951 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x645, ip=192.168.168.205) 2025-04-08 11:38:19,237 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x645, ip=192.168.168.205, monitor=latest, size=6660546) 2025-04-08 11:38:21,600 [cuckoo.core.resultserver] DEBUG: Task #6249990: live log analysis.log initialized. 2025-04-08 11:38:23,808 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:24,268 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:25,038 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/e3b0c44298fc1c14_hyma.exe' 2025-04-08 11:38:25,064 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 0 2025-04-08 11:38:25,083 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'shots/0001.jpg' 2025-04-08 11:38:25,119 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 133508 2025-04-08 11:38:25,221 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:26,133 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:26,303 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:26,590 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:27,091 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:35,200 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:35,621 [cuckoo.core.resultserver] DEBUG: Task #6249990 is sending a BSON stream 2025-04-08 11:38:35,863 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/1be9e53de49352dd_00e1b5fbe988040bc1d8d730a6409b191c9d44d3.exe' 2025-04-08 11:38:35,868 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 295976 2025-04-08 11:38:35,879 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/79186b33a5bc1cd8_tmp82dfcd5b.bat' 2025-04-08 11:38:35,881 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 278 2025-04-08 11:38:36,145 [cuckoo.core.guest] DEBUG: win7x645: analysis #6249990 still processing 2025-04-08 11:38:44,423 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/d12dd18018f984aa_CabA845.tmp' 2025-04-08 11:38:44,427 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 58383 2025-04-08 11:38:44,437 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/78eeb661b72a34ca_TarA856.tmp' 2025-04-08 11:38:44,441 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 146584 2025-04-08 11:38:51,388 [cuckoo.core.guest] DEBUG: win7x645: analysis #6249990 still processing 2025-04-08 11:38:54,166 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'curtain/1744101534.15.curtain.log' 2025-04-08 11:38:54,169 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 36 2025-04-08 11:38:54,301 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'sysmon/1744101534.29.sysmon.xml' 2025-04-08 11:38:54,321 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 733374 2025-04-08 11:38:54,349 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/3193952c83d4cd90_edb.chk' 2025-04-08 11:38:54,351 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 8192 2025-04-08 11:38:54,356 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/2654c273c211ae1a_e6024eac88e6b6165d49fe3c95add735' 2025-04-08 11:38:54,359 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 558 2025-04-08 11:38:54,494 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/56fe5537d2173488_hyma.exe' 2025-04-08 11:38:54,544 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 295976 2025-04-08 11:38:54,589 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/0bd9822857d57f4c_e6024eac88e6b6165d49fe3c95add735' 2025-04-08 11:38:54,591 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 232 2025-04-08 11:38:54,663 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'shots/0002.jpg' 2025-04-08 11:38:54,678 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 129623 2025-04-08 11:38:54,689 [cuckoo.core.resultserver] DEBUG: Task #6249990: File upload for 'files/fa697b357cdc6c37_windowsmail.msmessagestore' 2025-04-08 11:38:54,715 [cuckoo.core.resultserver] DEBUG: Task #6249990 uploaded file length: 2113536 2025-04-08 11:38:54,745 [cuckoo.core.resultserver] DEBUG: Task #6249990 had connection reset for <Context for LOG> 2025-04-08 11:38:57,425 [cuckoo.core.guest] INFO: win7x645: analysis completed successfully 2025-04-08 11:38:57,435 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-08 11:38:57,466 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-08 11:38:58,295 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x645 to path /srv/cuckoo/cwd/storage/analyses/6249990/memory.dmp 2025-04-08 11:38:58,297 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x645 2025-04-08 11:43:06,440 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.205 for task #6249990 2025-04-08 11:43:06,932 [cuckoo.core.scheduler] DEBUG: Released database task #6249990 2025-04-08 11:43:10,529 [cuckoo.core.scheduler] INFO: Task #6249990: analysis procedure completed
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\DigitalProductId |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\InstallDate |
section | .text5 |
section | .text6 |
resource name | MUI |
resource name | WEVT_TEMPLATE |
file | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe |
file | C:\Users\Administrator\AppData\Local\Temp\tmp82dfcd5b.bat |
cmdline | "C:\Windows\system32\cmd.exe" /c "C:\Users\ADMINI~1\AppData\Local\Temp\tmp82dfcd5b.bat" |
file | C:\Users\Administrator\AppData\Local\Temp\00e1b5fbe988040bc1d8d730a6409b191c9d44d3.exe |
section | {u'size_of_data': u'0x00042200', u'virtual_address': u'0x00001000', u'entropy': 7.746031957669219, u'name': u'.text', u'virtual_size': u'0x0004210e'} | entropy | 7.74603195767 | description | A section with a high entropy has been found | |||||||||
entropy | 0.921602787456 | description | Overall entropy of this PE file is high |
buffer | Buffer with sha1: 7d407f22f33e50438ebb4f35959470945ce4b845 |
buffer | Buffer with sha1: 0db1ef5ba5b311f90e446cd3ec958517fb11f74b |
buffer | Buffer with sha1: 0e5adddafc096d4ae0d6e1dbe2552f0be8e0dacd |
buffer | Buffer with sha1: d9327f46331b2e42f5b0d89c964ae43927d483ea |
buffer | Buffer with sha1: 00a9eae0eed238d90681d1a7e75b976e6d8491d1 |
buffer | Buffer with sha1: bde398b2b74114d1ce107a19c5677f56a9a16483 |
buffer | Buffer with sha1: 8b57e8ddfad668f7e99540247dddce89c0a20d59 |
buffer | Buffer with sha1: 8911a2d76c3c241ce2feb2cb8c15194815dd101c |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{80601B30-FADA-AD4A-1F2F-A02B0BD98336} | reg_value | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe |
file | C:\Users\Administrator\AppData\Roaming\Uzqasu\hyma.exe |
Process injection | Process 1352 created a remote thread in non-child process 1492 |
Process injection | Process 1352 created a remote thread in non-child process 1592 |
Process injection | Process 1352 created a remote thread in non-child process 1724 |
Process injection | Process 1352 created a remote thread in non-child process 1672 |
Process injection | Process 1352 created a remote thread in non-child process 608 |
Process injection | Process 1352 created a remote thread in non-child process 2968 |
Process injection | Process 1352 created a remote thread in non-child process 2832 |
Process injection | Process 1352 created a remote thread in non-child process 2776 |
Process injection | Process 1352 manipulating memory of non-child process 1492 |
Process injection | Process 1352 manipulating memory of non-child process 1592 |
Process injection | Process 1352 manipulating memory of non-child process 1724 |
Process injection | Process 1352 manipulating memory of non-child process 1672 |
Process injection | Process 1352 manipulating memory of non-child process 608 |
Process injection | Process 1352 manipulating memory of non-child process 2968 |
Process injection | Process 1352 manipulating memory of non-child process 2832 |
Process injection | Process 1352 manipulating memory of non-child process 2776 |
Process injection | Process 1352 injected into non-child 1492 |
Process injection | Process 1352 injected into non-child 1592 |
Process injection | Process 1352 injected into non-child 1724 |
Process injection | Process 1352 injected into non-child 1672 |
Process injection | Process 1352 injected into non-child 608 |
Process injection | Process 1352 injected into non-child 2968 |
Process injection | Process 1352 injected into non-child 2832 |
Process injection | Process 1352 injected into non-child 2776 |
Time & API | Arguments | Status | Return | Repeated |
---|---|---|---|---|
WriteProcessMemory |
buffer: |