Status: Malicious
| Category | Package | Started | Completed | Duration | Options | Log(s) | MalScore |
|---|---|---|---|---|---|---|---|
| FILE | dll | 2025-12-09 15:14:52 | 2025-12-09 15:18:16 | 204 seconds | Show Options | Show Analysis Log | 8.0 |
vnc_port=5902
2025-12-06 10:13:09,665 [root] INFO: Date set to: 20251209T07:11:46, timeout set to: 180
2025-12-09 07:11:46,000 [root] DEBUG: Starting analyzer from: C:\tmpe2ctq1nb
2025-12-09 07:11:46,000 [root] DEBUG: Storing results at: C:\VmtIcCTsP
2025-12-09 07:11:46,000 [root] DEBUG: Pipe server name: \\.\PIPE\tzXQbIoOAA
2025-12-09 07:11:46,000 [root] DEBUG: Python path: C:\Python38
2025-12-09 07:11:46,000 [root] INFO: analysis running as an admin
2025-12-09 07:11:46,000 [root] INFO: analysis package specified: "dll"
2025-12-09 07:11:46,000 [root] DEBUG: importing analysis package module: "modules.packages.dll"...
2025-12-09 07:11:46,000 [root] DEBUG: imported analysis package "dll"
2025-12-09 07:11:46,000 [root] DEBUG: initializing analysis package "dll"...
2025-12-09 07:11:46,000 [lib.common.common] INFO: wrapping
2025-12-09 07:11:46,000 [lib.core.compound] INFO: C:\Users\user\AppData\Local\Temp already exists, skipping creation
2025-12-09 07:11:46,000 [root] DEBUG: New location of moved file: C:\Users\user\AppData\Local\Temp\red_core.exe
2025-12-09 07:11:46,000 [root] INFO: Analyzer: Package modules.packages.dll does not specify a DLL option
2025-12-09 07:11:46,000 [root] INFO: Analyzer: Package modules.packages.dll does not specify a DLL_64 option
2025-12-09 07:11:46,000 [root] INFO: Analyzer: Package modules.packages.dll does not specify a loader option
2025-12-09 07:11:46,000 [root] INFO: Analyzer: Package modules.packages.dll does not specify a loader_64 option
2025-12-09 07:11:46,031 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser"
2025-12-09 07:11:46,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.curtain"
2025-12-09 07:11:46,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise"
2025-12-09 07:11:46,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.during_script"
2025-12-09 07:11:46,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.end_noisy_tasks"
2025-12-09 07:11:46,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.evtx"
2025-12-09 07:11:46,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human"
2025-12-09 07:11:46,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.pre_script"
2025-12-09 07:11:46,062 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2025-12-09 07:11:46,078 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab'
2025-12-09 07:11:46,078 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw'
2025-12-09 07:11:46,093 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots"
2025-12-09 07:11:46,093 [root] DEBUG: Imported auxiliary module "modules.auxiliary.sysmon"
2025-12-09 07:11:46,093 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump"
2025-12-09 07:11:46,093 [root] DEBUG: Imported auxiliary module "modules.auxiliary.usage"
2025-12-09 07:11:46,093 [root] DEBUG: Initialized auxiliary module "Browser"
2025-12-09 07:11:46,093 [root] DEBUG: attempting to configure 'Browser' from data
2025-12-09 07:11:46,093 [root] DEBUG: module Browser does not support data configuration, ignoring
2025-12-09 07:11:46,093 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"...
2025-12-09 07:11:46,093 [root] DEBUG: Started auxiliary module modules.auxiliary.browser
2025-12-09 07:11:46,093 [root] DEBUG: Initialized auxiliary module "Curtain"
2025-12-09 07:11:46,093 [root] DEBUG: attempting to configure 'Curtain' from data
2025-12-09 07:11:46,093 [root] DEBUG: module Curtain does not support data configuration, ignoring
2025-12-09 07:11:46,093 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.curtain"...
2025-12-09 07:11:46,093 [root] DEBUG: Started auxiliary module modules.auxiliary.curtain
2025-12-09 07:11:46,093 [root] DEBUG: Initialized auxiliary module "Disguise"
2025-12-09 07:11:46,093 [root] DEBUG: attempting to configure 'Disguise' from data
2025-12-09 07:11:46,093 [root] DEBUG: module Disguise does not support data configuration, ignoring
2025-12-09 07:11:46,093 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"...
2025-12-09 07:11:46,093 [modules.auxiliary.disguise] INFO: Disguising GUID to 2d2c969c-b425-4c97-99af-36b212a58368
2025-12-09 07:11:46,093 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise
2025-12-09 07:11:46,093 [root] DEBUG: Initialized auxiliary module "End_noisy_tasks"
2025-12-09 07:11:46,093 [root] DEBUG: attempting to configure 'End_noisy_tasks' from data
2025-12-09 07:11:46,093 [root] DEBUG: module End_noisy_tasks does not support data configuration, ignoring
2025-12-09 07:11:46,093 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.end_noisy_tasks"...
2025-12-09 07:11:46,093 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM wuauclt.exe
2025-12-09 07:11:46,093 [root] DEBUG: Started auxiliary module modules.auxiliary.end_noisy_tasks
2025-12-09 07:11:46,093 [root] DEBUG: Initialized auxiliary module "Evtx"
2025-12-09 07:11:46,093 [root] DEBUG: attempting to configure 'Evtx' from data
2025-12-09 07:11:46,093 [root] DEBUG: module Evtx does not support data configuration, ignoring
2025-12-09 07:11:46,093 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.evtx"...
2025-12-09 07:11:46,093 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security State Change" /success:enable /failure:enable
2025-12-09 07:11:46,093 [root] DEBUG: Started auxiliary module modules.auxiliary.evtx
2025-12-09 07:11:46,109 [root] DEBUG: Initialized auxiliary module "Human"
2025-12-09 07:11:46,109 [root] DEBUG: attempting to configure 'Human' from data
2025-12-09 07:11:46,109 [root] DEBUG: module Human does not support data configuration, ignoring
2025-12-09 07:11:46,109 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"...
2025-12-09 07:11:46,109 [root] DEBUG: Started auxiliary module modules.auxiliary.human
2025-12-09 07:11:46,109 [root] DEBUG: Initialized auxiliary module "Pre_script"
2025-12-09 07:11:46,109 [root] DEBUG: attempting to configure 'Pre_script' from data
2025-12-09 07:11:46,109 [root] DEBUG: module Pre_script does not support data configuration, ignoring
2025-12-09 07:11:46,109 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.pre_script"...
2025-12-09 07:11:46,109 [root] DEBUG: Started auxiliary module modules.auxiliary.pre_script
2025-12-09 07:11:46,109 [root] DEBUG: Initialized auxiliary module "Screenshots"
2025-12-09 07:11:46,109 [root] DEBUG: attempting to configure 'Screenshots' from data
2025-12-09 07:11:46,109 [root] DEBUG: module Screenshots does not support data configuration, ignoring
2025-12-09 07:11:46,109 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"...
2025-12-09 07:11:46,109 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots
2025-12-09 07:11:46,109 [root] DEBUG: Initialized auxiliary module "Sysmon"
2025-12-09 07:11:46,109 [root] DEBUG: attempting to configure 'Sysmon' from data
2025-12-09 07:11:46,109 [root] DEBUG: module Sysmon does not support data configuration, ignoring
2025-12-09 07:11:46,109 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.sysmon"...
2025-12-09 07:11:46,203 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security System Extension" /success:enable /failure:enable
2025-12-09 07:11:46,249 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"System Integrity" /success:enable /failure:enable
2025-12-09 07:11:46,265 [root] WARNING: Cannot execute auxiliary module modules.auxiliary.sysmon: In order to use the Sysmon functionality, it is required to have the SMaster(64|32).exe file and sysmonconfig-export.xml file in the bin path. Note that the SMaster(64|32).exe files are just the standard Sysmon binaries renamed to avoid anti-analysis detection techniques.
2025-12-09 07:11:46,265 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets"
2025-12-09 07:11:46,265 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data
2025-12-09 07:11:46,265 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring
2025-12-09 07:11:46,265 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"...
2025-12-09 07:11:46,265 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 448
2025-12-09 07:11:46,265 [lib.api.process] INFO: Monitor config for <Process 448 lsass.exe>: C:\tmpe2ctq1nb\dll\448.ini
2025-12-09 07:11:46,281 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor
2025-12-09 07:11:46,281 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:11:46,296 [root] DEBUG: Loader: Injecting process 448 with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:11:46,296 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Driver" /success:disable /failure:disable
2025-12-09 07:11:46,312 [root] DEBUG: 448: Python path set to 'C:\Python38'.
2025-12-09 07:11:46,312 [root] INFO: Disabling sleep skipping.
2025-12-09 07:11:46,312 [root] DEBUG: 448: TLS secret dump mode enabled.
2025-12-09 07:11:46,312 [root] DEBUG: 448: Monitor initialised: 64-bit capemon loaded in process 448 at 0x000007FEF3CA0000, thread 760, image base 0x00000000FF850000, stack from 0x0000000001864000-0x0000000001870000
2025-12-09 07:11:46,312 [root] DEBUG: 448: Commandline: C:\Windows\system32\lsass.exe
2025-12-09 07:11:46,328 [root] DEBUG: 448: Hooked 5 out of 5 functions
2025-12-09 07:11:46,328 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-09 07:11:46,328 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:11:46,328 [lib.api.process] INFO: Injected into 64-bit <Process 448 lsass.exe>
2025-12-09 07:11:46,328 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump
2025-12-09 07:11:46,328 [root] DEBUG: Initialized auxiliary module "Usage"
2025-12-09 07:11:46,328 [root] DEBUG: attempting to configure 'Usage' from data
2025-12-09 07:11:46,328 [root] DEBUG: module Usage does not support data configuration, ignoring
2025-12-09 07:11:46,328 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.usage"...
2025-12-09 07:11:46,328 [root] DEBUG: Started auxiliary module modules.auxiliary.usage
2025-12-09 07:11:46,328 [root] DEBUG: Initialized auxiliary module "During_script"
2025-12-09 07:11:46,328 [root] DEBUG: attempting to configure 'During_script' from data
2025-12-09 07:11:46,328 [root] DEBUG: module During_script does not support data configuration, ignoring
2025-12-09 07:11:46,328 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.during_script"...
2025-12-09 07:11:46,343 [root] DEBUG: Started auxiliary module modules.auxiliary.during_script
2025-12-09 07:11:46,343 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other System Events" /success:disable /failure:enable
2025-12-09 07:11:46,390 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM wusa.exe
2025-12-09 07:11:46,406 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Logon" /success:enable /failure:enable
2025-12-09 07:11:46,453 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Logoff" /success:enable /failure:enable
2025-12-09 07:11:46,468 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM WindowsUpdate.exe
2025-12-09 07:11:46,484 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Account Lockout" /success:enable /failure:enable
2025-12-09 07:11:46,500 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Main Mode" /success:disable /failure:disable
2025-12-09 07:11:46,515 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Quick Mode" /success:disable /failure:disable
2025-12-09 07:11:46,531 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM GoogleUpdate.exe
2025-12-09 07:11:46,531 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Extended Mode" /success:disable /failure:disable
2025-12-09 07:11:46,546 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Logon/Logoff Events" /success:enable /failure:enable
2025-12-09 07:11:46,562 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM MicrosoftEdgeUpdate.exe
2025-12-09 07:11:46,578 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable
2025-12-09 07:11:46,593 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Special Logon" /success:enable /failure:enable
2025-12-09 07:11:46,609 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"File System" /success:enable /failure:enable
2025-12-09 07:11:46,640 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v DisableWindowsUpdateAccess /t REG_DWORD /d 1 /f
2025-12-09 07:11:46,640 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Registry" /success:enable /failure:enable
2025-12-09 07:11:46,656 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f
2025-12-09 07:11:46,671 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kernel Object" /success:enable /failure:enable
2025-12-09 07:11:46,687 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v EnableICMPRedirect /t REG_DWORD /d 0 /f
2025-12-09 07:11:46,687 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"SAM" /success:disable /failure:disable
2025-12-09 07:11:46,703 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Certification Services" /success:enable /failure:enable
2025-12-09 07:11:46,718 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Handle Manipulation" /success:disable /failure:disable
2025-12-09 07:11:46,734 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Application Generated" /success:enable /failure:enable
2025-12-09 07:11:46,750 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"File Share" /success:enable /failure:enable
2025-12-09 07:11:46,765 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:disable /failure:disable
2025-12-09 07:11:46,781 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:disable
2025-12-09 07:11:46,796 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Object Access Events" /success:disable /failure:disable
2025-12-09 07:11:46,812 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Sensitive Privilege Use" /success:disable /failure:disable
2025-12-09 07:11:46,828 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Non Sensitive Privilege Use" /success:disable /failure:disable
2025-12-09 07:11:46,843 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Privilege Use Events" /success:disable /failure:disable
2025-12-09 07:11:46,859 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"RPC Events" /success:enable /failure:enable
2025-12-09 07:11:46,875 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Audit Policy Change" /success:enable /failure:enable
2025-12-09 07:11:46,890 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Authentication Policy Change" /success:enable /failure:enable
2025-12-09 07:11:46,906 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"MPSSVC Rule-Level Policy Change" /success:disable /failure:disable
2025-12-09 07:11:46,921 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Policy Change" /success:disable /failure:disable
2025-12-09 07:11:46,937 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Policy Change Events" /success:disable /failure:enable
2025-12-09 07:11:46,953 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable
2025-12-09 07:11:46,953 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Computer Account Management" /success:enable /failure:enable
2025-12-09 07:11:46,968 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
2025-12-09 07:11:46,984 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Distribution Group Management" /success:enable /failure:enable
2025-12-09 07:11:47,000 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Application Group Management" /success:enable /failure:enable
2025-12-09 07:11:47,015 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Account Management Events" /success:enable /failure:enable
2025-12-09 07:11:47,031 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Access" /success:enable /failure:enable
2025-12-09 07:11:47,046 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Changes" /success:enable /failure:enable
2025-12-09 07:11:47,062 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Replication" /success:disable /failure:enable
2025-12-09 07:11:47,078 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Detailed Directory Service Replication" /success:disable /failure:disable
2025-12-09 07:11:47,093 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Credential Validation" /success:enable /failure:enable
2025-12-09 07:11:47,109 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kerberos Service Ticket Operations" /success:enable /failure:enable
2025-12-09 07:11:47,125 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Account Logon Events" /success:enable /failure:enable
2025-12-09 07:11:47,140 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kerberos Authentication Service" /success:enable /failure:enable
2025-12-09 07:11:47,156 [modules.auxiliary.evtx] DEBUG: Wiping Application
2025-12-09 07:11:47,171 [modules.auxiliary.evtx] DEBUG: Wiping HardwareEvents
2025-12-09 07:11:47,187 [modules.auxiliary.evtx] DEBUG: Wiping Internet Explorer
2025-12-09 07:11:47,203 [modules.auxiliary.evtx] DEBUG: Wiping Key Management Service
2025-12-09 07:11:47,218 [modules.auxiliary.evtx] DEBUG: Wiping OAlerts
2025-12-09 07:11:47,234 [modules.auxiliary.evtx] DEBUG: Wiping Security
2025-12-09 07:11:47,249 [modules.auxiliary.evtx] DEBUG: Wiping Setup
2025-12-09 07:11:47,265 [modules.auxiliary.evtx] DEBUG: Wiping System
2025-12-09 07:11:47,296 [modules.auxiliary.evtx] DEBUG: Wiping Windows PowerShell
2025-12-09 07:11:47,296 [modules.auxiliary.evtx] DEBUG: Wiping Microsoft-Windows-Sysmon/Operational
2025-12-09 07:11:51,562 [root] INFO: Restarting WMI Service
2025-12-09 07:11:53,593 [root] DEBUG: package modules.packages.dll does not support configure, ignoring
2025-12-09 07:11:53,593 [root] WARNING: configuration error for package modules.packages.dll: error importing data.packages.dll: No module named 'data.packages'
2025-12-09 07:11:53,593 [lib.common.common] INFO: Submitted file is missing extension, adding .dll
2025-12-09 07:11:53,593 [lib.core.compound] INFO: C:\Users\user\AppData\Local\Temp already exists, skipping creation
2025-12-09 07:11:53,593 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\System32\rundll32.exe" with arguments ""C:\Users\user\AppData\Local\Temp\red_core.exe.dll",#1" with pid 2648
2025-12-09 07:11:53,593 [lib.api.process] INFO: Monitor config for <Process 2648 rundll32.exe>: C:\tmpe2ctq1nb\dll\2648.ini
2025-12-09 07:11:53,593 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpe2ctq1nb\dll\YOHostJz.dll, loader C:\tmpe2ctq1nb\bin\ESyjZHE.exe
2025-12-09 07:11:53,609 [root] DEBUG: Loader: Injecting process 2648 (thread 2728) with C:\tmpe2ctq1nb\dll\YOHostJz.dll.
2025-12-09 07:11:53,609 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:11:53,609 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\YOHostJz.dll.
2025-12-09 07:11:53,609 [lib.api.process] INFO: Injected into 32-bit <Process 2648 rundll32.exe>
2025-12-09 07:11:55,609 [lib.api.process] INFO: Successfully resumed <Process 2648 rundll32.exe>
2025-12-09 07:11:55,640 [root] DEBUG: 2648: Python path set to 'C:\Python38'.
2025-12-09 07:11:55,640 [root] INFO: Disabling sleep skipping.
2025-12-09 07:11:55,640 [root] DEBUG: 2648: Dropped file limit defaulting to 100.
2025-12-09 07:11:55,640 [root] DEBUG: 2648: YaraInit: Compiled 41 rule files
2025-12-09 07:11:55,640 [root] DEBUG: 2648: YaraInit: Compiled rules saved to file C:\tmpe2ctq1nb\data\yara\capemon.yac
2025-12-09 07:11:55,640 [root] DEBUG: 2648: YaraScan: Scanning 0x00FA0000, size 0xd260
2025-12-09 07:11:55,640 [root] DEBUG: 2648: Monitor initialised: 32-bit capemon loaded in process 2648 at 0x74110000, thread 2728, image base 0xfa0000, stack from 0xa4000-0xb0000
2025-12-09 07:11:55,640 [root] DEBUG: 2648: Commandline: "C:\Windows\System32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\red_core.exe.dll",#1
2025-12-09 07:11:55,640 [root] DEBUG: 2648: GetAddressByYara: ModuleBase 0x77650000 FunctionName LdrpCallInitRoutine
2025-12-09 07:11:55,640 [root] DEBUG: 2648: hook_api: Warning - CreateProcessA export address 0x764D1072 differs from GetProcAddress -> 0x74442437 (AcLayers.DLL::0x12437)
2025-12-09 07:11:55,640 [root] DEBUG: 2648: hook_api: Warning - CreateProcessW export address 0x764D103D differs from GetProcAddress -> 0x744425AB (AcLayers.DLL::0x125ab)
2025-12-09 07:11:55,640 [root] DEBUG: 2648: hook_api: Warning - WinExec export address 0x76553301 differs from GetProcAddress -> 0x7444271F (AcLayers.DLL::0x1271f)
2025-12-09 07:11:55,656 [root] DEBUG: 2648: hook_api: Warning - CreateRemoteThreadEx export address 0x7658A337 differs from GetProcAddress -> 0x76BA403A (KERNELBASE.dll::0x1403a)
2025-12-09 07:11:55,656 [root] DEBUG: 2648: hook_api: Warning - UpdateProcThreadAttribute export address 0x7658ABB7 differs from GetProcAddress -> 0x76B9FA26 (KERNELBASE.dll::0xfa26)
2025-12-09 07:11:55,656 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-09 07:11:55,656 [root] DEBUG: 2648: set_hooks: Unable to hook GetCommandLineA
2025-12-09 07:11:55,656 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-09 07:11:55,656 [root] DEBUG: 2648: set_hooks: Unable to hook GetCommandLineW
2025-12-09 07:11:55,656 [root] DEBUG: 2648: Hooked 611 out of 613 functions
2025-12-09 07:11:55,656 [root] DEBUG: 2648: WoW64 detected: 64-bit ntdll base: 0x77490000, KiUserExceptionDispatcher: 0x0, NtSetContextThread: 0x774fb510, Wow64PrepareForException: 0x0
2025-12-09 07:11:55,656 [root] DEBUG: 2648: WoW64 workaround: KiUserExceptionDispatcher hook installed at: 0x110000
2025-12-09 07:11:55,656 [root] INFO: Loaded monitor into process with pid 2648
2025-12-09 07:11:55,656 [root] DEBUG: 2648: caller_dispatch: Added region at 0x00FA0000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x00FA15D3, thread 2728).
2025-12-09 07:11:55,656 [root] DEBUG: 2648: YaraScan: Scanning 0x00FA0000, size 0xd260
2025-12-09 07:11:55,656 [root] DEBUG: 2648: ProcessImageBase: Main module image at 0x00FA0000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:11:55,671 [root] DEBUG: 2648: Target DLL loaded at 0x73FD0000: C:\Users\user\AppData\Local\Temp\red_core.exe (0x6c000 bytes).
2025-12-09 07:11:55,671 [root] DEBUG: 2648: YaraScan: Scanning 0x73FD0000, size 0x6a272
2025-12-09 07:11:55,687 [root] DEBUG: 2648: DLL loaded at 0x75FA0000: C:\Windows\syswow64\WININET (0x437000 bytes).
2025-12-09 07:11:55,687 [root] DEBUG: 2648: DLL loaded at 0x76AF0000: C:\Windows\syswow64\api-ms-win-downlevel-user32-l1-1-0 (0x4000 bytes).
2025-12-09 07:11:55,687 [root] DEBUG: 2648: DLL loaded at 0x74F30000: C:\Windows\syswow64\api-ms-win-downlevel-shlwapi-l1-1-0 (0x4000 bytes).
2025-12-09 07:11:55,687 [root] DEBUG: 2648: DLL loaded at 0x76630000: C:\Windows\syswow64\api-ms-win-downlevel-version-l1-1-0 (0x4000 bytes).
2025-12-09 07:11:55,687 [root] DEBUG: 2648: DLL loaded at 0x752D0000: C:\Windows\syswow64\api-ms-win-downlevel-normaliz-l1-1-0 (0x3000 bytes).
2025-12-09 07:11:55,687 [root] DEBUG: 2648: DLL loaded at 0x752C0000: C:\Windows\syswow64\normaliz (0x3000 bytes).
2025-12-09 07:11:55,687 [root] DEBUG: 2648: DLL loaded at 0x76640000: C:\Windows\syswow64\iertutil (0x238000 bytes).
2025-12-09 07:11:55,687 [root] DEBUG: 2648: DLL loaded at 0x76ED0000: C:\Windows\syswow64\api-ms-win-downlevel-advapi32-l1-1-0 (0x5000 bytes).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: DLL loaded at 0x740A0000: C:\Windows\system32\WTSAPI32 (0xd000 bytes).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: DLL loaded at 0x74050000: C:\Windows\system32\wevtapi (0x42000 bytes).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: DLL loaded at 0x74C70000: C:\Windows\system32\IPHLPAPI (0x1c000 bytes).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: DLL loaded at 0x74C60000: C:\Windows\system32\WINNSI (0x7000 bytes).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: caller_dispatch: Added region at 0x73FD0000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x73FED6B1, thread 2728).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: caller_dispatch: Scanning calling region at 0x73FD0000...
2025-12-09 07:11:55,703 [root] DEBUG: 2648: DLL loaded at 0x74040000: C:\Windows\SysWOW64\Secur32 (0x8000 bytes).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: DLL loaded at 0x73FC0000: C:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: DLL loaded at 0x75F30000: C:\Windows\syswow64\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes).
2025-12-09 07:11:55,703 [root] DEBUG: 2648: DLL loaded at 0x73F60000: C:\Windows\system32\winhttp (0x58000 bytes).
2025-12-09 07:11:55,718 [root] DEBUG: 2648: DLL loaded at 0x73F10000: C:\Windows\system32\webio (0x50000 bytes).
2025-12-09 07:11:55,718 [root] DEBUG: 2648: DLL loaded at 0x73FB0000: C:\Windows\system32\NLAapi (0x10000 bytes).
2025-12-09 07:11:55,718 [root] DEBUG: 2648: DLL loaded at 0x73FA0000: C:\Windows\system32\napinsp (0x10000 bytes).
2025-12-09 07:11:55,718 [root] DEBUG: 2648: DLL loaded at 0x73F80000: C:\Windows\system32\pnrpnsp (0x12000 bytes).
2025-12-09 07:11:55,718 [root] DEBUG: 2648: DLL loaded at 0x74BF0000: C:\Windows\System32\mswsock (0x3c000 bytes).
2025-12-09 07:11:55,718 [root] DEBUG: 2648: DLL loaded at 0x73F30000: C:\Windows\SysWOW64\DNSAPI (0x44000 bytes).
2025-12-09 07:11:55,718 [root] DEBUG: 2648: DLL loaded at 0x73F20000: C:\Windows\System32\winrnr (0x8000 bytes).
2025-12-09 07:11:55,718 [root] DEBUG: 2648: DLL loaded at 0x73EE0000: C:\Windows\System32\fwpuclnt (0x38000 bytes).
2025-12-09 07:11:55,734 [root] DEBUG: 2648: DLL loaded at 0x73ED0000: C:\Windows\SysWOW64\rasadhlp (0x6000 bytes).
2025-12-09 07:11:55,734 [root] DEBUG: 2648: DLL loaded at 0x74C30000: C:\Windows\SysWOW64\dhcpcsvc (0x12000 bytes).
2025-12-09 07:11:55,734 [root] DEBUG: 2648: DLL loaded at 0x74900000: C:\Windows\system32\uxtheme (0x80000 bytes).
2025-12-09 07:11:55,734 [root] DEBUG: 2648: DLL loaded at 0x73EB0000: C:\Windows\SysWOW64\dwmapi (0x13000 bytes).
2025-12-09 07:11:55,734 [root] DEBUG: 2648: DLL loaded at 0x74BD0000: C:\Windows\System32\wship6 (0x6000 bytes).
2025-12-09 07:11:56,734 [root] DEBUG: 2648: DLL loaded at 0x76B00000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes).
2025-12-09 07:11:56,734 [root] DEBUG: 2648: DLL loaded at 0x73990000: C:\Windows\SysWOW64\FirewallAPI (0x76000 bytes).
2025-12-09 07:11:56,734 [root] DEBUG: 2648: api-rate-cap: LdrGetProcedureAddress hook disabled due to rate
2025-12-09 07:11:56,734 [root] DEBUG: 2648: api-rate-cap: LdrGetProcedureAddress hook disabled due to rate
2025-12-09 07:11:56,750 [root] DEBUG: 2648: DLL loaded at 0x77180000: C:\Windows\syswow64\COMDLG32 (0x7b000 bytes).
2025-12-09 07:11:56,750 [root] DEBUG: 2648: DLL loaded at 0x73900000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\COMCTL32 (0x84000 bytes).
2025-12-09 07:11:56,750 [root] DEBUG: 2648: DLL loaded at 0x738C0000: C:\Windows\SysWOW64\OLEACC (0x3c000 bytes).
2025-12-09 07:11:56,750 [root] DEBUG: 2648: ProtectionHandler: Adding region at 0x10001000 to tracked regions.
2025-12-09 07:11:56,750 [root] DEBUG: 2648: DumpPEsInRange: Scanning range 0x10000000 - 0x1004C200.
2025-12-09 07:11:56,750 [root] DEBUG: 2648: ScanForDisguisedPE: PE image located at: 0x10000000
2025-12-09 07:11:56,750 [root] DEBUG: 2648: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2025-12-09 07:11:56,750 [root] DEBUG: 2648: DumpProcess: Instantiating PeParser with address: 0x10000000.
2025-12-09 07:11:56,750 [root] DEBUG: 2648: DumpProcess: Module entry point VA is 0x0001C50E.
2025-12-09 07:11:56,750 [root] DEBUG: 2648: PeParser: readPeSectionsFromProcess: readSectionFromProcess failed address 0x1004D000, section 5
2025-12-09 07:11:56,765 [lib.common.results] INFO: Uploading file C:\VmtIcCTsP\CAPE\2648_307505651892122025 to CAPE\87982825681fd22d68877614bba19345454e0e14bbb33cc35158dce7c1324ff4; Size is 279040; Max size: 100000000
2025-12-09 07:11:56,765 [root] DEBUG: 2648: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:11:56,765 [root] DEBUG: 2648: DLL loaded at 0x74BE0000: C:\Windows\System32\wshtcpip (0x5000 bytes).
2025-12-09 07:11:56,765 [root] DEBUG: 2648: CreateProcessHandler: Injection info set for new process 1336: C:\Windows\SysWOW64\TASKKILL.exe, ImageBase: 0x00B30000
2025-12-09 07:11:56,765 [root] INFO: Announced 32-bit process name: taskkill.exe pid: 1336
2025-12-09 07:11:56,765 [lib.api.process] INFO: Monitor config for <Process 1336 taskkill.exe>: C:\tmpe2ctq1nb\dll\1336.ini
2025-12-09 07:11:56,781 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpe2ctq1nb\dll\YOHostJz.dll, loader C:\tmpe2ctq1nb\bin\ESyjZHE.exe
2025-12-09 07:11:56,781 [root] DEBUG: 2648: DumpProcess: Module image dump success - dump size 0x44200.
2025-12-09 07:11:56,781 [root] DEBUG: 2648: ScanForDisguisedPE: No PE image located in range 0x10001000-0x1004C200.
2025-12-09 07:11:56,781 [root] DEBUG: 2648: DumpRegion: Dumped PE image(s) from base address 0x10000000, size 315392 bytes.
2025-12-09 07:11:56,781 [root] DEBUG: 2648: ProcessTrackedRegion: Dumped region at 0x10000000.
2025-12-09 07:11:56,781 [root] DEBUG: 2648: YaraScan: Scanning 0x10000000, size 0x4c200
2025-12-09 07:11:56,781 [root] DEBUG: Loader: Injecting process 1336 (thread 532) with C:\tmpe2ctq1nb\dll\YOHostJz.dll.
2025-12-09 07:11:56,781 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:11:56,781 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\YOHostJz.dll.
2025-12-09 07:11:56,781 [root] DEBUG: 2648: DLL loaded at 0x73A00000: C:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0 (0x4000 bytes).
2025-12-09 07:11:56,781 [lib.api.process] INFO: Injected into 32-bit <Process 1336 taskkill.exe>
2025-12-09 07:11:56,796 [root] INFO: Announced 32-bit process name: taskkill.exe pid: 1336
2025-12-09 07:11:56,796 [lib.api.process] INFO: Monitor config for <Process 1336 taskkill.exe>: C:\tmpe2ctq1nb\dll\1336.ini
2025-12-09 07:11:56,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpe2ctq1nb\dll\YOHostJz.dll, loader C:\tmpe2ctq1nb\bin\ESyjZHE.exe
2025-12-09 07:11:56,796 [root] DEBUG: Loader: Injecting process 1336 (thread 532) with C:\tmpe2ctq1nb\dll\YOHostJz.dll.
2025-12-09 07:11:56,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-09 07:11:56,796 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\YOHostJz.dll.
2025-12-09 07:11:56,796 [lib.api.process] INFO: Injected into 32-bit <Process 1336 taskkill.exe>
2025-12-09 07:11:56,812 [root] DEBUG: 1336: Python path set to 'C:\Python38'.
2025-12-09 07:11:56,812 [root] DEBUG: 1336: Dropped file limit defaulting to 100.
2025-12-09 07:11:56,812 [root] INFO: Disabling sleep skipping.
2025-12-09 07:11:56,812 [root] DEBUG: 1336: YaraInit: Compiled rules loaded from existing file C:\tmpe2ctq1nb\data\yara\capemon.yac
2025-12-09 07:11:56,812 [root] DEBUG: 1336: YaraScan: Scanning 0x00B30000, size 0x15b2c
2025-12-09 07:11:56,812 [root] DEBUG: 1336: Monitor initialised: 32-bit capemon loaded in process 1336 at 0x74110000, thread 532, image base 0xb30000, stack from 0x236000-0x240000
2025-12-09 07:11:56,812 [root] DEBUG: 1336: Commandline: TASKKILL /F /IM rundll32.exe
2025-12-09 07:11:56,828 [root] DEBUG: 1336: GetAddressByYara: ModuleBase 0x77650000 FunctionName LdrpCallInitRoutine
2025-12-09 07:11:56,828 [root] DEBUG: 1336: hook_api: Warning - CreateRemoteThreadEx export address 0x7658A337 differs from GetProcAddress -> 0x76BA403A (KERNELBASE.dll::0x1403a)
2025-12-09 07:11:56,828 [root] DEBUG: 1336: hook_api: Warning - UpdateProcThreadAttribute export address 0x7658ABB7 differs from GetProcAddress -> 0x76B9FA26 (KERNELBASE.dll::0xfa26)
2025-12-09 07:11:56,828 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-09 07:11:56,828 [root] DEBUG: 1336: set_hooks: Unable to hook GetCommandLineA
2025-12-09 07:11:56,828 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-09 07:11:56,828 [root] DEBUG: 1336: set_hooks: Unable to hook GetCommandLineW
2025-12-09 07:11:56,828 [root] DEBUG: 1336: hook_api: Warning - NetUserGetInfo export address 0x739A528E differs from GetProcAddress -> 0x73881BE2 (SAMCLI.DLL::0x1be2)
2025-12-09 07:11:56,828 [root] DEBUG: 1336: hook_api: Warning - NetGetJoinInformation export address 0x739A4AD2 differs from GetProcAddress -> 0x73892C3F (wkscli.dll::0x2c3f)
2025-12-09 07:11:56,828 [root] DEBUG: 1336: hook_api: Warning - NetUserGetLocalGroups export address 0x739A52A4 differs from GetProcAddress -> 0x738828AA (SAMCLI.DLL::0x28aa)
2025-12-09 07:11:56,828 [root] DEBUG: 1336: hook_api: Warning - DsEnumerateDomainTrustsW export address 0x739A3C9E differs from GetProcAddress -> 0x7368B202 (LOGONCLI.DLL::0xb202)
2025-12-09 07:11:56,828 [root] DEBUG: 1336: Hooked 611 out of 613 functions
2025-12-09 07:11:56,828 [root] DEBUG: 1336: WoW64 detected: 64-bit ntdll base: 0x77490000, KiUserExceptionDispatcher: 0x0, NtSetContextThread: 0x774fb510, Wow64PrepareForException: 0x0
2025-12-09 07:11:56,828 [root] DEBUG: 1336: WoW64 workaround: KiUserExceptionDispatcher hook installed at: 0x1d0000
2025-12-09 07:11:56,828 [root] INFO: Loaded monitor into process with pid 1336
2025-12-09 07:11:56,828 [root] DEBUG: 1336: caller_dispatch: Added region at 0x00B30000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x00B35CCC, thread 532).
2025-12-09 07:11:56,828 [root] DEBUG: 1336: YaraScan: Scanning 0x00B30000, size 0x15b2c
2025-12-09 07:11:56,828 [root] DEBUG: 1336: ProcessImageBase: Main module image at 0x00B30000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:11:56,843 [lib.api.process] INFO: Monitor config for <Process 556 svchost.exe>: C:\tmpe2ctq1nb\dll\556.ini
2025-12-09 07:11:56,843 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:11:56,843 [root] DEBUG: Loader: Injecting process 556 with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:11:56,843 [root] DEBUG: 556: Python path set to 'C:\Python38'.
2025-12-09 07:11:56,843 [root] INFO: Disabling sleep skipping.
2025-12-09 07:11:56,843 [root] DEBUG: 556: Dropped file limit defaulting to 100.
2025-12-09 07:11:56,843 [root] DEBUG: 556: parent_has_path: unable to get path for parent process 432
2025-12-09 07:11:56,843 [root] DEBUG: 556: YaraInit: Compiled rules loaded from existing file C:\tmpe2ctq1nb\data\yara\capemon.yac
2025-12-09 07:11:56,843 [root] DEBUG: 556: YaraScan: Scanning 0x00000000FF2E0000, size 0xa052
2025-12-09 07:11:56,843 [root] DEBUG: 556: Monitor initialised: 64-bit capemon loaded in process 556 at 0x000007FEF3CA0000, thread 860, image base 0x00000000FF2E0000, stack from 0x0000000001776000-0x0000000001780000
2025-12-09 07:11:56,843 [root] DEBUG: 556: Commandline: C:\Windows\system32\svchost.exe -k DcomLaunch
2025-12-09 07:11:56,843 [root] DEBUG: 556: GetAddressByYara: ModuleBase 0x0000000077490000 FunctionName LdrpCallInitRoutine
2025-12-09 07:11:56,859 [root] WARNING: b'Unable to place hook on LockResource'
2025-12-09 07:11:56,859 [root] DEBUG: 556: set_hooks: Unable to hook LockResource
2025-12-09 07:11:56,859 [root] DEBUG: 556: Hooked 605 out of 606 functions
2025-12-09 07:11:56,875 [root] INFO: Loaded monitor into process with pid 556
2025-12-09 07:11:56,875 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-09 07:11:56,875 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:11:56,875 [lib.api.process] INFO: Injected into 64-bit <Process 556 svchost.exe>
2025-12-09 07:11:57,546 [root] DEBUG: 2648: api-cap: GetAsyncKeyState hook disabled due to count: 5000
2025-12-09 07:11:57,562 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2912, handle 0x5c: C:\Windows\System32\audiodg.exe
2025-12-09 07:11:57,625 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2008, handle 0x5f0: C:\Windows\System32\taskhost.exe
2025-12-09 07:11:58,290 [modules.auxiliary.human] INFO: Found button "ok", clicking it
2025-12-09 07:11:58,883 [lib.api.process] INFO: Monitor config for <Process 1184 svchost.exe>: C:\tmpe2ctq1nb\dll\1184.ini
2025-12-09 07:11:58,883 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:11:58,883 [root] DEBUG: Loader: Injecting process 1184 with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:11:58,883 [root] DEBUG: 1184: Python path set to 'C:\Python38'.
2025-12-09 07:11:58,883 [root] INFO: Disabling sleep skipping.
2025-12-09 07:11:58,883 [root] DEBUG: 1184: Dropped file limit defaulting to 100.
2025-12-09 07:11:58,883 [root] DEBUG: 1184: parent_has_path: unable to get path for parent process 432
2025-12-09 07:11:58,883 [root] DEBUG: 1184: YaraInit: Compiled rules loaded from existing file C:\tmpe2ctq1nb\data\yara\capemon.yac
2025-12-09 07:11:58,883 [root] DEBUG: 1184: YaraScan: Scanning 0x00000000FF2E0000, size 0xa052
2025-12-09 07:11:58,883 [root] DEBUG: 1184: Monitor initialised: 64-bit capemon loaded in process 1184 at 0x000007FEF3CA0000, thread 1264, image base 0x00000000FF2E0000, stack from 0x0000000000F86000-0x0000000000F90000
2025-12-09 07:11:58,883 [root] DEBUG: 1184: Commandline: C:\Windows\system32\svchost.exe -k netsvcs
2025-12-09 07:11:58,883 [root] DEBUG: 1184: GetAddressByYara: ModuleBase 0x0000000077490000 FunctionName LdrpCallInitRoutine
2025-12-09 07:11:58,899 [root] WARNING: b'Unable to place hook on LockResource'
2025-12-09 07:11:58,899 [root] DEBUG: 1184: set_hooks: Unable to hook LockResource
2025-12-09 07:11:58,915 [root] DEBUG: 1184: Hooked 605 out of 606 functions
2025-12-09 07:11:58,915 [root] INFO: Loaded monitor into process with pid 1184
2025-12-09 07:11:58,915 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-09 07:11:58,915 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:11:58,915 [lib.api.process] INFO: Injected into 64-bit <Process 1184 svchost.exe>
2025-12-09 07:11:59,290 [root] INFO: Process with pid 2648 has terminated
2025-12-09 07:11:59,305 [root] DEBUG: 2648: NtTerminateProcess hook: Attempting to dump process 2648
2025-12-09 07:11:59,321 [root] DEBUG: 2648: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:12:00,915 [root] DEBUG: 1336: DLL loaded at 0x76B00000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes).
2025-12-09 07:12:00,915 [root] DEBUG: 1336: DLL loaded at 0x744B0000: C:\Windows\system32\wbem\wbemprox (0xb000 bytes).
2025-12-09 07:12:00,915 [root] DEBUG: 1336: DLL loaded at 0x74440000: C:\Windows\system32\wbemcomn2 (0x61000 bytes).
2025-12-09 07:12:00,915 [root] DEBUG: 1336: DLL loaded at 0x740E0000: C:\Windows\system32\Winsta (0x29000 bytes).
2025-12-09 07:12:00,915 [root] DEBUG: 1336: DLL loaded at 0x72E70000: C:\Windows\SysWOW64\CRYPTSP (0x17000 bytes).
2025-12-09 07:12:00,915 [root] DEBUG: 1336: DLL loaded at 0x72E10000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2025-12-09 07:12:00,915 [root] DEBUG: 1336: DLL loaded at 0x74430000: C:\Windows\SysWOW64\RpcRtRemote (0xe000 bytes).
2025-12-09 07:12:00,930 [root] DEBUG: 1184: DLL loaded at 0x000007FEF9670000: C:\Windows\system32\VSSAPI (0x1b0000 bytes).
2025-12-09 07:12:00,930 [root] DEBUG: 1184: DLL loaded at 0x000007FEFABB0000: C:\Windows\system32\ATL (0x19000 bytes).
2025-12-09 07:12:00,946 [root] DEBUG: 1184: DLL loaded at 0x000007FEF9F30000: C:\Windows\system32\VssTrace (0x17000 bytes).
2025-12-09 07:12:00,946 [root] DEBUG: 1184: DLL loaded at 0x000007FEFAEA0000: C:\Windows\system32\samcli (0x14000 bytes).
2025-12-09 07:12:00,946 [root] DEBUG: 1184: DLL loaded at 0x000007FEFB9E0000: C:\Windows\system32\SAMLIB (0x1d000 bytes).
2025-12-09 07:12:00,946 [root] DEBUG: 1184: DLL loaded at 0x000007FEFAEE0000: C:\Windows\system32\netutils (0xc000 bytes).
2025-12-09 07:12:00,946 [root] DEBUG: 1184: DLL loaded at 0x000007FEFAA10000: C:\Windows\system32\es (0x67000 bytes).
2025-12-09 07:12:00,961 [root] DEBUG: 1184: DLL loaded at 0x000007FEFB8B0000: C:\Windows\system32\PROPSYS (0x12c000 bytes).
2025-12-09 07:12:00,977 [root] DEBUG: 1184: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:12:00,993 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7D70000: C:\Windows\system32\wbem\wbemcore (0x12c000 bytes).
2025-12-09 07:12:00,993 [root] DEBUG: 1184: DLL loaded at 0x000007FEFC0C0000: C:\Windows\system32\VERSION (0xc000 bytes).
2025-12-09 07:12:00,993 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7D00000: C:\Windows\system32\wbem\esscli (0x62000 bytes).
2025-12-09 07:12:00,993 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7F40000: C:\Windows\system32\wbem\FastProx (0xd3000 bytes).
2025-12-09 07:12:01,008 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7F10000: C:\Windows\system32\NTDSAPI (0x27000 bytes).
2025-12-09 07:12:01,008 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7BE0000: C:\Windows\system32\wbem\wbemsvc (0x13000 bytes).
2025-12-09 07:12:01,008 [root] DEBUG: 1336: DLL loaded at 0x74400000: C:\Windows\system32\wbem\wbemsvc (0xf000 bytes).
2025-12-09 07:12:01,008 [root] DEBUG: 1336: DLL loaded at 0x73F90000: C:\Windows\system32\wbem\fastprox (0xa6000 bytes).
2025-12-09 07:12:01,008 [root] DEBUG: 1336: DLL loaded at 0x740C0000: C:\Windows\system32\NTDSAPI (0x18000 bytes).
2025-12-09 07:12:01,008 [root] DEBUG: 1184: DLL loaded at 0x000007FEFC9A0000: C:\Windows\system32\authZ (0x2f000 bytes).
2025-12-09 07:12:01,008 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7BA0000: C:\Windows\system32\wbem\wmiutils (0x21000 bytes).
2025-12-09 07:12:01,024 [root] DEBUG: 1184: set_hooks_by_export_directory: Hooked 0 out of 606 functions
2025-12-09 07:12:01,024 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7AD0000: C:\Windows\system32\wbem\repdrvfs (0x5a000 bytes).
2025-12-09 07:12:01,024 [root] DEBUG: 1184: DLL loaded at 0x000007FEFC9E0000: C:\Windows\system32\Wevtapi (0x6d000 bytes).
2025-12-09 07:12:01,165 [root] DEBUG: 1184: set_hooks_by_export_directory: Hooked 0 out of 606 functions
2025-12-09 07:12:01,165 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7A10000: C:\Windows\system32\wbem\wmiprvsd (0xb5000 bytes).
2025-12-09 07:12:01,165 [root] DEBUG: 1184: DLL loaded at 0x000007FEF79F0000: C:\Windows\system32\NCObjAPI (0x12000 bytes).
2025-12-09 07:12:01,180 [root] DEBUG: 1184: OpenProcessHandler: Injection info created for process 556, handle 0x2c4: C:\Windows\System32\svchost.exe
2025-12-09 07:12:01,180 [root] DEBUG: 1184: DLL loaded at 0x000007FEF1880000: C:\Windows\system32\wbem\wbemess (0x71000 bytes).
2025-12-09 07:12:01,290 [root] DEBUG: 556: CreateProcessHandler: Injection info set for new process 1268: C:\Windows\system32\wbem\wmiprvse.exe, ImageBase: 0x000000013F260000
2025-12-09 07:12:01,290 [root] INFO: Announced 64-bit process name: WmiPrvSE.exe pid: 1268
2025-12-09 07:12:01,290 [lib.api.process] INFO: Monitor config for <Process 1268 WmiPrvSE.exe>: C:\tmpe2ctq1nb\dll\1268.ini
2025-12-09 07:12:01,305 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:12:01,305 [root] DEBUG: 1184: DLL loaded at 0x000007FEF7970000: C:\Windows\system32\wbem\ncprov (0x17000 bytes).
2025-12-09 07:12:01,305 [root] DEBUG: Loader: Injecting process 1268 (thread 740) with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:01,321 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:12:01,321 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:01,321 [lib.api.process] INFO: Injected into 64-bit <Process 1268 WmiPrvSE.exe>
2025-12-09 07:12:01,321 [root] INFO: Announced 64-bit process name: WmiPrvSE.exe pid: 1268
2025-12-09 07:12:01,321 [lib.api.process] INFO: Monitor config for <Process 1268 WmiPrvSE.exe>: C:\tmpe2ctq1nb\dll\1268.ini
2025-12-09 07:12:01,321 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:12:01,321 [root] DEBUG: Loader: Injecting process 1268 (thread 740) with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:01,321 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-09 07:12:01,321 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:01,321 [lib.api.process] INFO: Injected into 64-bit <Process 1268 WmiPrvSE.exe>
2025-12-09 07:12:01,336 [root] DEBUG: 1268: Python path set to 'C:\Python38'.
2025-12-09 07:12:01,336 [root] DEBUG: 1268: Dropped file limit defaulting to 100.
2025-12-09 07:12:01,336 [root] INFO: Disabling sleep skipping.
2025-12-09 07:12:01,336 [root] DEBUG: 1268: Services hook set enabled
2025-12-09 07:12:01,336 [root] DEBUG: 1268: YaraInit: Compiled rules loaded from existing file C:\tmpe2ctq1nb\data\yara\capemon.yac
2025-12-09 07:12:01,336 [root] DEBUG: 1268: Monitor initialised: 64-bit capemon loaded in process 1268 at 0x000007FEF3CA0000, thread 740, image base 0x000000013F260000, stack from 0x0000000000230000-0x0000000000240000
2025-12-09 07:12:01,336 [root] DEBUG: 1268: Commandline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
2025-12-09 07:12:01,352 [root] DEBUG: 1268: Hooked 69 out of 69 functions
2025-12-09 07:12:01,352 [root] INFO: Loaded monitor into process with pid 1268
2025-12-09 07:12:01,352 [root] DEBUG: 1268: DLL loaded at 0x000007FEFCE40000: C:\Windows\system32\CRYPTBASE (0xf000 bytes).
2025-12-09 07:12:01,352 [root] DEBUG: 1268: DLL loaded at 0x000007FEFAD00000: C:\Windows\system32\ntmarta (0x2d000 bytes).
2025-12-09 07:12:01,368 [root] DEBUG: 1268: DLL loaded at 0x000007FEFE0A0000: C:\Windows\system32\WLDAP32 (0x52000 bytes).
2025-12-09 07:12:01,368 [root] DEBUG: 1268: DLL loaded at 0x000007FEFE6B0000: C:\Windows\system32\CLBCatQ (0x99000 bytes).
2025-12-09 07:12:01,368 [root] DEBUG: 1268: DLL loaded at 0x000007FEF8650000: C:\Windows\system32\wbem\wbemprox (0xe000 bytes).
2025-12-09 07:12:01,368 [root] DEBUG: 1268: DLL loaded at 0x000007FEFC780000: C:\Windows\system32\CRYPTSP (0x18000 bytes).
2025-12-09 07:12:01,383 [root] DEBUG: 1268: DLL loaded at 0x000007FEFC480000: C:\Windows\system32\rsaenh (0x47000 bytes).
2025-12-09 07:12:01,383 [root] DEBUG: 1268: DLL loaded at 0x000007FEFCF30000: C:\Windows\system32\RpcRtRemote (0x14000 bytes).
2025-12-09 07:12:01,383 [root] DEBUG: 1268: DLL loaded at 0x000007FEF7BE0000: C:\Windows\system32\wbem\wbemsvc (0x13000 bytes).
2025-12-09 07:12:01,399 [root] DEBUG: 1184: OpenProcessHandler: Injection info created for process 1268, handle 0x540: C:\Windows\System32\wbem\WmiPrvSE.exe
2025-12-09 07:12:01,399 [root] DEBUG: 1268: DLL loaded at 0x000007FEF7BA0000: C:\Windows\system32\wbem\wmiutils (0x21000 bytes).
2025-12-09 07:12:01,415 [root] DEBUG: 1268: DLL loaded at 0x000007FEF1680000: C:\Windows\system32\wbem\cimwin32 (0x1fa000 bytes).
2025-12-09 07:12:01,415 [root] DEBUG: 1268: DLL loaded at 0x000007FEF43D0000: C:\Windows\system32\framedynos (0x43000 bytes).
2025-12-09 07:12:01,461 [root] DEBUG: 1268: DLL loaded at 0x000007FEFB240000: C:\Windows\system32\WINBRAND (0x8000 bytes).
2025-12-09 07:12:01,477 [root] DEBUG: 1336: NtTerminateProcess hook: Attempting to dump process 1336
2025-12-09 07:12:01,477 [root] DEBUG: 1336: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:12:01,477 [root] INFO: Process with pid 1336 has terminated
2025-12-09 07:12:12,196 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2240, handle 0x5f4: C:\Windows\System32\taskeng.exe
2025-12-09 07:12:12,336 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2728, handle 0x5f4: C:\Windows\System32\taskeng.exe
2025-12-09 07:12:12,915 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2620, handle 0x5f4: C:\Program Files (x86)\Microsoft Office\root\Office16\msoia.exe
2025-12-09 07:12:12,993 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2256, handle 0x5f0: C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe
2025-12-09 07:12:13,071 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 1548, handle 0x5f0: C:\Program Files (x86)\Microsoft Office\root\Office16\msoia.exe
2025-12-09 07:12:21,602 [root] DEBUG: 1184: caller_dispatch: Added region at 0x00000000FF2E0000 to tracked regions list (ntdll::NtWaitForSingleObject returns to 0x00000000FF2E1318, thread 2732).
2025-12-09 07:12:21,649 [root] DEBUG: 1184: YaraScan: Scanning 0x00000000FF2E0000, size 0xa052
2025-12-09 07:12:21,649 [root] DEBUG: 1184: ProcessImageBase: Main module image at 0x00000000FF2E0000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:12:32,133 [root] DEBUG: 556: CreateProcessHandler: Injection info set for new process 1620: C:\Windows\system32\DllHost.exe, ImageBase: 0x00000000FFA70000
2025-12-09 07:12:32,211 [root] INFO: Announced 64-bit process name: dllhost.exe pid: 1620
2025-12-09 07:12:32,211 [lib.api.process] INFO: Monitor config for <Process 1620 dllhost.exe>: C:\tmpe2ctq1nb\dll\1620.ini
2025-12-09 07:12:32,258 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:12:32,540 [root] DEBUG: Loader: Injecting process 1620 (thread 224) with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:32,586 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:12:32,665 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:32,711 [lib.api.process] INFO: Injected into 64-bit <Process 1620 dllhost.exe>
2025-12-09 07:12:32,711 [root] INFO: Announced 64-bit process name: dllhost.exe pid: 1620
2025-12-09 07:12:32,711 [lib.api.process] INFO: Monitor config for <Process 1620 dllhost.exe>: C:\tmpe2ctq1nb\dll\1620.ini
2025-12-09 07:12:32,790 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:12:33,352 [root] DEBUG: Loader: Injecting process 1620 (thread 224) with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:33,352 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-09 07:12:33,415 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:33,461 [lib.api.process] INFO: Injected into 64-bit <Process 1620 dllhost.exe>
2025-12-09 07:12:33,743 [root] DEBUG: 1620: Python path set to 'C:\Python38'.
2025-12-09 07:12:33,790 [root] DEBUG: 1620: Dropped file limit defaulting to 100.
2025-12-09 07:12:33,930 [root] INFO: Disabling sleep skipping.
2025-12-09 07:12:33,930 [root] DEBUG: 1620: YaraInit: Compiled rules loaded from existing file C:\tmpe2ctq1nb\data\yara\capemon.yac
2025-12-09 07:12:33,977 [root] DEBUG: 1620: YaraScan: Scanning 0x00000000FFA70000, size 0x6012
2025-12-09 07:12:33,977 [root] DEBUG: 1620: Monitor initialised: 64-bit capemon loaded in process 1620 at 0x000007FEF3CA0000, thread 224, image base 0x00000000FFA70000, stack from 0x0000000000175000-0x0000000000180000
2025-12-09 07:12:34,071 [root] DEBUG: 1620: Commandline: C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
2025-12-09 07:12:34,071 [root] DEBUG: 1620: GetAddressByYara: ModuleBase 0x0000000077490000 FunctionName LdrpCallInitRoutine
2025-12-09 07:12:34,165 [root] WARNING: b'Unable to place hook on LockResource'
2025-12-09 07:12:34,165 [root] DEBUG: 1620: set_hooks: Unable to hook LockResource
2025-12-09 07:12:34,227 [root] DEBUG: 1620: Hooked 605 out of 606 functions
2025-12-09 07:12:34,227 [root] INFO: Loaded monitor into process with pid 1620
2025-12-09 07:12:34,290 [root] DEBUG: 1620: caller_dispatch: Added region at 0x00000000FFA70000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x00000000FFA711B5, thread 224).
2025-12-09 07:12:34,290 [root] DEBUG: 1620: YaraScan: Scanning 0x00000000FFA70000, size 0x6012
2025-12-09 07:12:34,352 [root] DEBUG: 1620: ProcessImageBase: Main module image at 0x00000000FFA70000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:12:34,352 [root] DEBUG: 1620: DLL loaded at 0x000007FEFCE40000: C:\Windows\system32\CRYPTBASE (0xf000 bytes).
2025-12-09 07:12:34,415 [root] DEBUG: 1620: DLL loaded at 0x000007FEFE6B0000: C:\Windows\system32\CLBCatQ (0x99000 bytes).
2025-12-09 07:12:34,415 [root] DEBUG: 1620: DLL loaded at 0x000007FEFE3D0000: C:\Windows\system32\OLEAUT32 (0xdb000 bytes).
2025-12-09 07:12:34,602 [root] DEBUG: 1620: DLL loaded at 0x000007FEFC780000: C:\Windows\system32\CRYPTSP (0x18000 bytes).
2025-12-09 07:12:34,602 [root] DEBUG: 1620: DLL loaded at 0x000007FEFC480000: C:\Windows\system32\rsaenh (0x47000 bytes).
2025-12-09 07:12:34,696 [root] DEBUG: 1620: DLL loaded at 0x000007FEFCF30000: C:\Windows\system32\RpcRtRemote (0x14000 bytes).
2025-12-09 07:12:34,711 [root] DEBUG: 1620: DLL loaded at 0x000007FEFB850000: C:\Windows\system32\uxtheme (0x56000 bytes).
2025-12-09 07:12:35,415 [root] DEBUG: 1620: DLL loaded at 0x000007FEFD540000: C:\Windows\System32\wininet (0x4ac000 bytes).
2025-12-09 07:12:35,415 [root] DEBUG: 1620: DLL loaded at 0x000007FEFD2E0000: C:\Windows\system32\api-ms-win-downlevel-user32-l1-1-0 (0x4000 bytes).
2025-12-09 07:12:35,508 [root] DEBUG: 1620: DLL loaded at 0x000007FEFD2D0000: C:\Windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0 (0x4000 bytes).
2025-12-09 07:12:35,508 [root] DEBUG: 1620: DLL loaded at 0x000007FEFD0A0000: C:\Windows\system32\api-ms-win-downlevel-version-l1-1-0 (0x4000 bytes).
2025-12-09 07:12:35,586 [root] DEBUG: 1620: DLL loaded at 0x000007FEFC0C0000: C:\Windows\system32\version (0xc000 bytes).
2025-12-09 07:12:35,586 [root] DEBUG: 1620: DLL loaded at 0x000007FEFD070000: C:\Windows\system32\api-ms-win-downlevel-normaliz-l1-1-0 (0x3000 bytes).
2025-12-09 07:12:35,711 [root] DEBUG: 1620: DLL loaded at 0x0000000077630000: C:\Windows\system32\normaliz (0x3000 bytes).
2025-12-09 07:12:35,711 [root] DEBUG: 1620: DLL loaded at 0x000007FEFE100000: C:\Windows\system32\iertutil (0x2cc000 bytes).
2025-12-09 07:12:35,790 [root] DEBUG: 1620: DLL loaded at 0x000007FEFD0B0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l1-1-0 (0x5000 bytes).
2025-12-09 07:12:35,790 [root] DEBUG: 1620: DLL loaded at 0x000007FEFD080000: C:\Windows\system32\USERENV (0x1f000 bytes).
2025-12-09 07:12:35,868 [root] DEBUG: 1620: DLL loaded at 0x000007FEFCFF0000: C:\Windows\system32\profapi (0xf000 bytes).
2025-12-09 07:12:35,868 [root] DEBUG: 1620: DLL loaded at 0x000007FEFD040000: C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes).
2025-12-09 07:12:36,055 [root] DEBUG: 1620: DLL loaded at 0x000007FEFCBF0000: C:\Windows\system32\Secur32 (0xb000 bytes).
2025-12-09 07:12:36,055 [root] DEBUG: 1620: DLL loaded at 0x000007FEFE750000: C:\Windows\system32\SHELL32 (0xd8b000 bytes).
2025-12-09 07:12:36,149 [root] DEBUG: 1620: DLL loaded at 0x000007FEF9FC0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes).
2025-12-09 07:12:36,196 [root] DEBUG: 1620: DLL loaded at 0x000007FEF92C0000: C:\Windows\system32\winhttp (0x71000 bytes).
2025-12-09 07:12:36,290 [root] DEBUG: 1620: DLL loaded at 0x000007FEF9250000: C:\Windows\system32\webio (0x65000 bytes).
2025-12-09 07:12:36,290 [root] DEBUG: 1620: DLL loaded at 0x000007FEFC720000: C:\Windows\system32\mswsock (0x55000 bytes).
2025-12-09 07:12:36,368 [root] DEBUG: 1620: DLL loaded at 0x000007FEFC710000: C:\Windows\System32\wship6 (0x7000 bytes).
2025-12-09 07:12:36,368 [root] DEBUG: 1620: DLL loaded at 0x000007FEFA8B0000: C:\Windows\system32\IPHLPAPI (0x27000 bytes).
2025-12-09 07:12:36,493 [root] DEBUG: 1620: DLL loaded at 0x000007FEFA920000: C:\Windows\system32\WINNSI (0xb000 bytes).
2025-12-09 07:12:41,602 [root] INFO: Added new file to list with pid None and path C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
2025-12-09 07:12:41,602 [root] INFO: Process with pid 1620 has terminated
2025-12-09 07:12:41,649 [root] DEBUG: 1620: NtTerminateProcess hook: Attempting to dump process 1620
2025-12-09 07:12:41,696 [root] DEBUG: 1620: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:12:42,368 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2056, handle 0x604: C:\Windows\System32\schtasks.exe
2025-12-09 07:12:42,852 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2988, handle 0x604: C:\Windows\System32\schtasks.exe
2025-12-09 07:12:43,258 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 504, handle 0x604: C:\Windows\System32\schtasks.exe
2025-12-09 07:12:44,633 [root] DEBUG: 556: CreateProcessHandler: Injection info set for new process 1932: C:\Windows\system32\DllHost.exe, ImageBase: 0x00000000FF300000
2025-12-09 07:12:44,649 [root] INFO: Announced 64-bit process name: dllhost.exe pid: 1932
2025-12-09 07:12:44,649 [lib.api.process] INFO: Monitor config for <Process 1932 dllhost.exe>: C:\tmpe2ctq1nb\dll\1932.ini
2025-12-09 07:12:44,649 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:12:44,680 [root] DEBUG: Loader: Injecting process 1932 (thread 300) with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:44,680 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:12:44,696 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:44,696 [lib.api.process] INFO: Injected into 64-bit <Process 1932 dllhost.exe>
2025-12-09 07:12:44,696 [root] INFO: Announced 64-bit process name: dllhost.exe pid: 1932
2025-12-09 07:12:44,696 [lib.api.process] INFO: Monitor config for <Process 1932 dllhost.exe>: C:\tmpe2ctq1nb\dll\1932.ini
2025-12-09 07:12:44,696 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:12:44,711 [root] DEBUG: Loader: Injecting process 1932 (thread 300) with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:44,711 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-09 07:12:44,711 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:12:44,711 [lib.api.process] INFO: Injected into 64-bit <Process 1932 dllhost.exe>
2025-12-09 07:12:44,727 [root] DEBUG: 1932: Python path set to 'C:\Python38'.
2025-12-09 07:12:44,727 [root] DEBUG: 1932: Dropped file limit defaulting to 100.
2025-12-09 07:12:44,727 [root] INFO: Disabling sleep skipping.
2025-12-09 07:12:44,743 [root] DEBUG: 1932: YaraInit: Compiled rules loaded from existing file C:\tmpe2ctq1nb\data\yara\capemon.yac
2025-12-09 07:12:44,743 [root] DEBUG: 1932: YaraScan: Scanning 0x00000000FF300000, size 0x6012
2025-12-09 07:12:44,758 [root] DEBUG: 1932: Monitor initialised: 64-bit capemon loaded in process 1932 at 0x000007FEF3CA0000, thread 300, image base 0x00000000FF300000, stack from 0x0000000000315000-0x0000000000320000
2025-12-09 07:12:44,758 [root] DEBUG: 1932: Commandline: C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
2025-12-09 07:12:44,758 [root] DEBUG: 1932: GetAddressByYara: ModuleBase 0x0000000077490000 FunctionName LdrpCallInitRoutine
2025-12-09 07:12:44,774 [root] WARNING: b'Unable to place hook on LockResource'
2025-12-09 07:12:44,774 [root] DEBUG: 1932: set_hooks: Unable to hook LockResource
2025-12-09 07:12:44,805 [root] DEBUG: 1932: Hooked 605 out of 606 functions
2025-12-09 07:12:44,805 [root] INFO: Loaded monitor into process with pid 1932
2025-12-09 07:12:44,805 [root] DEBUG: 1932: caller_dispatch: Added region at 0x00000000FF300000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x00000000FF3011B5, thread 300).
2025-12-09 07:12:44,805 [root] DEBUG: 1932: YaraScan: Scanning 0x00000000FF300000, size 0x6012
2025-12-09 07:12:44,805 [root] DEBUG: 1932: ProcessImageBase: Main module image at 0x00000000FF300000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:12:44,805 [root] DEBUG: 1932: DLL loaded at 0x000007FEFCE40000: C:\Windows\system32\CRYPTBASE (0xf000 bytes).
2025-12-09 07:12:44,821 [root] DEBUG: 1932: DLL loaded at 0x000007FEFE6B0000: C:\Windows\system32\CLBCatQ (0x99000 bytes).
2025-12-09 07:12:44,821 [root] DEBUG: 1932: DLL loaded at 0x000007FEFE3D0000: C:\Windows\system32\OLEAUT32 (0xdb000 bytes).
2025-12-09 07:12:44,821 [root] DEBUG: 1932: DLL loaded at 0x000007FEFC780000: C:\Windows\system32\CRYPTSP (0x18000 bytes).
2025-12-09 07:12:44,821 [root] DEBUG: 1932: DLL loaded at 0x000007FEFC480000: C:\Windows\system32\rsaenh (0x47000 bytes).
2025-12-09 07:12:44,821 [root] DEBUG: 1932: DLL loaded at 0x000007FEFCF30000: C:\Windows\system32\RpcRtRemote (0x14000 bytes).
2025-12-09 07:12:44,868 [root] DEBUG: 1932: DLL loaded at 0x000007FEFB850000: C:\Windows\system32\uxtheme (0x56000 bytes).
2025-12-09 07:12:44,946 [root] DEBUG: 1932: DLL loaded at 0x000007FEFD540000: C:\Windows\System32\wininet (0x4ac000 bytes).
2025-12-09 07:12:44,977 [root] DEBUG: 1932: DLL loaded at 0x000007FEFD2E0000: C:\Windows\system32\api-ms-win-downlevel-user32-l1-1-0 (0x4000 bytes).
2025-12-09 07:12:44,977 [root] DEBUG: 1932: DLL loaded at 0x000007FEFD2D0000: C:\Windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0 (0x4000 bytes).
2025-12-09 07:12:44,977 [root] DEBUG: 1932: DLL loaded at 0x000007FEFD0A0000: C:\Windows\system32\api-ms-win-downlevel-version-l1-1-0 (0x4000 bytes).
2025-12-09 07:12:44,977 [root] DEBUG: 1932: DLL loaded at 0x000007FEFC0C0000: C:\Windows\system32\version (0xc000 bytes).
2025-12-09 07:12:44,993 [root] DEBUG: 1932: DLL loaded at 0x000007FEFD070000: C:\Windows\system32\api-ms-win-downlevel-normaliz-l1-1-0 (0x3000 bytes).
2025-12-09 07:12:45,024 [root] DEBUG: 1932: DLL loaded at 0x0000000077630000: C:\Windows\system32\normaliz (0x3000 bytes).
2025-12-09 07:12:45,024 [root] DEBUG: 1932: DLL loaded at 0x000007FEFE100000: C:\Windows\system32\iertutil (0x2cc000 bytes).
2025-12-09 07:12:45,024 [root] DEBUG: 1932: DLL loaded at 0x000007FEFD0B0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l1-1-0 (0x5000 bytes).
2025-12-09 07:12:45,024 [root] DEBUG: 1932: DLL loaded at 0x000007FEFD080000: C:\Windows\system32\USERENV (0x1f000 bytes).
2025-12-09 07:12:45,024 [root] DEBUG: 1932: DLL loaded at 0x000007FEFCFF0000: C:\Windows\system32\profapi (0xf000 bytes).
2025-12-09 07:12:45,024 [root] DEBUG: 1932: DLL loaded at 0x000007FEFD040000: C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes).
2025-12-09 07:12:45,071 [root] DEBUG: 1932: DLL loaded at 0x000007FEFCBF0000: C:\Windows\system32\Secur32 (0xb000 bytes).
2025-12-09 07:12:45,071 [root] DEBUG: 1932: DLL loaded at 0x000007FEFE750000: C:\Windows\system32\SHELL32 (0xd8b000 bytes).
2025-12-09 07:12:45,071 [root] DEBUG: 1932: DLL loaded at 0x000007FEF9FC0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes).
2025-12-09 07:12:45,102 [root] DEBUG: 1932: DLL loaded at 0x000007FEF92C0000: C:\Windows\system32\winhttp (0x71000 bytes).
2025-12-09 07:12:45,102 [root] DEBUG: 1932: DLL loaded at 0x000007FEF9250000: C:\Windows\system32\webio (0x65000 bytes).
2025-12-09 07:12:45,118 [root] DEBUG: 1932: DLL loaded at 0x000007FEFC720000: C:\Windows\system32\mswsock (0x55000 bytes).
2025-12-09 07:12:45,118 [root] DEBUG: 1932: DLL loaded at 0x000007FEFC710000: C:\Windows\System32\wship6 (0x7000 bytes).
2025-12-09 07:12:45,133 [root] DEBUG: 1932: DLL loaded at 0x000007FEFA8B0000: C:\Windows\system32\IPHLPAPI (0x27000 bytes).
2025-12-09 07:12:45,133 [root] DEBUG: 1932: DLL loaded at 0x000007FEFA920000: C:\Windows\system32\WINNSI (0xb000 bytes).
2025-12-09 07:12:50,180 [root] INFO: Process with pid 1932 has terminated
2025-12-09 07:12:50,180 [root] DEBUG: 1932: NtTerminateProcess hook: Attempting to dump process 1932
2025-12-09 07:12:50,180 [root] DEBUG: 1932: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:13:06,493 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2084, handle 0x5f0: C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
2025-12-09 07:13:06,711 [root] DEBUG: 556: CreateProcessHandler: Injection info set for new process 2488: C:\Windows\system32\DllHost.exe, ImageBase: 0x00000000FFE10000
2025-12-09 07:13:06,727 [root] INFO: Announced 64-bit process name: dllhost.exe pid: 2488
2025-12-09 07:13:06,727 [lib.api.process] INFO: Monitor config for <Process 2488 dllhost.exe>: C:\tmpe2ctq1nb\dll\2488.ini
2025-12-09 07:13:06,758 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:13:06,790 [root] DEBUG: Loader: Injecting process 2488 (thread 908) with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:13:06,790 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:13:06,790 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:13:06,790 [lib.api.process] INFO: Injected into 64-bit <Process 2488 dllhost.exe>
2025-12-09 07:13:06,790 [root] INFO: Announced 64-bit process name: dllhost.exe pid: 2488
2025-12-09 07:13:06,790 [lib.api.process] INFO: Monitor config for <Process 2488 dllhost.exe>: C:\tmpe2ctq1nb\dll\2488.ini
2025-12-09 07:13:06,790 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpe2ctq1nb\dll\kMmFpTMI.dll, loader C:\tmpe2ctq1nb\bin\rvHFiZWl.exe
2025-12-09 07:13:06,836 [root] DEBUG: Loader: Injecting process 2488 (thread 908) with C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:13:06,836 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-09 07:13:06,836 [root] DEBUG: Successfully injected DLL C:\tmpe2ctq1nb\dll\kMmFpTMI.dll.
2025-12-09 07:13:06,852 [lib.api.process] INFO: Injected into 64-bit <Process 2488 dllhost.exe>
2025-12-09 07:13:06,868 [root] DEBUG: 2488: Python path set to 'C:\Python38'.
2025-12-09 07:13:06,868 [root] DEBUG: 2488: Dropped file limit defaulting to 100.
2025-12-09 07:13:06,868 [root] INFO: Disabling sleep skipping.
2025-12-09 07:13:06,868 [root] DEBUG: 2488: YaraInit: Compiled rules loaded from existing file C:\tmpe2ctq1nb\data\yara\capemon.yac
2025-12-09 07:13:06,868 [root] DEBUG: 2488: YaraScan: Scanning 0x00000000FFE10000, size 0x6012
2025-12-09 07:13:06,868 [root] DEBUG: 2488: Monitor initialised: 64-bit capemon loaded in process 2488 at 0x000007FEF3CA0000, thread 908, image base 0x00000000FFE10000, stack from 0x0000000000216000-0x0000000000220000
2025-12-09 07:13:06,868 [root] DEBUG: 2488: Commandline: C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
2025-12-09 07:13:06,883 [root] DEBUG: 2488: GetAddressByYara: ModuleBase 0x0000000077490000 FunctionName LdrpCallInitRoutine
2025-12-09 07:13:06,899 [root] WARNING: b'Unable to place hook on LockResource'
2025-12-09 07:13:06,899 [root] DEBUG: 2488: set_hooks: Unable to hook LockResource
2025-12-09 07:13:06,915 [root] DEBUG: 2488: Hooked 605 out of 606 functions
2025-12-09 07:13:06,915 [root] INFO: Loaded monitor into process with pid 2488
2025-12-09 07:13:06,915 [root] DEBUG: 2488: caller_dispatch: Added region at 0x00000000FFE10000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x00000000FFE111B5, thread 908).
2025-12-09 07:13:06,930 [root] DEBUG: 2488: YaraScan: Scanning 0x00000000FFE10000, size 0x6012
2025-12-09 07:13:06,930 [root] DEBUG: 2488: ProcessImageBase: Main module image at 0x00000000FFE10000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:13:06,930 [root] DEBUG: 2488: DLL loaded at 0x000007FEFCE40000: C:\Windows\system32\CRYPTBASE (0xf000 bytes).
2025-12-09 07:13:06,930 [root] DEBUG: 2488: DLL loaded at 0x000007FEFE6B0000: C:\Windows\system32\CLBCatQ (0x99000 bytes).
2025-12-09 07:13:06,930 [root] DEBUG: 2488: DLL loaded at 0x000007FEFE3D0000: C:\Windows\system32\OLEAUT32 (0xdb000 bytes).
2025-12-09 07:13:06,946 [root] DEBUG: 2488: DLL loaded at 0x000007FEFC780000: C:\Windows\system32\CRYPTSP (0x18000 bytes).
2025-12-09 07:13:06,946 [root] DEBUG: 2488: DLL loaded at 0x000007FEFC480000: C:\Windows\system32\rsaenh (0x47000 bytes).
2025-12-09 07:13:06,961 [root] DEBUG: 2488: DLL loaded at 0x000007FEFCF30000: C:\Windows\system32\RpcRtRemote (0x14000 bytes).
2025-12-09 07:13:07,008 [root] DEBUG: 2488: DLL loaded at 0x000007FEFB850000: C:\Windows\system32\uxtheme (0x56000 bytes).
2025-12-09 07:13:07,055 [root] DEBUG: 2488: DLL loaded at 0x000007FEFD540000: C:\Windows\System32\wininet (0x4ac000 bytes).
2025-12-09 07:13:07,055 [root] DEBUG: 2488: DLL loaded at 0x000007FEFD2E0000: C:\Windows\system32\api-ms-win-downlevel-user32-l1-1-0 (0x4000 bytes).
2025-12-09 07:13:07,071 [root] DEBUG: 2488: DLL loaded at 0x000007FEFD2D0000: C:\Windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0 (0x4000 bytes).
2025-12-09 07:13:07,071 [root] DEBUG: 2488: DLL loaded at 0x000007FEFD0A0000: C:\Windows\system32\api-ms-win-downlevel-version-l1-1-0 (0x4000 bytes).
2025-12-09 07:13:07,071 [root] DEBUG: 2488: DLL loaded at 0x000007FEFC0C0000: C:\Windows\system32\version (0xc000 bytes).
2025-12-09 07:13:07,071 [root] DEBUG: 2488: DLL loaded at 0x000007FEFD070000: C:\Windows\system32\api-ms-win-downlevel-normaliz-l1-1-0 (0x3000 bytes).
2025-12-09 07:13:07,071 [root] DEBUG: 2488: DLL loaded at 0x0000000077630000: C:\Windows\system32\normaliz (0x3000 bytes).
2025-12-09 07:13:07,071 [root] DEBUG: 2488: DLL loaded at 0x000007FEFE100000: C:\Windows\system32\iertutil (0x2cc000 bytes).
2025-12-09 07:13:07,071 [root] DEBUG: 2488: DLL loaded at 0x000007FEFD0B0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l1-1-0 (0x5000 bytes).
2025-12-09 07:13:07,071 [root] DEBUG: 2488: DLL loaded at 0x000007FEFD080000: C:\Windows\system32\USERENV (0x1f000 bytes).
2025-12-09 07:13:07,086 [root] DEBUG: 2488: DLL loaded at 0x000007FEFCFF0000: C:\Windows\system32\profapi (0xf000 bytes).
2025-12-09 07:13:07,086 [root] DEBUG: 2488: DLL loaded at 0x000007FEFD040000: C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes).
2025-12-09 07:13:07,102 [root] DEBUG: 2488: DLL loaded at 0x000007FEFCBF0000: C:\Windows\system32\Secur32 (0xb000 bytes).
2025-12-09 07:13:07,102 [root] DEBUG: 2488: DLL loaded at 0x000007FEFE750000: C:\Windows\system32\SHELL32 (0xd8b000 bytes).
2025-12-09 07:13:07,118 [root] DEBUG: 2488: DLL loaded at 0x000007FEF9FC0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes).
2025-12-09 07:13:07,133 [root] DEBUG: 2488: DLL loaded at 0x000007FEF92C0000: C:\Windows\system32\winhttp (0x71000 bytes).
2025-12-09 07:13:07,133 [root] DEBUG: 2488: DLL loaded at 0x000007FEF9250000: C:\Windows\system32\webio (0x65000 bytes).
2025-12-09 07:13:07,165 [root] DEBUG: 2488: DLL loaded at 0x000007FEFC720000: C:\Windows\system32\mswsock (0x55000 bytes).
2025-12-09 07:13:07,165 [root] DEBUG: 2488: DLL loaded at 0x000007FEFC710000: C:\Windows\System32\wship6 (0x7000 bytes).
2025-12-09 07:13:07,180 [root] DEBUG: 2488: DLL loaded at 0x000007FEFA8B0000: C:\Windows\system32\IPHLPAPI (0x27000 bytes).
2025-12-09 07:13:07,196 [root] DEBUG: 2488: DLL loaded at 0x000007FEFA920000: C:\Windows\system32\WINNSI (0xb000 bytes).
2025-12-09 07:13:12,165 [root] INFO: Process with pid 2488 has terminated
2025-12-09 07:13:12,180 [root] DEBUG: 2488: NtTerminateProcess hook: Attempting to dump process 2488
2025-12-09 07:13:12,180 [root] DEBUG: 2488: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:13:31,290 [root] DEBUG: 1268: NtTerminateProcess hook: Attempting to dump process 1268
2025-12-09 07:13:31,290 [root] DEBUG: 1268: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:13:31,290 [root] INFO: Process with pid 1268 has terminated
2025-12-09 07:14:55,758 [root] INFO: Analysis timeout hit, terminating analysis
2025-12-09 07:14:55,758 [lib.api.process] INFO: Terminate event set for <Process 556 svchost.exe>
2025-12-09 07:14:55,758 [root] DEBUG: 556: Terminate Event: Attempting to dump process 556
2025-12-09 07:14:55,758 [root] DEBUG: 556: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:14:55,758 [root] DEBUG: 556: Terminate Event: Current region empty
2025-12-09 07:14:55,758 [lib.api.process] INFO: Termination confirmed for <Process 556 svchost.exe>
2025-12-09 07:14:55,758 [root] DEBUG: 556: Terminate Event: CAPE shutdown complete for process 556
2025-12-09 07:14:55,758 [root] INFO: Terminate event set for process 556
2025-12-09 07:14:55,758 [lib.api.process] INFO: Terminate event set for <Process 1184 svchost.exe>
2025-12-09 07:14:55,758 [root] DEBUG: 1184: Terminate Event: Attempting to dump process 1184
2025-12-09 07:14:55,758 [root] DEBUG: 1184: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:14:55,758 [root] DEBUG: 1184: Terminate Event: Current region empty
2025-12-09 07:14:55,758 [lib.api.process] INFO: Termination confirmed for <Process 1184 svchost.exe>
2025-12-09 07:14:55,758 [root] DEBUG: 1184: Terminate Event: CAPE shutdown complete for process 1184
2025-12-09 07:14:55,758 [root] INFO: Terminate event set for process 1184
2025-12-09 07:14:55,758 [root] INFO: Created shutdown mutex
2025-12-09 07:14:56,758 [root] INFO: Shutting down package
2025-12-09 07:14:56,758 [root] INFO: Stopping auxiliary modules
2025-12-09 07:14:56,758 [root] INFO: Stopping auxiliary module: Browser
2025-12-09 07:14:56,758 [root] INFO: Stopping auxiliary module: Curtain
2025-12-09 07:14:56,805 [lib.common.results] INFO: Uploading file C:\curtain.log to curtain/1765235696.805664.curtain.log; Size is 36; Max size: 100000000
2025-12-09 07:14:56,805 [root] INFO: Stopping auxiliary module: End_noisy_tasks
2025-12-09 07:14:56,805 [root] INFO: Stopping auxiliary module: Evtx
2025-12-09 07:14:56,805 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\Application.evtx to zip dump
2025-12-09 07:14:56,805 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\HardwareEvents.evtx to zip dump
2025-12-09 07:14:56,821 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\Internet Explorer.evtx to zip dump
2025-12-09 07:14:56,821 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\Key Management Service.evtx to zip dump
2025-12-09 07:14:56,821 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\Microsoft-Windows-Sysmon%4Operational.evtx to zip dump
2025-12-09 07:14:56,836 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\OAlerts.evtx to zip dump
2025-12-09 07:14:56,836 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\Security.evtx to zip dump
2025-12-09 07:14:56,836 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\Setup.evtx to zip dump
2025-12-09 07:14:56,836 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\System.evtx to zip dump
2025-12-09 07:14:56,852 [modules.auxiliary.evtx] DEBUG: Adding C:/windows/Sysnative/winevt/Logs\Windows PowerShell.evtx to zip dump
2025-12-09 07:14:56,868 [modules.auxiliary.evtx] DEBUG: Uploading evtx.zip to host
2025-12-09 07:14:56,868 [lib.common.results] INFO: Uploading file evtx.zip to evtx/evtx.zip; Size is 101609; Max size: 100000000
2025-12-09 07:14:56,868 [root] INFO: Stopping auxiliary module: Human
2025-12-09 07:14:56,930 [root] INFO: Stopping auxiliary module: Pre_script
2025-12-09 07:14:56,930 [root] INFO: Stopping auxiliary module: Screenshots
2025-12-09 07:15:01,368 [root] INFO: Stopping auxiliary module: Usage
2025-12-09 07:15:03,102 [root] INFO: Stopping auxiliary module: During_script
2025-12-09 07:15:03,102 [root] INFO: Finishing auxiliary modules
2025-12-09 07:15:03,102 [root] INFO: Shutting down pipe server and dumping dropped files
2025-12-09 07:15:03,102 [lib.common.results] INFO: Uploading file C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat to files\76583c27a362f61dfb9ae5b76b869851fab55c2c67559ac0534ebe82b390c072; Size is 128; Max size: 100000000
2025-12-09 07:15:03,102 [root] WARNING: Folder at path "C:\VmtIcCTsP\debugger" does not exist, skipping
2025-12-09 07:15:03,102 [root] WARNING: Folder at path "C:\VmtIcCTsP\tlsdump" does not exist, skipping
2025-12-09 07:15:03,102 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| win7-64bit-3 | win7-64bit-3 | KVM | 2025-12-09 15:14:52 | 2025-12-09 15:18:15 | inetsim |
| File Name |
red_core.exe
|
|---|---|
| File Type | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
| File Size | 1236992 bytes |
| MD5 | 1b6bcbb38921caf347df0a21955771a6 |
| SHA1 | f464ca710afb55186e842ecbc550b55174f9261c |
| SHA256 | 0c3fc578835db3d9fab6839b0501c274c0e0b739fa0d4c102e21d5f228468d87 [VT] [MWDB] [Bazaar] |
| SHA3-384 | 317e2b885809218fa3a54956aace1ac0868d0e5f0d51bc29dfb221fe382d7327a30b4b8bf474ae0ad65eaa3e6725264a |
| CRC32 | D419F5E1 |
| TLSH | T13D45D010B681C437E0AB113445EB93765AAE78311B7AD4CBF7C49B3A2D616D1EB3438E |
| Ssdeep | 12288:y5j+6tvqy0JxsIWTrWqI4KxZdfh4gI/JA6hxc:y5j+6tvqyPLTrQzWvhx |
| PE | File Strings BinGraph Vba2Graph |
| Image Base | Entry Point | Reported Checksum | Actual Checksum | Minimum OS Version | Compile Time | Import Hash | Exported DLL Name |
|---|---|---|---|---|---|---|---|
| 0x10000000 | 0x00012bf2 | 0x00067f0d | 0x0013206b | 5.1 | 2019-03-06 10:20:32 | 37e48d0816c7485d18b7cc3e0d8ed0a0 | XBoxDllShellCode.dll |
| Name | RAW Address | Virtual Address | Virtual Size | Size of Raw Data | Characteristics | Entropy |
|---|---|---|---|---|---|---|
| .text | 0x00000400 | 0x00001000 | 0x0002a106 | 0x0002a200 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ | 6.67 |
| .rdata | 0x0002a600 | 0x0002c000 | 0x0000c99e | 0x0000ca00 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 5.80 |
| .data | 0x00037000 | 0x00039000 | 0x0002d8ac | 0x00029200 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 7.94 |
| .rsrc | 0x00060200 | 0x00067000 | 0x000001b4 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 5.12 |
| .reloc | 0x00060400 | 0x00068000 | 0x0000311e | 0x00003200 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ | 5.35 |
| Offset | 0x00063600 |
| Size | 0x000caa00 |
| Name | Offset | Size | Language | Sub-language | Entropy | File type |
|---|---|---|---|---|---|---|
| RT_MANIFEST | 0x00067058 | 0x0000015a | LANG_ENGLISH | SUBLANG_ENGLISH_US | 4.80 | None |
| Name | Address |
|---|---|
| GetAsyncKeyState | 0x1002c2e0 |
| GetForegroundWindow | 0x1002c2e4 |
| GetKeyState | 0x1002c2e8 |
| GetWindowTextW | 0x1002c2ec |
| GetMessageW | 0x1002c2f0 |
| TranslateMessage | 0x1002c2f4 |
| RegisterClassExW | 0x1002c2f8 |
| CreateWindowExW | 0x1002c2fc |
| DefWindowProcW | 0x1002c300 |
| DispatchMessageW | 0x1002c304 |
| UnregisterClassW | 0x1002c308 |
| Name | Address |
|---|---|
| ImpersonateLoggedOnUser | 0x1002c000 |
| StartServiceW | 0x1002c004 |
| ChangeServiceConfig2W | 0x1002c008 |
| RegCreateKeyW | 0x1002c00c |
| OpenServiceW | 0x1002c010 |
| OpenSCManagerW | 0x1002c014 |
| CloseServiceHandle | 0x1002c018 |
| CreateServiceW | 0x1002c01c |
| CreateWellKnownSid | 0x1002c020 |
| CheckTokenMembership | 0x1002c024 |
| GetUserNameA | 0x1002c028 |
| RegOpenCurrentUser | 0x1002c02c |
| OpenProcessToken | 0x1002c030 |
| DuplicateToken | 0x1002c034 |
| GetTokenInformation | 0x1002c038 |
| RegOverridePredefKey | 0x1002c03c |
| OpenThreadToken | 0x1002c040 |
| GetUserNameW | 0x1002c044 |
| RegSetValueExW | 0x1002c048 |
| RegCloseKey | 0x1002c04c |
| AdjustTokenPrivileges | 0x1002c050 |
| RegOpenKeyExW | 0x1002c054 |
| DuplicateTokenEx | 0x1002c058 |
| RegOpenKeyExA | 0x1002c05c |
| LookupPrivilegeValueW | 0x1002c060 |
| SetTokenInformation | 0x1002c064 |
| CreateProcessAsUserW | 0x1002c068 |
| RegQueryValueExW | 0x1002c06c |
| Name | Address |
|---|---|
| SHGetSpecialFolderPathW | 0x1002c2d0 |
| Name | Address |
|---|---|
| CoInitializeEx | 0x1002c39c |
| CoUninitialize | 0x1002c3a0 |
| CoCreateInstance | 0x1002c3a4 |
| Name | Address |
|---|---|
| SysStringLen | 0x1002c2a0 |
| SysAllocString | 0x1002c2a4 |
| SysFreeString | 0x1002c2a8 |
| Name | Address |
|---|---|
| PathFileExistsW | 0x1002c2d8 |
| Name | Address |
|---|---|
| HttpQueryInfoA | 0x1002c324 |
| InternetOpenUrlA | 0x1002c328 |
| InternetSetOptionW | 0x1002c32c |
| HttpQueryInfoW | 0x1002c330 |
| InternetCloseHandle | 0x1002c334 |
| InternetOpenW | 0x1002c338 |
| Name | Address |
|---|---|
| WTSQueryUserToken | 0x1002c394 |
| Name | Address |
|---|---|
| CreateEnvironmentBlock | 0x1002c310 |
| DestroyEnvironmentBlock | 0x1002c314 |
| LoadUserProfileW | 0x1002c318 |
| UnloadUserProfile | 0x1002c31c |
| Name | Address |
|---|---|
| EvtSubscribe | 0x1002c3ac |
| EvtRender | 0x1002c3b0 |
| Name | Address |
|---|---|
| connect | 0x1002c340 |
| accept | 0x1002c344 |
| getpeername | 0x1002c348 |
| gethostname | 0x1002c34c |
| socket | 0x1002c350 |
| inet_ntoa | 0x1002c354 |
| listen | 0x1002c358 |
| send | 0x1002c35c |
| gethostbyname | 0x1002c360 |
| closesocket | 0x1002c364 |
| __WSAFDIsSet | 0x1002c368 |
| WSAStartup | 0x1002c36c |
| inet_addr | 0x1002c370 |
| select | 0x1002c374 |
| htons | 0x1002c378 |
| bind | 0x1002c37c |
| recv | 0x1002c380 |
| WSACleanup | 0x1002c384 |
| setsockopt | 0x1002c388 |
| WSAIoctl | 0x1002c38c |
| Name | Address |
|---|---|
| GetAdaptersInfo | 0x1002c074 |
| Name | Address |
|---|---|
| RpcBindingFree | 0x1002c2b0 |
| RpcStringBindingComposeW | 0x1002c2b4 |
| RpcBindingFromStringBindingW | 0x1002c2b8 |
| RpcStringFreeA | 0x1002c2bc |
| RpcStringBindingComposeA | 0x1002c2c0 |
| RpcStringFreeW | 0x1002c2c4 |
| RpcBindingFromStringBindingA | 0x1002c2c8 |
| Name | Address | Ordinal |
|---|---|---|
| _getopt_a@12 | 0x10002740 | 1 |
| _getopt_long_a@20 | 0x100027a0 | 2 |
| _getopt_long_only_a@20 | 0x10002810 | 3 |
| _getopt_long_only_w@20 | 0x10003410 | 4 |
| _getopt_long_w@20 | 0x100033a0 | 5 |
| _getopt_w@12 | 0x10003340 | 6 |
| optarg_a | 0x100668a8 | 7 |
| optarg_w | 0x100668a4 | 8 |
| opterr | 0x1006190c | 9 |
| optind | 0x1006178c | 10 |
| optopt | 0x10061aac | 11 |
| Discovery | Command and Control | Defense Evasion | Privilege Escalation |
|
|
|
|---|
No hosts contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP