Detection(s): AgentTesla
Status: Malicious
| Category | Package | Started | Completed | Duration | Options | Log(s) | MalScore |
|---|---|---|---|---|---|---|---|
| FILE | exe | 2025-12-09 15:36:52 | 2025-12-09 15:40:58 | 246 seconds | Show Options | Show Analysis Log | 10.0 |
vnc_port=5900
2025-12-06 18:57:52,416 [root] INFO: Date set to: 20251209T07:36:52, timeout set to: 180
2025-12-09 07:36:52,064 [root] DEBUG: Starting analyzer from: C:\tmpuce0d7me
2025-12-09 07:36:52,064 [root] DEBUG: Storing results at: C:\EXMiUAlFU
2025-12-09 07:36:52,064 [root] DEBUG: Pipe server name: \\.\PIPE\XguFKzxgD
2025-12-09 07:36:52,064 [root] DEBUG: Python path: C:\Python38
2025-12-09 07:36:52,064 [root] INFO: analysis running as an admin
2025-12-09 07:36:52,064 [root] INFO: analysis package specified: "exe"
2025-12-09 07:36:52,064 [root] DEBUG: importing analysis package module: "modules.packages.exe"...
2025-12-09 07:36:52,064 [root] DEBUG: imported analysis package "exe"
2025-12-09 07:36:52,064 [root] DEBUG: initializing analysis package "exe"...
2025-12-09 07:36:52,064 [lib.common.common] INFO: wrapping
2025-12-09 07:36:52,064 [lib.core.compound] INFO: C:\Users\user\AppData\Local\Temp already exists, skipping creation
2025-12-09 07:36:52,064 [root] DEBUG: New location of moved file: C:\Users\user\AppData\Local\Temp\BL 216238068 DOCS.exe
2025-12-09 07:36:52,064 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option
2025-12-09 07:36:52,064 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option
2025-12-09 07:36:52,064 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader option
2025-12-09 07:36:52,064 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader_64 option
2025-12-09 07:36:52,127 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser"
2025-12-09 07:36:52,127 [root] DEBUG: Imported auxiliary module "modules.auxiliary.curtain"
2025-12-09 07:36:52,142 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise"
2025-12-09 07:36:52,142 [root] DEBUG: Imported auxiliary module "modules.auxiliary.during_script"
2025-12-09 07:36:52,142 [root] DEBUG: Imported auxiliary module "modules.auxiliary.end_noisy_tasks"
2025-12-09 07:36:52,142 [root] DEBUG: Imported auxiliary module "modules.auxiliary.evtx"
2025-12-09 07:36:52,158 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human"
2025-12-09 07:36:52,158 [root] DEBUG: Imported auxiliary module "modules.auxiliary.pre_script"
2025-12-09 07:36:52,158 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2025-12-09 07:36:52,158 [lib.api.screenshot] ERROR: No module named 'PIL'
2025-12-09 07:36:52,158 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots"
2025-12-09 07:36:52,158 [root] DEBUG: Imported auxiliary module "modules.auxiliary.sysmon"
2025-12-09 07:36:52,158 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump"
2025-12-09 07:36:52,158 [root] DEBUG: Imported auxiliary module "modules.auxiliary.usage"
2025-12-09 07:36:52,158 [root] DEBUG: Initialized auxiliary module "Browser"
2025-12-09 07:36:52,158 [root] DEBUG: attempting to configure 'Browser' from data
2025-12-09 07:36:52,158 [root] DEBUG: module Browser does not support data configuration, ignoring
2025-12-09 07:36:52,158 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"...
2025-12-09 07:36:52,158 [root] DEBUG: Started auxiliary module modules.auxiliary.browser
2025-12-09 07:36:52,158 [root] DEBUG: Initialized auxiliary module "Curtain"
2025-12-09 07:36:52,158 [root] DEBUG: attempting to configure 'Curtain' from data
2025-12-09 07:36:52,158 [root] DEBUG: module Curtain does not support data configuration, ignoring
2025-12-09 07:36:52,158 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.curtain"...
2025-12-09 07:36:52,158 [root] DEBUG: Started auxiliary module modules.auxiliary.curtain
2025-12-09 07:36:52,158 [root] DEBUG: Initialized auxiliary module "Disguise"
2025-12-09 07:36:52,158 [root] DEBUG: attempting to configure 'Disguise' from data
2025-12-09 07:36:52,158 [root] DEBUG: module Disguise does not support data configuration, ignoring
2025-12-09 07:36:52,158 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"...
2025-12-09 07:36:52,174 [modules.auxiliary.disguise] INFO: Disguising GUID to 4caeea21-227a-4ad0-bada-5b09cc2e9d32
2025-12-09 07:36:52,174 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise
2025-12-09 07:36:52,174 [root] DEBUG: Initialized auxiliary module "End_noisy_tasks"
2025-12-09 07:36:52,174 [root] DEBUG: attempting to configure 'End_noisy_tasks' from data
2025-12-09 07:36:52,174 [root] DEBUG: module End_noisy_tasks does not support data configuration, ignoring
2025-12-09 07:36:52,174 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.end_noisy_tasks"...
2025-12-09 07:36:52,174 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM wuauclt.exe
2025-12-09 07:36:52,174 [root] DEBUG: Started auxiliary module modules.auxiliary.end_noisy_tasks
2025-12-09 07:36:52,174 [root] DEBUG: Initialized auxiliary module "Evtx"
2025-12-09 07:36:52,174 [root] DEBUG: attempting to configure 'Evtx' from data
2025-12-09 07:36:52,174 [root] DEBUG: module Evtx does not support data configuration, ignoring
2025-12-09 07:36:52,174 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.evtx"...
2025-12-09 07:36:52,174 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security State Change" /success:enable /failure:enable
2025-12-09 07:36:52,174 [root] DEBUG: Started auxiliary module modules.auxiliary.evtx
2025-12-09 07:36:52,189 [root] DEBUG: Initialized auxiliary module "Human"
2025-12-09 07:36:52,189 [root] DEBUG: attempting to configure 'Human' from data
2025-12-09 07:36:52,189 [root] DEBUG: module Human does not support data configuration, ignoring
2025-12-09 07:36:52,189 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"...
2025-12-09 07:36:52,189 [root] DEBUG: Started auxiliary module modules.auxiliary.human
2025-12-09 07:36:52,189 [root] DEBUG: Initialized auxiliary module "Pre_script"
2025-12-09 07:36:52,189 [root] DEBUG: attempting to configure 'Pre_script' from data
2025-12-09 07:36:52,189 [root] DEBUG: module Pre_script does not support data configuration, ignoring
2025-12-09 07:36:52,189 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.pre_script"...
2025-12-09 07:36:52,189 [root] DEBUG: Started auxiliary module modules.auxiliary.pre_script
2025-12-09 07:36:52,189 [root] DEBUG: Initialized auxiliary module "Screenshots"
2025-12-09 07:36:52,189 [root] DEBUG: attempting to configure 'Screenshots' from data
2025-12-09 07:36:52,189 [root] DEBUG: module Screenshots does not support data configuration, ignoring
2025-12-09 07:36:52,189 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"...
2025-12-09 07:36:52,205 [modules.auxiliary.screenshots] WARNING: Python Image Library is not installed, screenshots are disabled
2025-12-09 07:36:52,205 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots
2025-12-09 07:36:52,205 [root] DEBUG: Initialized auxiliary module "Sysmon"
2025-12-09 07:36:52,205 [root] DEBUG: attempting to configure 'Sysmon' from data
2025-12-09 07:36:52,205 [root] DEBUG: module Sysmon does not support data configuration, ignoring
2025-12-09 07:36:52,205 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.sysmon"...
2025-12-09 07:36:52,423 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security System Extension" /success:enable /failure:enable
2025-12-09 07:36:52,517 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"System Integrity" /success:enable /failure:enable
2025-12-09 07:36:52,548 [root] WARNING: Cannot execute auxiliary module modules.auxiliary.sysmon: In order to use the Sysmon functionality, it is required to have the SMaster(64|32).exe file and sysmonconfig-export.xml file in the bin path. Note that the SMaster(64|32).exe files are just the standard Sysmon binaries renamed to avoid anti-analysis detection techniques.
2025-12-09 07:36:52,548 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets"
2025-12-09 07:36:52,548 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data
2025-12-09 07:36:52,548 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring
2025-12-09 07:36:52,548 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"...
2025-12-09 07:36:52,548 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 720
2025-12-09 07:36:52,548 [lib.api.process] INFO: Monitor config for <Process 720 lsass.exe>: C:\tmpuce0d7me\dll\720.ini
2025-12-09 07:36:52,611 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Driver" /success:disable /failure:disable
2025-12-09 07:36:52,736 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM wusa.exe
2025-12-09 07:36:52,752 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other System Events" /success:disable /failure:enable
2025-12-09 07:36:52,830 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Logon" /success:enable /failure:enable
2025-12-09 07:36:52,877 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM WindowsUpdate.exe
2025-12-09 07:36:52,955 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Logoff" /success:enable /failure:enable
2025-12-09 07:36:53,127 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Account Lockout" /success:enable /failure:enable
2025-12-09 07:36:53,127 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM GoogleUpdate.exe
2025-12-09 07:36:53,205 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Main Mode" /success:disable /failure:disable
2025-12-09 07:36:53,267 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM MicrosoftEdgeUpdate.exe
2025-12-09 07:36:53,346 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Quick Mode" /success:disable /failure:disable
2025-12-09 07:36:53,423 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Extended Mode" /success:disable /failure:disable
2025-12-09 07:36:53,471 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Logon/Logoff Events" /success:enable /failure:enable
2025-12-09 07:36:53,471 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v DisableWindowsUpdateAccess /t REG_DWORD /d 1 /f
2025-12-09 07:36:53,517 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable
2025-12-09 07:36:53,517 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f
2025-12-09 07:36:53,548 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Special Logon" /success:enable /failure:enable
2025-12-09 07:36:53,564 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor
2025-12-09 07:36:53,564 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpuce0d7me\dll\uusrbr.dll, loader C:\tmpuce0d7me\bin\MSGZtlUS.exe
2025-12-09 07:36:53,564 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v EnableICMPRedirect /t REG_DWORD /d 0 /f
2025-12-09 07:36:53,596 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"File System" /success:enable /failure:enable
2025-12-09 07:36:53,627 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Registry" /success:enable /failure:enable
2025-12-09 07:36:53,642 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kernel Object" /success:enable /failure:enable
2025-12-09 07:36:53,673 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"SAM" /success:disable /failure:disable
2025-12-09 07:36:53,705 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Certification Services" /success:enable /failure:enable
2025-12-09 07:36:53,721 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Handle Manipulation" /success:disable /failure:disable
2025-12-09 07:36:53,752 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Application Generated" /success:enable /failure:enable
2025-12-09 07:36:53,783 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"File Share" /success:enable /failure:enable
2025-12-09 07:36:53,814 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:disable /failure:disable
2025-12-09 07:36:53,846 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:disable
2025-12-09 07:36:53,877 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Object Access Events" /success:disable /failure:disable
2025-12-09 07:36:53,908 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Sensitive Privilege Use" /success:disable /failure:disable
2025-12-09 07:36:53,939 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Non Sensitive Privilege Use" /success:disable /failure:disable
2025-12-09 07:36:53,955 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Privilege Use Events" /success:disable /failure:disable
2025-12-09 07:36:53,986 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"RPC Events" /success:enable /failure:enable
2025-12-09 07:36:54,017 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Audit Policy Change" /success:enable /failure:enable
2025-12-09 07:36:54,048 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Authentication Policy Change" /success:enable /failure:enable
2025-12-09 07:36:54,080 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"MPSSVC Rule-Level Policy Change" /success:disable /failure:disable
2025-12-09 07:36:54,096 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Policy Change" /success:disable /failure:disable
2025-12-09 07:36:54,127 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Policy Change Events" /success:disable /failure:enable
2025-12-09 07:36:54,158 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable
2025-12-09 07:36:54,189 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Computer Account Management" /success:enable /failure:enable
2025-12-09 07:36:54,221 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
2025-12-09 07:36:54,267 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Distribution Group Management" /success:enable /failure:enable
2025-12-09 07:36:54,298 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Application Group Management" /success:enable /failure:enable
2025-12-09 07:36:54,314 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Account Management Events" /success:enable /failure:enable
2025-12-09 07:36:54,361 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Access" /success:enable /failure:enable
2025-12-09 07:36:54,392 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Changes" /success:enable /failure:enable
2025-12-09 07:36:54,439 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Replication" /success:disable /failure:enable
2025-12-09 07:36:54,471 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Detailed Directory Service Replication" /success:disable /failure:disable
2025-12-09 07:36:54,502 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Credential Validation" /success:enable /failure:enable
2025-12-09 07:36:54,517 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kerberos Service Ticket Operations" /success:enable /failure:enable
2025-12-09 07:36:54,548 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Account Logon Events" /success:enable /failure:enable
2025-12-09 07:36:54,580 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kerberos Authentication Service" /success:enable /failure:enable
2025-12-09 07:36:54,611 [modules.auxiliary.evtx] DEBUG: Wiping Application
2025-12-09 07:36:54,627 [modules.auxiliary.evtx] DEBUG: Wiping HardwareEvents
2025-12-09 07:36:54,658 [modules.auxiliary.evtx] DEBUG: Wiping Internet Explorer
2025-12-09 07:36:54,689 [modules.auxiliary.evtx] DEBUG: Wiping Key Management Service
2025-12-09 07:36:54,721 [modules.auxiliary.evtx] DEBUG: Wiping OAlerts
2025-12-09 07:36:54,736 [modules.auxiliary.evtx] DEBUG: Wiping Security
2025-12-09 07:36:54,767 [modules.auxiliary.evtx] DEBUG: Wiping Setup
2025-12-09 07:36:54,798 [modules.auxiliary.evtx] DEBUG: Wiping System
2025-12-09 07:36:54,830 [modules.auxiliary.evtx] DEBUG: Wiping Windows PowerShell
2025-12-09 07:36:54,846 [modules.auxiliary.evtx] DEBUG: Wiping Microsoft-Windows-Sysmon/Operational
2025-12-09 07:37:17,573 [root] DEBUG: Loader: Injecting process 720 with C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:37:41,597 [root] DEBUG: 720: Python path set to 'C:\Python38'.
2025-12-09 07:37:41,597 [root] INFO: Disabling sleep skipping.
2025-12-09 07:37:41,613 [root] DEBUG: 720: TLS secret dump mode enabled.
2025-12-09 07:37:41,613 [root] DEBUG: 720: GetAddressByYara: ModuleBase 0x00007FF8E5730000 FunctionName RtlInsertInvertedFunctionTable
2025-12-09 07:37:41,613 [root] DEBUG: 720: RtlInsertInvertedFunctionTable 0x00007FF8E575BBFA, LdrpInvertedFunctionTableSRWLock 0x00007FF8E58B70F0
2025-12-09 07:37:41,613 [root] DEBUG: 720: Monitor initialised: 64-bit capemon loaded in process 720 at 0x00007FF8B7F50000, thread 4304, image base 0x00007FF6E3C60000, stack from 0x000000DE97A74000-0x000000DE97A80000
2025-12-09 07:37:41,613 [root] DEBUG: 720: Commandline: C:\Windows\system32\lsass.exe
2025-12-09 07:37:41,613 [root] DEBUG: 720: Hooked 5 out of 5 functions
2025-12-09 07:37:41,613 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-09 07:37:41,613 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:37:41,613 [lib.api.process] INFO: Injected into 64-bit <Process 720 lsass.exe>
2025-12-09 07:37:41,613 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump
2025-12-09 07:37:41,613 [root] DEBUG: Initialized auxiliary module "Usage"
2025-12-09 07:37:41,613 [root] DEBUG: attempting to configure 'Usage' from data
2025-12-09 07:37:41,613 [root] DEBUG: module Usage does not support data configuration, ignoring
2025-12-09 07:37:41,613 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.usage"...
2025-12-09 07:37:41,628 [root] DEBUG: Started auxiliary module modules.auxiliary.usage
2025-12-09 07:37:41,628 [root] DEBUG: Initialized auxiliary module "During_script"
2025-12-09 07:37:41,628 [root] DEBUG: attempting to configure 'During_script' from data
2025-12-09 07:37:41,628 [root] DEBUG: module During_script does not support data configuration, ignoring
2025-12-09 07:37:41,628 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.during_script"...
2025-12-09 07:37:41,628 [root] DEBUG: Started auxiliary module modules.auxiliary.during_script
2025-12-09 07:37:44,285 [root] INFO: Restarting WMI Service
2025-12-09 07:37:46,347 [root] DEBUG: package modules.packages.exe does not support configure, ignoring
2025-12-09 07:37:46,347 [root] WARNING: configuration error for package modules.packages.exe: error importing data.packages.exe: No module named 'data.packages'
2025-12-09 07:37:46,347 [lib.core.compound] INFO: C:\Users\user\AppData\Local\Temp already exists, skipping creation
2025-12-09 07:38:10,371 [lib.api.process] INFO: Successfully executed process from path "C:\Users\user\AppData\Local\Temp\BL 216238068 DOCS.exe" with arguments "" with pid 6568
2025-12-09 07:38:10,371 [lib.api.process] INFO: Monitor config for <Process 6568 BL 216238068 DOCS.exe>: C:\tmpuce0d7me\dll\6568.ini
2025-12-09 07:38:10,371 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:38:34,406 [root] DEBUG: Loader: Injecting process 6568 (thread 4392) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:38:34,406 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2025-12-09 07:38:34,406 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2025-12-09 07:38:34,406 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:38:34,406 [lib.api.process] INFO: Injected into 32-bit <Process 6568 BL 216238068 DOCS.exe>
2025-12-09 07:38:36,422 [lib.api.process] INFO: Successfully resumed <Process 6568 BL 216238068 DOCS.exe>
2025-12-09 07:39:00,465 [root] DEBUG: 6568: Python path set to 'C:\Python38'.
2025-12-09 07:39:00,465 [root] INFO: Disabling sleep skipping.
2025-12-09 07:39:00,465 [root] DEBUG: 6568: Dropped file limit defaulting to 100.
2025-12-09 07:39:00,465 [root] DEBUG: 6568: YaraInit: Compiled 41 rule files
2025-12-09 07:39:00,465 [root] DEBUG: 6568: YaraInit: Compiled rules saved to file C:\tmpuce0d7me\data\yara\capemon.yac
2025-12-09 07:39:00,465 [root] DEBUG: 6568: YaraScan: Scanning 0x001B0000, size 0x240
2025-12-09 07:39:00,465 [root] DEBUG: 6568: AmsiDumper initialised.
2025-12-09 07:39:00,465 [root] DEBUG: 6568: Monitor initialised: 32-bit capemon loaded in process 6568 at 0x74fc0000, thread 4392, image base 0x1b0000, stack from 0x6f5000-0x700000
2025-12-09 07:39:00,465 [root] DEBUG: 6568: Commandline: "C:\Users\user\AppData\Local\Temp\BL 216238068 DOCS.exe"
2025-12-09 07:39:00,465 [root] DEBUG: 6568: GetAddressByYara: ModuleBase 0x77AF0000 FunctionName LdrpCallInitRoutine
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: LdrpCallInitRoutine export address 0x77B666A0 obtained via GetFunctionAddress
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - CreateRemoteThreadEx export address 0x75FC9A4C differs from GetProcAddress -> 0x76FFDDB0 (KERNELBASE.dll::0x11ddb0)
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - CoCreateInstance export address 0x77890FEB differs from GetProcAddress -> 0x7724FF70 (combase.dll::0xdff70)
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - CoCreateInstanceEx export address 0x7789102A differs from GetProcAddress -> 0x7729CCF0 (combase.dll::0x12ccf0)
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - CoGetClassObject export address 0x778915BA differs from GetProcAddress -> 0x77212BD0 (combase.dll::0xa2bd0)
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - UpdateProcThreadAttribute export address 0x75FD18BA differs from GetProcAddress -> 0x7702BD10 (KERNELBASE.dll::0x14bd10)
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - SetWindowLongW export address 0x7594ED80 differs from GetProcAddress -> 0x714200F0 (apphelp.dll::0x600f0)
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - EnumDisplayDevicesA export address 0x759B7B40 differs from GetProcAddress -> 0x7141F680 (apphelp.dll::0x5f680)
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - EnumDisplayDevicesW export address 0x75960400 differs from GetProcAddress -> 0x7141F6B0 (apphelp.dll::0x5f6b0)
2025-12-09 07:39:00,481 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-09 07:39:00,481 [root] DEBUG: 6568: set_hooks: Unable to hook GetCommandLineA
2025-12-09 07:39:00,481 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-09 07:39:00,481 [root] DEBUG: 6568: set_hooks: Unable to hook GetCommandLineW
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - CLSIDFromProgID export address 0x77890824 differs from GetProcAddress -> 0x771E54C0 (combase.dll::0x754c0)
2025-12-09 07:39:00,481 [root] DEBUG: 6568: hook_api: Warning - CLSIDFromProgIDEx export address 0x77890861 differs from GetProcAddress -> 0x771DFF40 (combase.dll::0x6ff40)
2025-12-09 07:39:00,496 [root] DEBUG: 6568: Hooked 611 out of 613 functions
2025-12-09 07:39:00,496 [root] DEBUG: 6568: Syscall hook installed, syscall logging level 1
2025-12-09 07:39:00,496 [root] DEBUG: 6568: WoW64fix: Windows version 6.2 not supported.
2025-12-09 07:39:00,496 [root] INFO: Loaded monitor into process with pid 6568
2025-12-09 07:39:00,496 [root] DEBUG: 6568: DLL loaded at 0x74F00000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei (0x88000 bytes).
2025-12-09 07:39:00,496 [root] DEBUG: 6568: set_hooks_by_export_directory: Hooked 0 out of 613 functions
2025-12-09 07:39:00,496 [root] DEBUG: 6568: DLL loaded at 0x755C0000: C:\Windows\SYSTEM32\kernel.appcore (0x13000 bytes).
2025-12-09 07:39:00,512 [root] DEBUG: 6568: DLL loaded at 0x753A0000: C:\Windows\SYSTEM32\VERSION (0x8000 bytes).
2025-12-09 07:39:00,543 [root] DEBUG: 6568: DLL loaded at 0x74E40000: C:\Windows\SYSTEM32\ucrtbase_clr0400 (0xb3000 bytes).
2025-12-09 07:39:00,543 [root] DEBUG: 6568: DLL loaded at 0x753B0000: C:\Windows\SYSTEM32\VCRUNTIME140_CLR0400 (0x15000 bytes).
2025-12-09 07:39:00,543 [root] DEBUG: 6568: DLL loaded at 0x728E0000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\clr (0x7bc000 bytes).
2025-12-09 07:39:00,543 [root] DEBUG: 6568: AllocationHandler: Adding allocation to tracked region list: 0x03D23000, size: 0x1000.
2025-12-09 07:39:00,543 [root] DEBUG: 6568: GetEntropy: Error - Supplied address inaccessible: 0x03D20000
2025-12-09 07:39:00,543 [root] DEBUG: 6568: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:00,559 [root] DEBUG: 6568: api-rate-cap: NtQueryPerformanceCounter hook disabled due to rate
2025-12-09 07:39:00,559 [root] DEBUG: 6568: InstrumentationCallback: Added region at 0x76EE0000 to tracked regions list (thread 4392).
2025-12-09 07:39:00,637 [root] DEBUG: 6568: DLL loaded at 0x71490000: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\31532774e8bbbd9c59b5e6d7829d3242\mscorlib.ni (0x144c000 bytes).
2025-12-09 07:39:00,637 [root] DEBUG: 6568: DLL loaded at 0x77560000: C:\Windows\System32\bcryptPrimitives (0x62000 bytes).
2025-12-09 07:39:00,653 [root] DEBUG: 6568: DLL loaded at 0x753D0000: C:\Windows\system32\uxtheme (0x7f000 bytes).
2025-12-09 07:39:00,653 [root] DEBUG: 6568: AllocationHandler: Adding allocation to tracked region list: 0x04E10000, size: 0x1000.
2025-12-09 07:39:00,653 [root] DEBUG: 6568: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:00,653 [root] DEBUG: 6568: AllocationHandler: Processing previous tracked region at: 0x03D20000.
2025-12-09 07:39:00,653 [root] DEBUG: 6568: DumpPEsInRange: Scanning range 0x03D20000 - 0x03D20015.
2025-12-09 07:39:00,653 [root] DEBUG: 6568: ScanForDisguisedPE: Size too small: 0x15 bytes
2025-12-09 07:39:00,653 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_128876080391592122025 to CAPE\3ee52bf4b3bd0857e04665d780e33dea6ee3e64c887b914ace3f17f41f796d57; Size is 21; Max size: 100000000
2025-12-09 07:39:00,653 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_128876080391592122025 (size 21 bytes)
2025-12-09 07:39:00,653 [root] DEBUG: 6568: DumpRegion: Dumped entire allocation from 0x03D20000, size 4096 bytes.
2025-12-09 07:39:00,653 [root] DEBUG: 6568: ProcessTrackedRegion: Dumped region at 0x03D20000.
2025-12-09 07:39:00,653 [root] DEBUG: 6568: YaraScan: Scanning 0x03D20000, size 0x15
2025-12-09 07:39:00,668 [root] DEBUG: 6568: DLL loaded at 0x75E70000: C:\Windows\System32\OLEAUT32 (0x9c000 bytes).
2025-12-09 07:39:00,668 [root] DEBUG: 6568: hook_api: clrjit::compileMethod export address 0x7463A700 obtained via GetFunctionAddress
2025-12-09 07:39:00,668 [root] DEBUG: 6568: DLL loaded at 0x74620000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\clrjit (0x7e000 bytes).
2025-12-09 07:39:00,668 [root] DEBUG: 6568: .NET JIT native cache at 0x04E10000: scans and dumps active.
2025-12-09 07:39:00,668 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x04E10000 skipped
2025-12-09 07:39:00,700 [root] DEBUG: 6568: DLL loaded at 0x709A0000: C:\Windows\assembly\NativeImages_v4.0.30319_32\System\5380d2b417dae69a597fcfb16c76a7b7\System.ni (0xa1c000 bytes).
2025-12-09 07:39:00,700 [root] DEBUG: 6568: AllocationHandler: Adding allocation to tracked region list: 0x03D55000, size: 0x1000.
2025-12-09 07:39:00,700 [root] DEBUG: 6568: GetEntropy: Error - Supplied address inaccessible: 0x03D50000
2025-12-09 07:39:00,715 [root] DEBUG: 6568: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: AllocationHandler: Processing previous tracked region at: 0x04E10000.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x04E10000 skipped
2025-12-09 07:39:00,715 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x03D50000.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x03D50000.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: ProtectionHandler: Adding region at 0x001B2000 to tracked regions.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: ProtectionHandler: Processing previous tracked region at: 0x03D50000.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: DumpPEsInRange: Scanning range 0x03D50000 - 0x03D5008C.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: ScanForDisguisedPE: Size too small: 0x8c bytes
2025-12-09 07:39:00,715 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_137072650391592122025 to CAPE\3fd25c81c21d07d97f83c000170097e43af21a8a3f683178fdfecd54a2224d3b; Size is 140; Max size: 100000000
2025-12-09 07:39:00,715 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_137072650391592122025 (size 140 bytes)
2025-12-09 07:39:00,715 [root] DEBUG: 6568: DumpRegion: Dumped entire allocation from 0x03D50000, size 4096 bytes.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: ProcessTrackedRegion: Dumped region at 0x03D50000.
2025-12-09 07:39:00,715 [root] DEBUG: 6568: YaraScan: Scanning 0x03D50000, size 0x8c
2025-12-09 07:39:00,715 [root] DEBUG: 6568: YaraScan: Scanning 0x001B0000, size 0x240
2025-12-09 07:39:00,715 [root] DEBUG: 6568: ProcessImageBase: Main module image at 0x001B0000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:39:00,715 [root] DEBUG: 6568: api-rate-cap: NtOpenProcess hook disabled due to rate
2025-12-09 07:39:00,825 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x03D20000.
2025-12-09 07:39:00,871 [root] DEBUG: 6568: DLL loaded at 0x70180000: C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\53a9cd078a677c9b2820831d13828801\System.Core.ni (0x818000 bytes).
2025-12-09 07:39:00,887 [root] DEBUG: 6568: DLL loaded at 0x74510000: C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\7ca34fb9f713c597d60f034e09f5da28\System.Configuration.ni (0x105000 bytes).
2025-12-09 07:39:00,887 [root] DEBUG: 6568: AllocationHandler: Adding allocation to tracked region list: 0x03D4A000, size: 0x1000.
2025-12-09 07:39:00,887 [root] DEBUG: 6568: GetEntropy: Error - Supplied address inaccessible: 0x03D40000
2025-12-09 07:39:00,887 [root] DEBUG: 6568: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:00,887 [root] DEBUG: 6568: AllocationHandler: Processing previous tracked region at: 0x001B0000.
2025-12-09 07:39:00,887 [root] DEBUG: 6568: YaraScan: Scanning 0x001B0000, size 0x240
2025-12-09 07:39:00,887 [root] DEBUG: 6568: ProcessImageBase: Main module image at 0x001B0000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:39:00,887 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x03D40000.
2025-12-09 07:39:00,887 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x03D40000.
2025-12-09 07:39:00,918 [root] DEBUG: 6568: DLL loaded at 0x6FA10000: C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\dbbfe4100fa444758f5b90b58d6b6cd2\System.Xml.ni (0x76c000 bytes).
2025-12-09 07:39:00,934 [root] DEBUG: 6568: DLL loaded at 0x765D0000: C:\Windows\System32\shell32 (0x697000 bytes).
2025-12-09 07:39:00,965 [root] DEBUG: 6568: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:39:00,965 [root] DEBUG: 6568: DLL loaded at 0x752D0000: C:\Windows\SYSTEM32\wintypes (0xc7000 bytes).
2025-12-09 07:39:00,965 [root] DEBUG: 6568: DLL loaded at 0x746A0000: C:\Windows\SYSTEM32\windows.storage (0x6ec000 bytes).
2025-12-09 07:39:00,981 [root] DEBUG: 6568: DLL loaded at 0x77700000: C:\Windows\System32\SHCORE (0xc1000 bytes).
2025-12-09 07:39:00,981 [root] DEBUG: 6568: DLL loaded at 0x744F0000: C:\Windows\SYSTEM32\profapi (0x1d000 bytes).
2025-12-09 07:39:00,981 [root] DEBUG: 6568: DLL loaded at 0x74DF0000: C:\Windows\SYSTEM32\CRYPTSP (0x15000 bytes).
2025-12-09 07:39:00,996 [root] DEBUG: 6568: DLL loaded at 0x74DC0000: C:\Windows\system32\rsaenh (0x30000 bytes).
2025-12-09 07:39:00,996 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x04E10000.
2025-12-09 07:39:01,012 [root] DEBUG: 6568: DLL loaded at 0x74450000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.22621.2506_none_fbe8e1f07808be9b\comctl32 (0x91000 bytes).
2025-12-09 07:39:01,012 [root] DEBUG: 6568: .NET JIT native cache at 0x07410000: scans and dumps active.
2025-12-09 07:39:01,012 [root] DEBUG: 6568: caller_dispatch: Added region at 0x07410000 to tracked regions list (kernel32::SetErrorMode returns to 0x074110FA, thread 4392).
2025-12-09 07:39:01,012 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x07410000 skipped
2025-12-09 07:39:01,012 [root] DEBUG: 6568: AllocationHandler: Adding allocation to tracked region list: 0x03D3D000, size: 0x1000.
2025-12-09 07:39:01,012 [root] DEBUG: 6568: AllocationHandler: Processing previous tracked region at: 0x03D40000.
2025-12-09 07:39:01,012 [root] DEBUG: 6568: DumpPEsInRange: Scanning range 0x03D40000 - 0x03D4008C.
2025-12-09 07:39:01,012 [root] DEBUG: 6568: ScanForDisguisedPE: Size too small: 0x8c bytes
2025-12-09 07:39:01,012 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_708721391592122025 to CAPE\f3789173eebb2cdeb5cc1247ebf1650ef64010cb410b78783f13b73858f13e14; Size is 140; Max size: 100000000
2025-12-09 07:39:01,027 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_708721391592122025 (size 140 bytes)
2025-12-09 07:39:01,027 [root] DEBUG: 6568: DumpRegion: Dumped entire allocation from 0x03D40000, size 4096 bytes.
2025-12-09 07:39:01,027 [root] DEBUG: 6568: ProcessTrackedRegion: Dumped region at 0x03D40000.
2025-12-09 07:39:01,027 [root] DEBUG: 6568: YaraScan: Scanning 0x03D40000, size 0x8c
2025-12-09 07:39:01,043 [root] DEBUG: 6568: InstrumentationCallback: Added region at 0x75F30000 to tracked regions list (thread 4392).
2025-12-09 07:39:01,043 [root] DEBUG: 6568: AllocationHandler: Adding allocation to tracked region list: 0x7EF70000, size: 0x50000.
2025-12-09 07:39:01,043 [root] DEBUG: 6568: GetEntropy: Error - Supplied address inaccessible: 0x7EF70000
2025-12-09 07:39:01,043 [root] DEBUG: 6568: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:01,043 [root] DEBUG: 6568: AllocationHandler: Processing previous tracked region at: 0x03D30000.
2025-12-09 07:39:01,043 [root] DEBUG: 6568: DumpPEsInRange: Scanning range 0x03D30000 - 0x03D3D0F6.
2025-12-09 07:39:01,043 [root] DEBUG: 6568: ScanForDisguisedPE: No PE image located in range 0x03D30000-0x03D3D0F6.
2025-12-09 07:39:01,043 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_11027351391592122025 to CAPE\de556c3a42f872a83e49c892ac174d285be4923a8321cb189c47b6d774ec6bea; Size is 53494; Max size: 100000000
2025-12-09 07:39:01,059 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_11027351391592122025 (size 53494 bytes)
2025-12-09 07:39:01,059 [root] DEBUG: 6568: DumpRegion: Dumped entire allocation from 0x03D30000, size 57344 bytes.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: ProcessTrackedRegion: Dumped region at 0x03D30000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: YaraScan: Scanning 0x03D30000, size 0xd0f6
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AllocationHandler: Memory region (size 0x50000) reserved but not committed at 0x7EF70000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AllocationHandler: Previously reserved region at 0x7EF70000, committing at: 0x7EF70000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x7EF70000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x7EF70000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AllocationHandler: Adding allocation to tracked region list: 0x7EF60000, size: 0x10000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: GetEntropy: Error - Supplied address inaccessible: 0x7EF60000
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AllocationHandler: Processing previous tracked region at: 0x7EF70000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: DumpPEsInRange: Scanning range 0x7EF70000 - 0x7EF7003C.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: ScanForDisguisedPE: Size too small: 0x3c bytes
2025-12-09 07:39:01,059 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_11417091391592122025 to CAPE\3deb629b7d2fb549a3affe1f753c3c96fbfccc71cb335834412b40c0ca87833c; Size is 60; Max size: 100000000
2025-12-09 07:39:01,059 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_11417091391592122025 (size 60 bytes)
2025-12-09 07:39:01,059 [root] DEBUG: 6568: DumpRegion: Dumped entire allocation from 0x7EF70000, size 4096 bytes.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: ProcessTrackedRegion: Dumped region at 0x7EF70000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: YaraScan: Scanning 0x7EF70000, size 0x3c
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AllocationHandler: Memory region (size 0x10000) reserved but not committed at 0x7EF60000.
2025-12-09 07:39:01,059 [root] DEBUG: 6568: AllocationHandler: Previously reserved region at 0x7EF60000, committing at: 0x7EF60000.
2025-12-09 07:39:01,074 [root] DEBUG: 6568: DLL loaded at 0x74060000: C:\Windows\SYSTEM32\iertutil (0x238000 bytes).
2025-12-09 07:39:01,090 [root] DEBUG: 6568: DLL loaded at 0x74040000: C:\Windows\SYSTEM32\srvcli (0x1d000 bytes).
2025-12-09 07:39:01,090 [root] DEBUG: 6568: DLL loaded at 0x74E30000: C:\Windows\SYSTEM32\netutils (0xb000 bytes).
2025-12-09 07:39:01,090 [root] DEBUG: 6568: DLL loaded at 0x742A0000: C:\Windows\SYSTEM32\urlmon (0x1a2000 bytes).
2025-12-09 07:39:01,106 [root] DEBUG: 6568: DLL loaded at 0x73F70000: C:\Windows\SYSTEM32\PROPSYS (0xc7000 bytes).
2025-12-09 07:39:01,121 [root] DEBUG: 6568: DLL loaded at 0x73B20000: C:\Windows\SYSTEM32\virtdisk (0x12000 bytes).
2025-12-09 07:39:01,137 [root] DEBUG: 6568: .NET JIT native cache at 0x079A0000: scans and dumps active.
2025-12-09 07:39:01,137 [root] DEBUG: 6568: caller_dispatch: Added region at 0x079A0000 to tracked regions list (ntdll::LdrGetProcedureAddressForCaller returns to 0x079A16D3, thread 4392).
2025-12-09 07:39:01,137 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x079A0000 skipped
2025-12-09 07:39:01,152 [root] DEBUG: 6568: DLL loaded at 0x739B0000: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.22621.2506_none_9fa484a5e29783d4\gdiplus (0x16d000 bytes).
2025-12-09 07:39:01,168 [root] DEBUG: 6568: DLL loaded at 0x73780000: C:\Windows\SYSTEM32\DWrite (0x224000 bytes).
2025-12-09 07:39:01,184 [root] DEBUG: 6568: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:39:01,184 [root] DEBUG: 6568: DLL loaded at 0x77920000: C:\Windows\System32\MSCTF (0xfc000 bytes).
2025-12-09 07:39:01,653 [root] DEBUG: 6568: .NET JIT native cache at 0x078E0000: scans and dumps active.
2025-12-09 07:39:01,653 [root] DEBUG: 6568: caller_dispatch: Added region at 0x078E0000 to tracked regions list (ntdll::LdrGetProcedureAddressForCaller returns to 0x078E0737, thread 4392).
2025-12-09 07:39:01,653 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x078E0000 skipped
2025-12-09 07:39:01,668 [root] DEBUG: 6568: DLL loaded at 0x736E0000: C:\Windows\SYSTEM32\TextShaping (0x95000 bytes).
2025-12-09 07:39:01,684 [root] DEBUG: 6568: AllocationHandler: Allocation already in tracked region list: 0x03D40000.
2025-12-09 07:39:01,684 [root] DEBUG: 6568: hook_api: Warning - ScriptIsComplex export address 0x73641794 differs from GetProcAddress -> 0x76DF0E50 (gdi32full.dll::0x90e50)
2025-12-09 07:39:01,684 [root] DEBUG: 6568: DLL loaded at 0x73640000: C:\Windows\SYSTEM32\USP10 (0x17000 bytes).
2025-12-09 07:39:01,684 [root] DEBUG: 6568: DLL loaded at 0x73610000: C:\Windows\SYSTEM32\msls31 (0x2c000 bytes).
2025-12-09 07:39:01,684 [root] DEBUG: 6568: DLL loaded at 0x73660000: C:\Windows\SYSTEM32\RichEd20 (0x7d000 bytes).
2025-12-09 07:39:01,731 [root] DEBUG: 6568: .NET JIT native cache at 0x07910000: scans and dumps active.
2025-12-09 07:39:01,731 [root] DEBUG: 6568: caller_dispatch: Added region at 0x07910000 to tracked regions list (ntdll::NtAllocateVirtualMemory returns to 0x0791137E, thread 4392).
2025-12-09 07:39:01,731 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x07910000 skipped
2025-12-09 07:39:01,762 [root] DEBUG: 6568: DLL loaded at 0x734B0000: C:\Windows\SYSTEM32\WindowsCodecs (0x160000 bytes).
2025-12-09 07:39:01,778 [root] DEBUG: 6568: .NET JIT native cache at 0x07940000: scans and dumps active.
2025-12-09 07:39:01,778 [root] DEBUG: 6568: caller_dispatch: Added region at 0x07940000 to tracked regions list (kernel32::SetErrorMode returns to 0x0794146D, thread 4392).
2025-12-09 07:39:01,793 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x07940000 skipped
2025-12-09 07:39:01,824 [root] DEBUG: 6568: .NET JIT native cache at 0x07950000: scans and dumps active.
2025-12-09 07:39:01,840 [root] DEBUG: 6568: caller_dispatch: Added region at 0x07950000 to tracked regions list (ntdll::LdrGetProcedureAddressForCaller returns to 0x079509F0, thread 4392).
2025-12-09 07:39:01,840 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x07950000 skipped
2025-12-09 07:39:01,840 [root] DEBUG: 6568: DLL loaded at 0x6F7E0000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.22621.2506_none_6eb991c088050a06\comctl32 (0x228000 bytes).
2025-12-09 07:39:01,918 [root] DEBUG: 6568: api-rate-cap: NtClose hook disabled due to rate
2025-12-09 07:39:01,918 [root] DEBUG: 6568: api-rate-cap: NtClose hook disabled due to rate
2025-12-09 07:39:01,918 [root] DEBUG: 6568: caller_dispatch: Added region at 0x09D50000 to tracked regions list (advapi32::CryptAcquireContextA returns to 0x09D51339, thread 4392).
2025-12-09 07:39:01,918 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x09D50000 skipped
2025-12-09 07:39:01,949 [root] DEBUG: 6568: DLL loaded at 0x73460000: C:\Windows\SYSTEM32\wldp (0x44000 bytes).
2025-12-09 07:39:01,949 [root] DEBUG: 6568: DLL loaded at 0x73440000: C:\Windows\SYSTEM32\amsi (0x15000 bytes).
2025-12-09 07:39:01,949 [root] DEBUG: 6568: DLL loaded at 0x6F7B0000: C:\Windows\SYSTEM32\USERENV (0x24000 bytes).
2025-12-09 07:39:01,965 [root] DEBUG: 6568: DLL loaded at 0x6F740000: C:\Program Files (x86)\Windows Defender\MpOav (0x6b000 bytes).
2025-12-09 07:39:01,965 [root] DEBUG: 6568: AmsiDumper: Dumping AMSI buffer at 0x053C481C, size 0x4200
2025-12-09 07:39:01,965 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_248998951390103122025 to CAPE\79823e47436e129def4fba8ee225347a05b7bb27477fb1cc8be6dc9e9ce75696; Size is 16896; Max size: 100000000
2025-12-09 07:39:01,965 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_248998951390103122025 (size 16896 bytes)
2025-12-09 07:39:01,981 [root] DEBUG: 6568: DLL loaded at 0x76460000: C:\Windows\System32\WINTRUST (0x58000 bytes).
2025-12-09 07:39:01,981 [root] DEBUG: 6568: DLL loaded at 0x6F650000: C:\Program Files (x86)\Windows Defender\MPCLIENT (0xe1000 bytes).
2025-12-09 07:39:01,981 [root] DEBUG: 6568: DLL loaded at 0x73430000: C:\Windows\System32\MSASN1 (0xe000 bytes).
2025-12-09 07:39:01,996 [root] DEBUG: 6568: DLL loaded at 0x6F620000: C:\Windows\SYSTEM32\gpapi (0x21000 bytes).
2025-12-09 07:39:27,591 [root] DEBUG: 6568: AmsiDumper: Dumping AMSI buffer at 0x05F10DF0, size 0x7cc00
2025-12-09 07:39:27,591 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_491889327390103122025 to CAPE\dafee86178755f8e1d8d360e07c9e0d756d614ccb7b9dd3c559979a27cf47e75; Size is 510976; Max size: 100000000
2025-12-09 07:39:27,591 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_491889327390103122025 (size 510976 bytes)
2025-12-09 07:39:27,607 [root] DEBUG: 6568: .NET JIT native cache at 0x09E80000: scans and dumps active.
2025-12-09 07:39:27,607 [root] DEBUG: 6568: caller_dispatch: Added region at 0x09E80000 to tracked regions list (ntdll::NtAllocateVirtualMemory returns to 0x09E808C6, thread 4392).
2025-12-09 07:39:27,607 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x09E80000 skipped
2025-12-09 07:39:27,638 [root] DEBUG: 6568: AmsiDumper: Dumping AMSI buffer at 0x05FD81D0, size 0x37e00
2025-12-09 07:39:27,638 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_1465549827390103122025 to CAPE\4fae2d624819e95667c479b054412ee5b1553f384dd23aecd907f0205efc0552; Size is 228864; Max size: 100000000
2025-12-09 07:39:27,638 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_1465549827390103122025 (size 228864 bytes)
2025-12-09 07:39:37,701 [root] DEBUG: 6568: DLL loaded at 0x76E50000: C:\Windows\System32\clbcatq (0x82000 bytes).
2025-12-09 07:39:37,701 [root] DEBUG: 6568: DLL loaded at 0x6F5E0000: C:\Windows\SYSTEM32\CFGMGR32 (0x3d000 bytes).
2025-12-09 07:39:37,716 [root] DEBUG: 6568: DLL loaded at 0x71470000: C:\Windows\SYSTEM32\edputil (0x1f000 bytes).
2025-12-09 07:39:37,716 [root] DEBUG: 6568: DLL loaded at 0x6F580000: C:\Windows\System32\Windows.StateRepositoryPS (0x5f000 bytes).
2025-12-09 07:39:37,732 [root] DEBUG: 6568: DLL loaded at 0x6F560000: C:\Windows\System32\smartscreenps (0x13000 bytes).
2025-12-09 07:39:37,732 [root] DEBUG: 6568: DLL loaded at 0x6F4F0000: C:\Windows\SYSTEM32\shdocvw (0x6f000 bytes).
2025-12-09 07:39:37,747 [root] DEBUG: 6568: DLL loaded at 0x6F470000: C:\Windows\System32\appresolver (0x80000 bytes).
2025-12-09 07:39:37,747 [root] DEBUG: 6568: DLL loaded at 0x6F420000: C:\Windows\System32\Bcp47Langs (0x49000 bytes).
2025-12-09 07:39:37,763 [root] DEBUG: 6568: DLL loaded at 0x6F1A0000: C:\Windows\System32\OneCoreUAPCommonProxyStub (0x27d000 bytes).
2025-12-09 07:39:37,763 [lib.api.process] INFO: Monitor config for <Process 848 svchost.exe>: C:\tmpuce0d7me\dll\848.ini
2025-12-09 07:39:37,763 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpuce0d7me\dll\uusrbr.dll, loader C:\tmpuce0d7me\bin\MSGZtlUS.exe
2025-12-09 07:39:37,763 [root] DEBUG: Loader: Injecting process 848 with C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:39:37,778 [root] DEBUG: 848: Python path set to 'C:\Python38'.
2025-12-09 07:39:37,778 [root] INFO: Disabling sleep skipping.
2025-12-09 07:39:37,778 [root] DEBUG: 848: Dropped file limit defaulting to 100.
2025-12-09 07:39:37,778 [root] DEBUG: 848: Services hook set enabled
2025-12-09 07:39:37,778 [root] DEBUG: 848: YaraInit: Compiled rules loaded from existing file C:\tmpuce0d7me\data\yara\capemon.yac
2025-12-09 07:39:37,778 [root] DEBUG: 848: GetAddressByYara: ModuleBase 0x00007FF8E5730000 FunctionName RtlInsertInvertedFunctionTable
2025-12-09 07:39:37,778 [root] DEBUG: 848: RtlInsertInvertedFunctionTable 0x00007FF8E575BBFA, LdrpInvertedFunctionTableSRWLock 0x00007FF8E58B70F0
2025-12-09 07:39:37,778 [root] DEBUG: 848: AmsiDumper initialised.
2025-12-09 07:39:37,778 [root] DEBUG: 848: Monitor initialised: 64-bit capemon loaded in process 848 at 0x00007FF8B7F50000, thread 5312, image base 0x00007FF74CCC0000, stack from 0x00000059B1AF5000-0x00000059B1B00000
2025-12-09 07:39:37,778 [root] DEBUG: 848: Commandline: C:\Windows\system32\svchost.exe -k DcomLaunch -p
2025-12-09 07:39:37,794 [root] DEBUG: 848: hook_api: Warning - CoCreateInstance export address 0x00007FF8E4157EF9 differs from GetProcAddress -> 0x00007FF8E4CA2050 (combase.dll::0x42050)
2025-12-09 07:39:37,794 [root] DEBUG: 848: hook_api: Warning - CoCreateInstanceEx export address 0x00007FF8E4157F38 differs from GetProcAddress -> 0x00007FF8E4C7CC40 (combase.dll::0x1cc40)
2025-12-09 07:39:37,794 [root] DEBUG: 848: hook_api: Warning - CoGetClassObject export address 0x00007FF8E41584C8 differs from GetProcAddress -> 0x00007FF8E4D29870 (combase.dll::0xc9870)
2025-12-09 07:39:37,794 [root] DEBUG: 848: Hooked 69 out of 69 functions
2025-12-09 07:39:37,794 [root] INFO: Loaded monitor into process with pid 848
2025-12-09 07:39:37,794 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-09 07:39:37,794 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:39:37,794 [lib.api.process] INFO: Injected into 64-bit <Process 848 svchost.exe>
2025-12-09 07:39:39,811 [root] DEBUG: 6568: CreateProcessHandler: Injection info set for new process 4360: C:\Windows\System32\schtasks.exe, ImageBase: 0x00B00000
2025-12-09 07:39:39,811 [root] INFO: Announced 32-bit process name: schtasks.exe pid: 4360
2025-12-09 07:39:39,811 [lib.api.process] INFO: Monitor config for <Process 4360 schtasks.exe>: C:\tmpuce0d7me\dll\4360.ini
2025-12-09 07:39:39,811 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:39:39,811 [root] DEBUG: Loader: Injecting process 4360 (thread 2788) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:39,811 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:39:39,811 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:39,811 [lib.api.process] INFO: Injected into 32-bit <Process 4360 schtasks.exe>
2025-12-09 07:39:39,857 [root] DEBUG: 4360: Python path set to 'C:\Python38'.
2025-12-09 07:39:39,857 [root] DEBUG: 4360: Dropped file limit defaulting to 100.
2025-12-09 07:39:39,857 [root] INFO: Disabling sleep skipping.
2025-12-09 07:39:39,857 [root] DEBUG: 4360: YaraInit: Compiled rules loaded from existing file C:\tmpuce0d7me\data\yara\capemon.yac
2025-12-09 07:39:39,857 [root] DEBUG: 4360: YaraScan: Scanning 0x00B00000, size 0x35bc8
2025-12-09 07:39:39,857 [root] DEBUG: 4360: AmsiDumper initialised.
2025-12-09 07:39:39,857 [root] DEBUG: 4360: Monitor initialised: 32-bit capemon loaded in process 4360 at 0x74fc0000, thread 2788, image base 0xb00000, stack from 0x906000-0x910000
2025-12-09 07:39:39,857 [root] DEBUG: 4360: Commandline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WFinHcUy" /XML "C:\Users\user\AppData\Local\Temp\tmpDA7F.tmp"
2025-12-09 07:39:39,857 [root] DEBUG: 4360: GetAddressByYara: ModuleBase 0x77AF0000 FunctionName LdrpCallInitRoutine
2025-12-09 07:39:39,873 [root] DEBUG: 4360: hook_api: LdrpCallInitRoutine export address 0x77B666A0 obtained via GetFunctionAddress
2025-12-09 07:39:39,873 [root] DEBUG: 4360: hook_api: Warning - CreateRemoteThreadEx export address 0x75FC9A4C differs from GetProcAddress -> 0x76FFDDB0 (KERNELBASE.dll::0x11ddb0)
2025-12-09 07:39:39,873 [root] DEBUG: 4360: hook_api: Warning - CoCreateInstance export address 0x77890FEB differs from GetProcAddress -> 0x7724FF70 (combase.dll::0xdff70)
2025-12-09 07:39:39,873 [root] DEBUG: 4360: hook_api: Warning - CoCreateInstanceEx export address 0x7789102A differs from GetProcAddress -> 0x7729CCF0 (combase.dll::0x12ccf0)
2025-12-09 07:39:39,873 [root] DEBUG: 4360: hook_api: Warning - CoGetClassObject export address 0x778915BA differs from GetProcAddress -> 0x77212BD0 (combase.dll::0xa2bd0)
2025-12-09 07:39:39,873 [root] DEBUG: 4360: hook_api: Warning - UpdateProcThreadAttribute export address 0x75FD18BA differs from GetProcAddress -> 0x7702BD10 (KERNELBASE.dll::0x14bd10)
2025-12-09 07:39:39,873 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-09 07:39:39,873 [root] DEBUG: 4360: set_hooks: Unable to hook GetCommandLineA
2025-12-09 07:39:39,873 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-09 07:39:39,873 [root] DEBUG: 4360: set_hooks: Unable to hook GetCommandLineW
2025-12-09 07:39:39,873 [root] DEBUG: 4360: hook_api: Warning - CLSIDFromProgID export address 0x77890824 differs from GetProcAddress -> 0x771E54C0 (combase.dll::0x754c0)
2025-12-09 07:39:39,873 [root] DEBUG: 4360: hook_api: Warning - CLSIDFromProgIDEx export address 0x77890861 differs from GetProcAddress -> 0x771DFF40 (combase.dll::0x6ff40)
2025-12-09 07:39:39,873 [root] DEBUG: 4360: Hooked 611 out of 613 functions
2025-12-09 07:39:39,873 [root] DEBUG: 4360: Syscall hook installed, syscall logging level 1
2025-12-09 07:39:39,873 [root] DEBUG: 4360: WoW64fix: Windows version 10.0 not supported.
2025-12-09 07:39:39,889 [root] INFO: Loaded monitor into process with pid 4360
2025-12-09 07:39:39,889 [root] DEBUG: 4360: caller_dispatch: Added region at 0x00B00000 to tracked regions list (ntdll::memcpy returns to 0x00B2144A, thread 2788).
2025-12-09 07:39:39,889 [root] DEBUG: 4360: YaraScan: Scanning 0x00B00000, size 0x35bc8
2025-12-09 07:39:39,889 [root] DEBUG: 4360: ProcessImageBase: Main module image at 0x00B00000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:39:39,889 [root] DEBUG: 4360: set_hooks_by_export_directory: Hooked 0 out of 613 functions
2025-12-09 07:39:39,889 [root] DEBUG: 4360: DLL loaded at 0x755C0000: C:\Windows\SYSTEM32\kernel.appcore (0x13000 bytes).
2025-12-09 07:39:39,889 [root] DEBUG: 4360: DLL loaded at 0x77560000: C:\Windows\System32\bcryptPrimitives (0x62000 bytes).
2025-12-09 07:39:39,889 [root] DEBUG: 4360: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:39:39,889 [root] INFO: Stopping Task Scheduler Service
2025-12-09 07:39:39,920 [root] INFO: Stopped Task Scheduler Service
2025-12-09 07:39:39,951 [root] INFO: Starting Task Scheduler Service
2025-12-09 07:39:39,967 [root] INFO: Started Task Scheduler Service
2025-12-09 07:39:39,967 [lib.api.process] INFO: Monitor config for <Process 1260 svchost.exe>: C:\tmpuce0d7me\dll\1260.ini
2025-12-09 07:39:39,967 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpuce0d7me\dll\uusrbr.dll, loader C:\tmpuce0d7me\bin\MSGZtlUS.exe
2025-12-09 07:39:39,983 [root] DEBUG: Loader: Injecting process 1260 with C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:39:39,983 [root] DEBUG: 1260: Python path set to 'C:\Python38'.
2025-12-09 07:39:39,983 [root] INFO: Disabling sleep skipping.
2025-12-09 07:39:39,983 [root] DEBUG: 1260: Dropped file limit defaulting to 100.
2025-12-09 07:39:39,983 [root] DEBUG: 1260: Services hook set enabled
2025-12-09 07:39:39,983 [root] DEBUG: 1260: YaraInit: Compiled rules loaded from existing file C:\tmpuce0d7me\data\yara\capemon.yac
2025-12-09 07:39:39,983 [root] DEBUG: 1260: GetAddressByYara: ModuleBase 0x00007FF8E5730000 FunctionName RtlInsertInvertedFunctionTable
2025-12-09 07:39:39,998 [root] DEBUG: 1260: RtlInsertInvertedFunctionTable 0x00007FF8E575BBFA, LdrpInvertedFunctionTableSRWLock 0x00007FF8E58B70F0
2025-12-09 07:39:39,998 [root] DEBUG: 1260: AmsiDumper initialised.
2025-12-09 07:39:39,998 [root] DEBUG: 1260: Monitor initialised: 64-bit capemon loaded in process 1260 at 0x00007FF8B7F50000, thread 3964, image base 0x00007FF74CCC0000, stack from 0x000000222E876000-0x000000222E880000
2025-12-09 07:39:39,998 [root] DEBUG: 1260: Commandline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
2025-12-09 07:39:39,998 [root] DEBUG: 1260: hook_api: Warning - CoCreateInstance export address 0x00007FF8E4157EF9 differs from GetProcAddress -> 0x00007FF8E4CA2050 (combase.dll::0x42050)
2025-12-09 07:39:39,998 [root] DEBUG: 1260: hook_api: Warning - CoCreateInstanceEx export address 0x00007FF8E4157F38 differs from GetProcAddress -> 0x00007FF8E4C7CC40 (combase.dll::0x1cc40)
2025-12-09 07:39:39,998 [root] DEBUG: 1260: hook_api: Warning - CoGetClassObject export address 0x00007FF8E41584C8 differs from GetProcAddress -> 0x00007FF8E4D29870 (combase.dll::0xc9870)
2025-12-09 07:39:39,998 [root] DEBUG: 1260: Hooked 69 out of 69 functions
2025-12-09 07:39:39,998 [root] INFO: Loaded monitor into process with pid 1260
2025-12-09 07:39:39,998 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-09 07:39:39,998 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:39:39,998 [lib.api.process] INFO: Injected into 64-bit <Process 1260 svchost.exe>
2025-12-09 07:39:42,029 [root] DEBUG: 4360: DLL loaded at 0x76E50000: C:\Windows\System32\clbcatq (0x82000 bytes).
2025-12-09 07:39:42,029 [root] DEBUG: 4360: DLL loaded at 0x6F110000: C:\Windows\System32\taskschd (0x82000 bytes).
2025-12-09 07:39:42,045 [root] DEBUG: 4360: NtTerminateProcess hook: Attempting to dump process 4360
2025-12-09 07:39:42,045 [root] DEBUG: 4360: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:39:42,045 [root] INFO: Process with pid 4360 has terminated
2025-12-09 07:39:42,045 [lib.common.results] INFO: Uploading file C:\Users\user\AppData\Local\Temp\tmpDA7F.tmp to files\de02668b6ba24cc86efcf585ab1085b3350a5ef37dcb03a37c857bedd02a3854; Size is 1637; Max size: 100000000
2025-12-09 07:39:42,045 [root] DEBUG: 6568: CreateProcessHandler: Injection info set for new process 6320: C:\Users\user\AppData\Local\Temp\BL 216238068 DOCS.exe, ImageBase: 0x00DB0000
2025-12-09 07:39:42,045 [root] INFO: Announced 32-bit process name: BL 216238068 DOCS.exe pid: 6320
2025-12-09 07:39:42,061 [lib.api.process] INFO: Monitor config for <Process 6320 BL 216238068 DOCS.exe>: C:\tmpuce0d7me\dll\6320.ini
2025-12-09 07:39:42,061 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:39:42,061 [root] DEBUG: Loader: Injecting process 6320 (thread 2132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,061 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2025-12-09 07:39:42,076 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2025-12-09 07:39:42,076 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,076 [lib.api.process] INFO: Injected into 32-bit <Process 6320 BL 216238068 DOCS.exe>
2025-12-09 07:39:42,076 [root] DEBUG: 6568: WriteMemoryHandler: Executable binary injected into process 6320 (ImageBase 0x400000)
2025-12-09 07:39:42,076 [root] DEBUG: 6568: DumpImageInCurrentProcess: Attempting to dump 'raw' PE image (process 6568)
2025-12-09 07:39:42,076 [root] DEBUG: 6568: DumpPE: Instantiating PeParser with address: 0x05FF9E70.
2025-12-09 07:39:42,092 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_66044042390103122025 to CAPE\b91307eeae6495cc3202fb1ec39e3f58534be4b1a60795d0b31fd52c76f040d4; Size is 221696; Max size: 100000000
2025-12-09 07:39:42,092 [root] DEBUG: 6568: DumpPE: PE file at 0x05FF9E70 dumped successfully - dump size 0x36200.
2025-12-09 07:39:42,092 [root] DEBUG: 6568: WriteMemoryHandler: Dumped PE image from buffer at 0x5ff9e70, SizeOfImage 0x3c000.
2025-12-09 07:39:42,092 [root] INFO: Announced 32-bit process name: BL 216238068 DOCS.exe pid: 6320
2025-12-09 07:39:42,108 [lib.api.process] INFO: Monitor config for <Process 6320 BL 216238068 DOCS.exe>: C:\tmpuce0d7me\dll\6320.ini
2025-12-09 07:39:42,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:39:42,108 [root] DEBUG: Loader: Injecting process 6320 (thread 2132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,108 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2025-12-09 07:39:42,108 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2025-12-09 07:39:42,108 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,108 [lib.api.process] INFO: Injected into 32-bit <Process 6320 BL 216238068 DOCS.exe>
2025-12-09 07:39:42,108 [root] DEBUG: 6568: WriteMemoryHandler: shellcode at 0x060EF6B0 (size 0x35800) injected into process 6320.
2025-12-09 07:39:42,123 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_331063242390103122025 to CAPE\32cf2c0a9fe2ccdeb8ae0dde5568ee98bf99d04d2dd24d89d86cc7d8a397508a; Size is 219043; Max size: 100000000
2025-12-09 07:39:42,139 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_331063242390103122025 (size 219043 bytes)
2025-12-09 07:39:42,139 [root] DEBUG: 6568: WriteMemoryHandler: Dumped injected code/data from buffer.
2025-12-09 07:39:42,139 [root] INFO: Announced 32-bit process name: BL 216238068 DOCS.exe pid: 6320
2025-12-09 07:39:42,186 [lib.api.process] INFO: Monitor config for <Process 6320 BL 216238068 DOCS.exe>: C:\tmpuce0d7me\dll\6320.ini
2025-12-09 07:39:42,186 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:39:42,186 [root] DEBUG: Loader: Injecting process 6320 (thread 2132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,186 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2025-12-09 07:39:42,186 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2025-12-09 07:39:42,186 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,186 [lib.api.process] INFO: Injected into 32-bit <Process 6320 BL 216238068 DOCS.exe>
2025-12-09 07:39:42,186 [root] DEBUG: 6568: WriteMemoryHandler: shellcode at 0x050F77A4 (size 0x600) injected into process 6320.
2025-12-09 07:39:42,186 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_370995642390103122025 to CAPE\79b5e149f01cb3e0a1957f756a1b11167e8478bdb5358110c5661fe53f9519ed; Size is 1354; Max size: 100000000
2025-12-09 07:39:42,201 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_370995642390103122025 (size 1354 bytes)
2025-12-09 07:39:42,201 [root] DEBUG: 6568: WriteMemoryHandler: Dumped injected code/data from buffer.
2025-12-09 07:39:42,201 [root] INFO: Announced 32-bit process name: BL 216238068 DOCS.exe pid: 6320
2025-12-09 07:39:42,201 [lib.api.process] INFO: Monitor config for <Process 6320 BL 216238068 DOCS.exe>: C:\tmpuce0d7me\dll\6320.ini
2025-12-09 07:39:42,201 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:39:42,217 [root] DEBUG: Loader: Injecting process 6320 (thread 2132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,217 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2025-12-09 07:39:42,217 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2025-12-09 07:39:42,217 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,217 [lib.api.process] INFO: Injected into 32-bit <Process 6320 BL 216238068 DOCS.exe>
2025-12-09 07:39:42,217 [root] DEBUG: 6568: WriteMemoryHandler: shellcode at 0x050F7DB0 (size 0x200) injected into process 6320.
2025-12-09 07:39:42,232 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_149990442390103122025 to CAPE\091545e6a05c1ebb529baafe2a5e312b4702fde4e138e8c96c264d2b21a030c1; Size is 10; Max size: 100000000
2025-12-09 07:39:42,248 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_149990442390103122025 (size 10 bytes)
2025-12-09 07:39:42,248 [root] DEBUG: 6568: WriteMemoryHandler: Dumped injected code/data from buffer.
2025-12-09 07:39:42,248 [root] INFO: Announced 32-bit process name: BL 216238068 DOCS.exe pid: 6320
2025-12-09 07:39:42,248 [lib.api.process] INFO: Monitor config for <Process 6320 BL 216238068 DOCS.exe>: C:\tmpuce0d7me\dll\6320.ini
2025-12-09 07:39:42,248 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:39:42,248 [root] DEBUG: Loader: Injecting process 6320 (thread 2132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,248 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2025-12-09 07:39:42,248 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2025-12-09 07:39:42,248 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,248 [lib.api.process] INFO: Injected into 32-bit <Process 6320 BL 216238068 DOCS.exe>
2025-12-09 07:39:42,248 [root] INFO: Announced 32-bit process name: BL 216238068 DOCS.exe pid: 6320
2025-12-09 07:39:42,248 [lib.api.process] INFO: Monitor config for <Process 6320 BL 216238068 DOCS.exe>: C:\tmpuce0d7me\dll\6320.ini
2025-12-09 07:39:42,248 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:39:42,264 [root] DEBUG: Loader: Injecting process 6320 (thread 2132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,264 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2025-12-09 07:39:42,264 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2025-12-09 07:39:42,264 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,264 [lib.api.process] INFO: Injected into 32-bit <Process 6320 BL 216238068 DOCS.exe>
2025-12-09 07:39:42,264 [root] DEBUG: 6568: SetThreadContextHandler: Hollow process entry point reset via NtSetContextThread to 0x0003779E (process 6320).
2025-12-09 07:39:42,264 [root] INFO: Announced 32-bit process name: BL 216238068 DOCS.exe pid: 6320
2025-12-09 07:39:42,264 [lib.api.process] INFO: Monitor config for <Process 6320 BL 216238068 DOCS.exe>: C:\tmpuce0d7me\dll\6320.ini
2025-12-09 07:39:42,264 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:39:42,279 [root] DEBUG: Loader: Injecting process 6320 (thread 2132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,279 [root] DEBUG: InjectDllViaIAT: Executable is .NET, injecting via queued APC.
2025-12-09 07:39:42,279 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2025-12-09 07:39:42,279 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:39:42,279 [lib.api.process] INFO: Injected into 32-bit <Process 6320 BL 216238068 DOCS.exe>
2025-12-09 07:39:42,295 [root] DEBUG: 6568: .NET JIT native cache at 0x09900000: scans and dumps active.
2025-12-09 07:39:42,295 [root] DEBUG: 6320: Python path set to 'C:\Python38'.
2025-12-09 07:39:42,295 [root] DEBUG: 6568: caller_dispatch: Added region at 0x09900000 to tracked regions list (ntdll::LdrGetProcedureAddressForCaller returns to 0x09900D10, thread 1324).
2025-12-09 07:39:42,295 [root] DEBUG: 6320: Dropped file limit defaulting to 100.
2025-12-09 07:39:42,295 [root] DEBUG: 6568: ProcessTrackedRegion: .NET cache region at 0x09900000 skipped
2025-12-09 07:39:42,311 [root] INFO: Disabling sleep skipping.
2025-12-09 07:39:42,311 [root] INFO: Added new file to list with pid None and path C:\Users\user\AppData\Roaming\WFinHcUy.exe
2025-12-09 07:39:42,311 [root] DEBUG: 6320: YaraInit: Compiled rules loaded from existing file C:\tmpuce0d7me\data\yara\capemon.yac
2025-12-09 07:39:42,311 [root] DEBUG: 6568: NtTerminateProcess hook: Attempting to dump process 6568
2025-12-09 07:39:42,311 [root] DEBUG: 6320: YaraScan: Scanning 0x00400000, size 0x3a00a
2025-12-09 07:39:42,311 [root] DEBUG: 6568: VerifyCodeSection: Executable code does not match, 0x0 of 0x14c00 matching
2025-12-09 07:39:42,311 [root] DEBUG: 6320: CAPE_init: Main executable image temporarily remapped for scanning at 0x04AE0000
2025-12-09 07:39:42,311 [root] DEBUG: 6568: DoProcessDump: Code modification detected, dumping Imagebase at 0x001B0000.
2025-12-09 07:39:42,311 [root] DEBUG: 6568: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2025-12-09 07:39:42,311 [root] DEBUG: 6320: YaraScan: Scanning 0x04AE0000, size 0x3bfff
2025-12-09 07:39:42,311 [root] DEBUG: 6568: DumpProcess: Instantiating PeParser with address: 0x001B0000.
2025-12-09 07:39:42,311 [root] DEBUG: 6320: AmsiDumper initialised.
2025-12-09 07:39:42,311 [root] DEBUG: 6568: DumpProcess: Module entry point VA is 0x000C600A.
2025-12-09 07:39:42,311 [root] DEBUG: 6320: Monitor initialised: 32-bit capemon loaded in process 6320 at 0x74fc0000, thread 2132, image base 0x400000, stack from 0x12f6000-0x1300000
2025-12-09 07:39:42,311 [root] DEBUG: 6568: PeParser: readPeSectionsFromProcess: readSectionFromProcess failed address 0x001B2000, section 1
2025-12-09 07:39:42,311 [root] DEBUG: 6320: Commandline: "{path}"
2025-12-09 07:39:42,327 [root] DEBUG: 6568: PeParser: readPeSectionsFromProcess: readSectionFromProcess failed address 0x001C8000, section 2
2025-12-09 07:39:42,327 [root] DEBUG: 6320: GetAddressByYara: ModuleBase 0x77AF0000 FunctionName LdrpCallInitRoutine
2025-12-09 07:39:42,327 [root] DEBUG: 6568: PeParser: readPeSectionsFromProcess: readSectionFromProcess failed address 0x00274000, section 4
2025-12-09 07:39:42,327 [root] DEBUG: 6320: hook_api: LdrpCallInitRoutine export address 0x77B666A0 obtained via GetFunctionAddress
2025-12-09 07:39:42,327 [root] DEBUG: 6320: hook_api: Warning - CreateRemoteThreadEx export address 0x75FC9A4C differs from GetProcAddress -> 0x76FFDDB0 (KERNELBASE.dll::0x11ddb0)
2025-12-09 07:39:42,327 [root] DEBUG: 6320: hook_api: Warning - CoCreateInstance export address 0x77890FEB differs from GetProcAddress -> 0x7724FF70 (combase.dll::0xdff70)
2025-12-09 07:39:42,327 [root] DEBUG: 6320: hook_api: Warning - CoCreateInstanceEx export address 0x7789102A differs from GetProcAddress -> 0x7729CCF0 (combase.dll::0x12ccf0)
2025-12-09 07:39:42,327 [root] DEBUG: 6320: hook_api: Warning - CoGetClassObject export address 0x778915BA differs from GetProcAddress -> 0x77212BD0 (combase.dll::0xa2bd0)
2025-12-09 07:39:42,327 [root] DEBUG: 6320: hook_api: Warning - UpdateProcThreadAttribute export address 0x75FD18BA differs from GetProcAddress -> 0x7702BD10 (KERNELBASE.dll::0x14bd10)
2025-12-09 07:39:42,327 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_872272542390103122025 to procdump\df8f0a627883ee8203023607e4ecc930bb806d8be420d887216b3d779adabeed; Size is 6144; Max size: 100000000
2025-12-09 07:39:42,342 [root] DEBUG: 6568: DumpProcess: Module image dump success - dump size 0x1800.
2025-12-09 07:39:42,342 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-09 07:39:42,342 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x04E10000.
2025-12-09 07:39:42,342 [root] DEBUG: 6320: set_hooks: Unable to hook GetCommandLineA
2025-12-09 07:39:42,342 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-09 07:39:42,342 [root] DEBUG: 6320: set_hooks: Unable to hook GetCommandLineW
2025-12-09 07:39:42,342 [root] DEBUG: 6320: hook_api: Warning - CLSIDFromProgID export address 0x77890824 differs from GetProcAddress -> 0x771E54C0 (combase.dll::0x754c0)
2025-12-09 07:39:42,342 [root] DEBUG: 6320: hook_api: Warning - CLSIDFromProgIDEx export address 0x77890861 differs from GetProcAddress -> 0x771DFF40 (combase.dll::0x6ff40)
2025-12-09 07:39:42,342 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_376747242390103122025 to CAPE\b738c63f62b0665335dad1fe0c1e0715a40ce64c36a5c292a82d5cedfc04a9f1; Size is 65483; Max size: 100000000
2025-12-09 07:39:42,342 [root] DEBUG: 6320: Hooked 611 out of 613 functions
2025-12-09 07:39:42,342 [root] DEBUG: 6320: Syscall hook installed, syscall logging level 1
2025-12-09 07:39:42,342 [root] DEBUG: 6320: WoW64fix: Windows version 6.2 not supported.
2025-12-09 07:39:42,342 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_376747242390103122025 (size 65483 bytes)
2025-12-09 07:39:42,342 [root] INFO: Loaded monitor into process with pid 6320
2025-12-09 07:39:42,342 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x07410000.
2025-12-09 07:39:42,342 [root] DEBUG: 6320: caller_dispatch: Added region at 0x00F50000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00F5003A, thread 2132).
2025-12-09 07:39:42,342 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x00F50000 - 0x00F5012C.
2025-12-09 07:39:42,342 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x12c bytes
2025-12-09 07:39:42,342 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_867688242390103122025 to CAPE\9fb211bfda108a6b52f76ddf012a7f2a1e0f04b8b6ebc78232b50e10f51fe0ed; Size is 65502; Max size: 100000000
2025-12-09 07:39:42,357 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_931847442390103122025 to CAPE\a72df58c7eda286016f4d278e3366fd188ecc7602a1c9ccbd922590edfc0a6ec; Size is 300; Max size: 100000000
2025-12-09 07:39:42,357 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_867688242390103122025 (size 65502 bytes)
2025-12-09 07:39:42,357 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x078E0000.
2025-12-09 07:39:42,357 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_931847442390103122025 (size 300 bytes)
2025-12-09 07:39:42,357 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x00F50000, size 4096 bytes.
2025-12-09 07:39:42,357 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_320943042390103122025 to CAPE\a6b78b2a8cad3660b401f372a4b952e51863c7d583f69956f4b3a2c381be325c; Size is 65425; Max size: 100000000
2025-12-09 07:39:42,357 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x00F50000.
2025-12-09 07:39:42,357 [root] DEBUG: 6320: YaraScan: Scanning 0x00F50000, size 0x12c
2025-12-09 07:39:42,357 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_320943042390103122025 (size 65425 bytes)
2025-12-09 07:39:42,357 [root] DEBUG: 6320: caller_dispatch: Added region at 0x00F60000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00F6003A, thread 2132).
2025-12-09 07:39:42,357 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x07910000.
2025-12-09 07:39:42,357 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x00F60000 - 0x00F6012C.
2025-12-09 07:39:42,357 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x12c bytes
2025-12-09 07:39:42,357 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_407372742390103122025 to CAPE\2d9c4de077cfbd2870bb63e89a335b269631d66a12cd2e6516e78895e766d1c8; Size is 65499; Max size: 100000000
2025-12-09 07:39:42,357 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_704539542390103122025 to CAPE\6d5379d91d62ccb43b1377643b3040ce6208740adf893205ed17c436395f4440; Size is 300; Max size: 100000000
2025-12-09 07:39:42,357 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_407372742390103122025 (size 65499 bytes)
2025-12-09 07:39:42,357 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_704539542390103122025 (size 300 bytes)
2025-12-09 07:39:42,357 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x07940000.
2025-12-09 07:39:42,357 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x00F60000, size 4096 bytes.
2025-12-09 07:39:42,373 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x00F60000.
2025-12-09 07:39:42,373 [root] DEBUG: 6320: YaraScan: Scanning 0x00F60000, size 0x12c
2025-12-09 07:39:42,373 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_997565142390103122025 to CAPE\05da8891dca7ed371891f50ebbdaa0551481408b1849d3d65fb7c96d917b3c5f; Size is 65483; Max size: 100000000
2025-12-09 07:39:42,373 [root] DEBUG: 6320: caller_dispatch: Added region at 0x00F70000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00F7003A, thread 2132).
2025-12-09 07:39:42,373 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x00F70000 - 0x00F7012C.
2025-12-09 07:39:42,373 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x12c bytes
2025-12-09 07:39:42,373 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_997565142390103122025 (size 65483 bytes)
2025-12-09 07:39:42,373 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x07950000.
2025-12-09 07:39:42,373 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_1122991142390103122025 to CAPE\0a128b070da7601d15f9e4c66efc4c06ddf042d029d0217c1184ae1d6687a519; Size is 300; Max size: 100000000
2025-12-09 07:39:42,373 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_1122991142390103122025 (size 300 bytes)
2025-12-09 07:39:42,373 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_384600342390103122025 to CAPE\f3269d5525ad2185fa3334b3f3f9b88f6ee110a60c4e855362acc08d11447f70; Size is 65448; Max size: 100000000
2025-12-09 07:39:42,373 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x00F70000, size 4096 bytes.
2025-12-09 07:39:42,373 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x00F70000.
2025-12-09 07:39:42,373 [root] DEBUG: 6320: YaraScan: Scanning 0x00F70000, size 0x12c
2025-12-09 07:39:42,373 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_384600342390103122025 (size 65448 bytes)
2025-12-09 07:39:42,373 [root] DEBUG: 6320: caller_dispatch: Added region at 0x00F80000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00F8003A, thread 2132).
2025-12-09 07:39:42,373 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x079A0000.
2025-12-09 07:39:42,373 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x00F80000 - 0x00F8012C.
2025-12-09 07:39:42,373 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x12c bytes
2025-12-09 07:39:42,373 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_50205842390103122025 to CAPE\92e2153de898e78c7db4d1f8f7106549083eed8ee48b9b9363a32b8fcd71f2d6; Size is 65444; Max size: 100000000
2025-12-09 07:39:42,373 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_287023542390103122025 to CAPE\894615767dfb4be4309f4220814cb2b1ead2548235f6fbfca2c39a7dd03861a4; Size is 300; Max size: 100000000
2025-12-09 07:39:42,373 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_50205842390103122025 (size 65444 bytes)
2025-12-09 07:39:42,373 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_287023542390103122025 (size 300 bytes)
2025-12-09 07:39:42,373 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x09900000.
2025-12-09 07:39:42,389 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x00F80000, size 4096 bytes.
2025-12-09 07:39:42,389 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x00F80000.
2025-12-09 07:39:42,389 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6568_1159570142390103122025 to CAPE\8b1dbe729e615a4f51a1b08661b54713fa037a1869dea9ce762172d9e74b288c; Size is 11380; Max size: 100000000
2025-12-09 07:39:42,389 [root] DEBUG: 6320: YaraScan: Scanning 0x00F80000, size 0x12c
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6568_1159570142390103122025 (size 11380 bytes)
2025-12-09 07:39:42,389 [root] DEBUG: 6320: caller_dispatch: Added region at 0x00F90000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00F9003A, thread 2132).
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x09D50000.
2025-12-09 07:39:42,389 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x00F90000 - 0x00F9012C.
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpMemory: Dump at 0x09D50000 skipped due to dump limit 10
2025-12-09 07:39:42,389 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x12c bytes
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET image at 0x09DA0000.
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpImageInCurrentProcess: Dump at 0x09DA0000 skipped due to dump limit 10
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET JIT native cache at 0x09E80000.
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpMemory: Dump at 0x09E80000 skipped due to dump limit 10
2025-12-09 07:39:42,389 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_948576542390103122025 to CAPE\0b884ebdf8179a3cacebf7119873f4828ea6ec5f69c0afacb26eb4fd475e73b4; Size is 300; Max size: 100000000
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET image at 0x0A570000.
2025-12-09 07:39:42,389 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_948576542390103122025 (size 300 bytes)
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpImageInCurrentProcess: Dump at 0x0A570000 skipped due to dump limit 10
2025-12-09 07:39:42,389 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x00F90000, size 4096 bytes.
2025-12-09 07:39:42,389 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x00F90000.
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpInterestingRegions: Dumping .NET image at 0x0CB80000.
2025-12-09 07:39:42,389 [root] DEBUG: 6320: YaraScan: Scanning 0x00F90000, size 0x12c
2025-12-09 07:39:42,389 [root] DEBUG: 6568: DumpImageInCurrentProcess: Dump at 0x0CB80000 skipped due to dump limit 10
2025-12-09 07:39:42,404 [root] DEBUG: 6320: caller_dispatch: Added region at 0x00FA0000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00FA003A, thread 2132).
2025-12-09 07:39:42,404 [root] DEBUG: 6568: DumpRegion: Dump at 0x7EF60000 skipped due to dump limit 10
2025-12-09 07:39:42,404 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x00FA0000 - 0x00FA012C.
2025-12-09 07:39:42,404 [root] DEBUG: 6568: ProcessTrackedRegion: Failed to dump region at 0x7EF60000.
2025-12-09 07:39:42,404 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x12c bytes
2025-12-09 07:39:42,404 [root] INFO: Process with pid 6568 has terminated
2025-12-09 07:39:42,404 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_564307242390103122025 to CAPE\c7b4888c4b69dd92ad172cdfbf1b4ed2ee5b714ecf0f627878dd4888fe7d19ae; Size is 300; Max size: 100000000
2025-12-09 07:39:42,420 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_564307242390103122025 (size 300 bytes)
2025-12-09 07:39:42,420 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x00FA0000, size 4096 bytes.
2025-12-09 07:39:42,420 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x00FA0000.
2025-12-09 07:39:42,420 [root] DEBUG: 6320: YaraScan: Scanning 0x00FA0000, size 0x12c
2025-12-09 07:39:42,420 [root] DEBUG: 6320: DLL loaded at 0x74F00000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei (0x88000 bytes).
2025-12-09 07:39:42,420 [root] DEBUG: 6320: set_hooks_by_export_directory: Hooked 0 out of 613 functions
2025-12-09 07:39:42,436 [root] DEBUG: 6320: DLL loaded at 0x755C0000: C:\Windows\SYSTEM32\kernel.appcore (0x13000 bytes).
2025-12-09 07:39:42,436 [root] DEBUG: 6320: DLL loaded at 0x753A0000: C:\Windows\SYSTEM32\VERSION (0x8000 bytes).
2025-12-09 07:39:42,436 [root] DEBUG: 6320: DLL loaded at 0x74E40000: C:\Windows\SYSTEM32\ucrtbase_clr0400 (0xb3000 bytes).
2025-12-09 07:39:42,436 [root] DEBUG: 6320: DLL loaded at 0x753B0000: C:\Windows\SYSTEM32\VCRUNTIME140_CLR0400 (0x15000 bytes).
2025-12-09 07:39:42,436 [root] DEBUG: 6320: DLL loaded at 0x728E0000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\clr (0x7bc000 bytes).
2025-12-09 07:39:42,452 [root] DEBUG: 6320: AllocationHandler: Adding allocation to tracked region list: 0x03263000, size: 0x1000.
2025-12-09 07:39:42,467 [root] DEBUG: 6320: GetEntropy: Error - Supplied address inaccessible: 0x03260000
2025-12-09 07:39:42,467 [root] DEBUG: 6320: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:42,498 [root] DEBUG: 6320: InstrumentationCallback: Added region at 0x76EE0000 to tracked regions list (thread 2132).
2025-12-09 07:39:42,514 [root] DEBUG: 6320: api-rate-cap: NtQueryPerformanceCounter hook disabled due to rate
2025-12-09 07:39:42,514 [root] DEBUG: 6320: DLL loaded at 0x71490000: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\31532774e8bbbd9c59b5e6d7829d3242\mscorlib.ni (0x144c000 bytes).
2025-12-09 07:39:42,514 [root] DEBUG: 6320: DLL loaded at 0x77560000: C:\Windows\System32\bcryptPrimitives (0x62000 bytes).
2025-12-09 07:39:42,514 [root] DEBUG: 6320: DLL loaded at 0x753D0000: C:\Windows\system32\uxtheme (0x7f000 bytes).
2025-12-09 07:39:42,514 [root] DEBUG: 6320: AllocationHandler: Adding allocation to tracked region list: 0x04B60000, size: 0x1000.
2025-12-09 07:39:42,545 [root] DEBUG: 6320: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:42,561 [root] DEBUG: 6320: AllocationHandler: Processing previous tracked region at: 0x03260000.
2025-12-09 07:39:42,561 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x03260000 - 0x03260015.
2025-12-09 07:39:42,561 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x15 bytes
2025-12-09 07:39:42,561 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_854795742391592122025 to CAPE\0f6a01074655ce007cbbee8ff6e8934e3e6266b57c69ce25c9a89b2f70e61f36; Size is 21; Max size: 100000000
2025-12-09 07:39:42,576 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_854795742391592122025 (size 21 bytes)
2025-12-09 07:39:42,576 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x03260000, size 4096 bytes.
2025-12-09 07:39:42,592 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x03260000.
2025-12-09 07:39:42,592 [root] DEBUG: 6320: YaraScan: Scanning 0x03260000, size 0x15
2025-12-09 07:39:42,608 [root] DEBUG: 6320: AllocationHandler: Adding allocation to tracked region list: 0x03295000, size: 0x1000.
2025-12-09 07:39:42,623 [root] DEBUG: 6320: GetEntropy: Error - Supplied address inaccessible: 0x03290000
2025-12-09 07:39:42,623 [root] DEBUG: 6320: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:42,623 [root] DEBUG: 6320: AllocationHandler: Processing previous tracked region at: 0x04B60000.
2025-12-09 07:39:42,623 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x04B60000 - 0x04B60112.
2025-12-09 07:39:42,623 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x112 bytes
2025-12-09 07:39:42,623 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_181542242391592122025 to CAPE\04d196f249f6a31f6e32efddee9d4739fd626f358832767c627bb1f2acedf7be; Size is 274; Max size: 100000000
2025-12-09 07:39:42,639 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_181542242391592122025 (size 274 bytes)
2025-12-09 07:39:42,639 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x04B60000, size 4096 bytes.
2025-12-09 07:39:42,639 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x04B60000.
2025-12-09 07:39:42,654 [root] DEBUG: 6320: YaraScan: Scanning 0x04B60000, size 0x112
2025-12-09 07:39:42,654 [root] DEBUG: 6320: AllocationHandler: Allocation already in tracked region list: 0x03290000.
2025-12-09 07:39:42,654 [root] DEBUG: 6320: AllocationHandler: Allocation already in tracked region list: 0x03290000.
2025-12-09 07:39:42,670 [root] DEBUG: 6320: DLL loaded at 0x75E70000: C:\Windows\System32\OLEAUT32 (0x9c000 bytes).
2025-12-09 07:39:42,670 [root] DEBUG: 6320: hook_api: clrjit::compileMethod export address 0x7463A700 obtained via GetFunctionAddress
2025-12-09 07:39:42,686 [root] DEBUG: 6320: DLL loaded at 0x74620000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\clrjit (0x7e000 bytes).
2025-12-09 07:39:42,701 [root] DEBUG: 6320: DLL loaded at 0x709A0000: C:\Windows\assembly\NativeImages_v4.0.30319_32\System\5380d2b417dae69a597fcfb16c76a7b7\System.ni (0xa1c000 bytes).
2025-12-09 07:39:42,701 [root] DEBUG: 6320: .NET JIT native cache at 0x04B60000: scans and dumps active.
2025-12-09 07:39:42,717 [root] DEBUG: 6320: YaraScan hit: AgentTeslaV3JIT
2025-12-09 07:39:42,717 [root] DEBUG: 6320: Config: bp0 set to 0x0000004E.
2025-12-09 07:39:42,717 [root] DEBUG: 6320: Config: Trace instruction count set to 0x0
2025-12-09 07:39:42,717 [root] DEBUG: 6320: Config: Action0 set to string:eax+8.
2025-12-09 07:39:42,717 [root] DEBUG: 6320: Config: typestring set to AgentTesla Strings
2025-12-09 07:39:42,717 [root] DEBUG: 6320: Config: Debugger log diverted.
2025-12-09 07:39:42,717 [root] DEBUG: 6320: SetInitialBreakpoints: Breakpoint 0 set on address 0x04B61F6E (RVA 0x4e, type 0, hit count 0, thread 2132)
2025-12-09 07:39:42,733 [root] DEBUG: 6320: StringsOutput: Output file C:\EXMiUAlFU\CAPE\6320.txt.
2025-12-09 07:39:42,795 [root] DEBUG: 6320: DLL loaded at 0x70180000: C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\53a9cd078a677c9b2820831d13828801\System.Core.ni (0x818000 bytes).
2025-12-09 07:39:42,795 [root] DEBUG: 6320: DLL loaded at 0x74510000: C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\7ca34fb9f713c597d60f034e09f5da28\System.Configuration.ni (0x105000 bytes).
2025-12-09 07:39:42,811 [root] DEBUG: 6320: DLL loaded at 0x6FA10000: C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\dbbfe4100fa444758f5b90b58d6b6cd2\System.Xml.ni (0x76c000 bytes).
2025-12-09 07:39:42,826 [root] DEBUG: 6320: DLL loaded at 0x765D0000: C:\Windows\System32\shell32 (0x697000 bytes).
2025-12-09 07:39:42,826 [root] DEBUG: 6320: DLL loaded at 0x752D0000: C:\Windows\SYSTEM32\wintypes (0xc7000 bytes).
2025-12-09 07:39:42,826 [root] DEBUG: 6320: DLL loaded at 0x746A0000: C:\Windows\SYSTEM32\windows.storage (0x6ec000 bytes).
2025-12-09 07:39:42,858 [root] DEBUG: 6320: DLL loaded at 0x77700000: C:\Windows\System32\SHCORE (0xc1000 bytes).
2025-12-09 07:39:42,858 [root] DEBUG: 6320: DLL loaded at 0x744F0000: C:\Windows\SYSTEM32\profapi (0x1d000 bytes).
2025-12-09 07:39:42,889 [root] DEBUG: 6320: DLL loaded at 0x74DF0000: C:\Windows\SYSTEM32\CRYPTSP (0x15000 bytes).
2025-12-09 07:39:42,889 [root] DEBUG: 6320: DLL loaded at 0x74DC0000: C:\Windows\system32\rsaenh (0x30000 bytes).
2025-12-09 07:39:42,905 [root] DEBUG: 6320: DLL loaded at 0x77920000: C:\Windows\System32\MSCTF (0xfc000 bytes).
2025-12-09 07:39:49,255 [root] DEBUG: 6320: DLL loaded at 0x75AE0000: C:\Windows\System32\psapi (0x6000 bytes).
2025-12-09 07:39:49,271 [root] DEBUG: 6320: api-rate-cap: NtReadVirtualMemory hook disabled due to rate
2025-12-09 07:39:49,302 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 1544 (handle 0x47c).
2025-12-09 07:39:49,302 [lib.api.process] INFO: Monitor config for <Process 4052 svchost.exe>: C:\tmpuce0d7me\dll\4052.ini
2025-12-09 07:39:49,318 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpuce0d7me\dll\uusrbr.dll, loader C:\tmpuce0d7me\bin\MSGZtlUS.exe
2025-12-09 07:39:49,350 [root] DEBUG: Loader: Injecting process 4052 with C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:39:49,365 [root] DEBUG: 4052: Python path set to 'C:\Python38'.
2025-12-09 07:39:49,365 [root] INFO: Disabling sleep skipping.
2025-12-09 07:39:49,381 [root] DEBUG: 4052: Dropped file limit defaulting to 100.
2025-12-09 07:39:49,381 [root] DEBUG: 4052: Services hook set enabled
2025-12-09 07:39:49,381 [root] DEBUG: 4052: YaraInit: Compiled rules loaded from existing file C:\tmpuce0d7me\data\yara\capemon.yac
2025-12-09 07:39:49,381 [root] DEBUG: 4052: GetAddressByYara: ModuleBase 0x00007FF8E5730000 FunctionName RtlInsertInvertedFunctionTable
2025-12-09 07:39:49,396 [root] DEBUG: 4052: RtlInsertInvertedFunctionTable 0x00007FF8E575BBFA, LdrpInvertedFunctionTableSRWLock 0x00007FF8E58B70F0
2025-12-09 07:39:49,396 [root] DEBUG: 4052: AmsiDumper initialised.
2025-12-09 07:39:49,412 [root] DEBUG: 4052: Monitor initialised: 64-bit capemon loaded in process 4052 at 0x00007FF8B7F50000, thread 6208, image base 0x00007FF74CCC0000, stack from 0x000000ACA7AF5000-0x000000ACA7B00000
2025-12-09 07:39:49,412 [root] DEBUG: 4052: Commandline: C:\Windows\system32\svchost.exe -k netsvcs -p
2025-12-09 07:39:49,427 [root] DEBUG: 4052: hook_api: Warning - CoCreateInstance export address 0x00007FF8E4157EF9 differs from GetProcAddress -> 0x00007FF8E4CA2050 (combase.dll::0x42050)
2025-12-09 07:39:49,427 [root] DEBUG: 4052: hook_api: Warning - CoCreateInstanceEx export address 0x00007FF8E4157F38 differs from GetProcAddress -> 0x00007FF8E4C7CC40 (combase.dll::0x1cc40)
2025-12-09 07:39:49,427 [root] DEBUG: 4052: hook_api: Warning - CoGetClassObject export address 0x00007FF8E41584C8 differs from GetProcAddress -> 0x00007FF8E4D29870 (combase.dll::0xc9870)
2025-12-09 07:39:49,443 [root] DEBUG: 4052: Hooked 69 out of 69 functions
2025-12-09 07:39:49,443 [root] INFO: Loaded monitor into process with pid 4052
2025-12-09 07:39:49,443 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-09 07:39:49,443 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:39:49,490 [lib.api.process] INFO: Injected into 64-bit <Process 4052 svchost.exe>
2025-12-09 07:39:51,507 [root] DEBUG: 6320: DLL loaded at 0x76E50000: C:\Windows\System32\clbcatq (0x82000 bytes).
2025-12-09 07:39:51,523 [root] DEBUG: 6320: DLL loaded at 0x74430000: C:\Windows\SYSTEM32\wbemcomn (0x67000 bytes).
2025-12-09 07:39:51,523 [root] DEBUG: 6320: DLL loaded at 0x744A0000: C:\Windows\system32\wbem\wbemdisp (0x42000 bytes).
2025-12-09 07:39:51,539 [root] DEBUG: 6320: DLL loaded at 0x74E30000: C:\Windows\system32\wbem\wbemprox (0xe000 bytes).
2025-12-09 07:39:51,554 [root] DEBUG: 6320: DLL loaded at 0x74410000: C:\Windows\system32\wbem\wmiutils (0x1e000 bytes).
2025-12-09 07:39:51,601 [root] DEBUG: 6320: DLL loaded at 0x743F0000: C:\Windows\system32\wbem\wbemsvc (0x11000 bytes).
2025-12-09 07:39:51,648 [root] DEBUG: 6320: DLL loaded at 0x74320000: C:\Windows\system32\wbem\fastprox (0xcc000 bytes).
2025-12-09 07:39:51,679 [root] DEBUG: 6320: DLL loaded at 0x74300000: C:\Windows\SYSTEM32\amsi (0x15000 bytes).
2025-12-09 07:39:51,695 [root] DEBUG: 6320: DLL loaded at 0x742D0000: C:\Windows\SYSTEM32\USERENV (0x24000 bytes).
2025-12-09 07:39:51,695 [root] DEBUG: 6320: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:39:51,711 [root] DEBUG: 6320: DLL loaded at 0x74260000: C:\Program Files (x86)\Windows Defender\MpOav (0x6b000 bytes).
2025-12-09 07:39:51,726 [root] DEBUG: 6320: DLL loaded at 0x741D0000: C:\Windows\SYSTEM32\sxs (0x85000 bytes).
2025-12-09 07:39:59,887 [root] DEBUG: 6320: DLL loaded at 0x741B0000: C:\Windows\Microsoft.Net\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers (0x19000 bytes).
2025-12-09 07:39:59,903 [root] DEBUG: 6320: AllocationHandler: Adding allocation to tracked region list: 0x079C0000, size: 0x1000.
2025-12-09 07:39:59,903 [root] DEBUG: 6320: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:39:59,903 [root] DEBUG: 6320: AllocationHandler: Processing previous tracked region at: 0x03290000.
2025-12-09 07:39:59,903 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x03290000 - 0x0329008C.
2025-12-09 07:39:59,903 [root] DEBUG: 6320: ScanForDisguisedPE: Size too small: 0x8c bytes
2025-12-09 07:39:59,918 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_196763759391592122025 to CAPE\aa19c7472565d64c2b4d4e39805370d46b76e60a276952cf6c512ebceaa2eece; Size is 140; Max size: 100000000
2025-12-09 07:39:59,934 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_196763759391592122025 (size 140 bytes)
2025-12-09 07:39:59,934 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x03290000, size 4096 bytes.
2025-12-09 07:39:59,934 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x03290000.
2025-12-09 07:39:59,950 [root] DEBUG: 6320: YaraScan: Scanning 0x03290000, size 0x8c
2025-12-09 07:39:59,950 [root] DEBUG: 6320: AllocationHandler: Allocation already in tracked region list: 0x079C0000.
2025-12-09 07:39:59,950 [root] DEBUG: 6320: AllocationHandler: Adding allocation to tracked region list: 0x0327E000, size: 0x1000.
2025-12-09 07:39:59,950 [root] DEBUG: 6320: AllocationHandler: Processing previous tracked region at: 0x079C0000.
2025-12-09 07:39:59,966 [root] DEBUG: 6320: DumpPEsInRange: Scanning range 0x079C0000 - 0x079C11DC.
2025-12-09 07:39:59,966 [root] DEBUG: 6320: ScanForDisguisedPE: No PE image located in range 0x079C0000-0x079C11DC.
2025-12-09 07:39:59,981 [lib.common.results] INFO: Uploading file C:\EXMiUAlFU\CAPE\6320_600272459391592122025 to CAPE\a077ff34eb7cbcba3610331146e262f5ccd256400fbe94821e0613546d63285a; Size is 4572; Max size: 100000000
2025-12-09 07:39:59,981 [root] DEBUG: 6320: DumpMemory: Payload successfully created: C:\EXMiUAlFU\CAPE\6320_600272459391592122025 (size 4572 bytes)
2025-12-09 07:39:59,981 [root] DEBUG: 6320: DumpRegion: Dumped entire allocation from 0x079C0000, size 8192 bytes.
2025-12-09 07:39:59,981 [root] DEBUG: 6320: ProcessTrackedRegion: Dumped region at 0x079C0000.
2025-12-09 07:39:59,997 [root] DEBUG: 6320: YaraScan: Scanning 0x079C0000, size 0x11dc
2025-12-09 07:39:59,997 [root] DEBUG: 6320: .NET JIT native cache at 0x079D0000: scans and dumps active.
2025-12-09 07:39:59,997 [root] DEBUG: 6320: caller_dispatch: Added region at 0x079D0000 to tracked regions list (ntdll::NtSetInformationThread returns to 0x079D0665, thread 2132).
2025-12-09 07:39:59,997 [root] DEBUG: 6320: ProcessTrackedRegion: .NET cache region at 0x079D0000 skipped
2025-12-09 07:40:00,059 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 4892 (handle 0x540).
2025-12-09 07:40:00,059 [root] DEBUG: 6320: AllocationHandler: Adding allocation to tracked region list: 0x7EE60000, size: 0x50000.
2025-12-09 07:40:00,075 [root] DEBUG: 6320: GetEntropy: Error - Supplied address inaccessible: 0x7EE60000
2025-12-09 07:40:00,090 [root] DEBUG: 6320: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:40:00,106 [root] DEBUG: 6320: AllocationHandler: Memory region (size 0x50000) reserved but not committed at 0x7EE60000.
2025-12-09 07:40:00,106 [root] DEBUG: 6320: AllocationHandler: Previously reserved region at 0x7EE60000, committing at: 0x7EE60000.
2025-12-09 07:40:00,106 [root] DEBUG: 6320: AllocationHandler: Allocation already in tracked region list: 0x7EE60000.
2025-12-09 07:40:00,106 [root] DEBUG: 6320: AllocationHandler: Allocation already in tracked region list: 0x7EE60000.
2025-12-09 07:40:00,106 [root] DEBUG: 6320: AllocationHandler: Adding allocation to tracked region list: 0x7EE50000, size: 0x10000.
2025-12-09 07:40:00,106 [root] DEBUG: 6320: GetEntropy: Error - Supplied address inaccessible: 0x7EE50000
2025-12-09 07:40:00,106 [root] DEBUG: 6320: AddTrackedRegion: GetEntropy failed.
2025-12-09 07:40:00,106 [root] DEBUG: 6320: AllocationHandler: Processing previous tracked region at: 0x7EE60000.
2025-12-09 07:40:00,106 [root] DEBUG: 6320: DumpRegion: Dump at 0x7EE60000 skipped due to dump limit 10
2025-12-09 07:40:00,106 [root] DEBUG: 6320: ProcessTrackedRegion: Failed to dump region at 0x7EE60000.
2025-12-09 07:40:00,122 [root] DEBUG: 6320: YaraScan: Scanning 0x7EE60000, size 0x3c
2025-12-09 07:40:00,122 [root] DEBUG: 6320: AllocationHandler: Memory region (size 0x10000) reserved but not committed at 0x7EE50000.
2025-12-09 07:40:00,122 [root] DEBUG: 6320: AllocationHandler: Previously reserved region at 0x7EE50000, committing at: 0x7EE50000.
2025-12-09 07:40:00,168 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 4176 (handle 0x56c).
2025-12-09 07:40:00,200 [root] DEBUG: 6320: DLL loaded at 0x74180000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\wminet_utils (0x22000 bytes).
2025-12-09 07:40:00,294 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 3188 (handle 0x58c).
2025-12-09 07:40:00,309 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 4456 (handle 0x5a8).
2025-12-09 07:40:02,747 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 4688 (handle 0x5f8).
2025-12-09 07:40:03,246 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 4928 (handle 0x654).
2025-12-09 07:40:03,450 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 5260 (handle 0x67c).
2025-12-09 07:40:03,450 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 5048 (handle 0x684).
2025-12-09 07:40:10,815 [root] DEBUG: 848: CreateProcessHandler: Injection info set for new process 1940: C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\FileCoAuth.exe, ImageBase: 0x0000000000F00000
2025-12-09 07:40:10,830 [root] INFO: Announced 32-bit process name: FileCoAuth.exe pid: 1940
2025-12-09 07:40:10,830 [lib.api.process] INFO: Monitor config for <Process 1940 FileCoAuth.exe>: C:\tmpuce0d7me\dll\1940.ini
2025-12-09 07:40:10,908 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:40:10,971 [root] DEBUG: Loader: Injecting process 1940 (thread 6660) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:40:10,971 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:40:11,002 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:40:11,112 [root] DEBUG: 720: DLL loaded at 0x00007FF8DB060000: C:\Windows\system32\logoncli (0x45000 bytes).
2025-12-09 07:40:11,112 [lib.api.process] INFO: Injected into 32-bit <Process 1940 FileCoAuth.exe>
2025-12-09 07:40:11,143 [root] INFO: Announced 32-bit process name: FileCoAuth.exe pid: 1940
2025-12-09 07:40:11,143 [lib.api.process] INFO: Monitor config for <Process 1940 FileCoAuth.exe>: C:\tmpuce0d7me\dll\1940.ini
2025-12-09 07:40:11,143 [root] DEBUG: 720: DLL loaded at 0x00007FF8E4350000: C:\Windows\System32\WLDAP32 (0x62000 bytes).
2025-12-09 07:40:11,174 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:40:11,205 [root] DEBUG: Loader: Injecting process 1940 (thread 6660) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:40:11,205 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-09 07:40:11,221 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:40:11,252 [lib.api.process] INFO: Injected into 32-bit <Process 1940 FileCoAuth.exe>
2025-12-09 07:40:11,471 [root] DEBUG: 1940: Python path set to 'C:\Python38'.
2025-12-09 07:40:11,486 [root] DEBUG: 1940: Dropped file limit defaulting to 100.
2025-12-09 07:40:11,533 [root] INFO: Disabling sleep skipping.
2025-12-09 07:40:11,533 [root] DEBUG: 1940: YaraInit: Compiled rules loaded from existing file C:\tmpuce0d7me\data\yara\capemon.yac
2025-12-09 07:40:11,533 [root] DEBUG: 1940: YaraScan: Scanning 0x00F00000, size 0xcb190
2025-12-09 07:40:11,533 [root] DEBUG: 1940: AmsiDumper initialised.
2025-12-09 07:40:11,533 [root] DEBUG: 1940: Monitor initialised: 32-bit capemon loaded in process 1940 at 0x74fc0000, thread 6660, image base 0xf00000, stack from 0x6f6000-0x700000
2025-12-09 07:40:11,549 [root] DEBUG: 1940: Commandline: "C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\FileCoAuth.exe" -Embedding
2025-12-09 07:40:11,549 [root] DEBUG: 1940: GetAddressByYara: ModuleBase 0x77AF0000 FunctionName LdrpCallInitRoutine
2025-12-09 07:40:11,565 [root] DEBUG: 1940: hook_api: LdrpCallInitRoutine export address 0x77B666A0 obtained via GetFunctionAddress
2025-12-09 07:40:11,596 [root] DEBUG: 1940: hook_api: Warning - CreateRemoteThreadEx export address 0x75FC9A4C differs from GetProcAddress -> 0x76FFDDB0 (KERNELBASE.dll::0x11ddb0)
2025-12-09 07:40:11,596 [root] DEBUG: 1940: hook_api: Warning - CoCreateInstance export address 0x77890FEB differs from GetProcAddress -> 0x7724FF70 (combase.dll::0xdff70)
2025-12-09 07:40:11,596 [root] DEBUG: 1940: hook_api: Warning - CoCreateInstanceEx export address 0x7789102A differs from GetProcAddress -> 0x7729CCF0 (combase.dll::0x12ccf0)
2025-12-09 07:40:11,596 [root] DEBUG: 1940: hook_api: Warning - CoGetClassObject export address 0x778915BA differs from GetProcAddress -> 0x77212BD0 (combase.dll::0xa2bd0)
2025-12-09 07:40:11,596 [root] DEBUG: 1940: hook_api: Warning - UpdateProcThreadAttribute export address 0x75FD18BA differs from GetProcAddress -> 0x7702BD10 (KERNELBASE.dll::0x14bd10)
2025-12-09 07:40:11,596 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-09 07:40:11,627 [root] DEBUG: 1940: set_hooks: Unable to hook GetCommandLineA
2025-12-09 07:40:11,627 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-09 07:40:11,643 [root] DEBUG: 1940: set_hooks: Unable to hook GetCommandLineW
2025-12-09 07:40:11,643 [root] DEBUG: 1940: hook_api: Warning - CLSIDFromProgID export address 0x77890824 differs from GetProcAddress -> 0x771E54C0 (combase.dll::0x754c0)
2025-12-09 07:40:11,643 [root] DEBUG: 1940: hook_api: Warning - CLSIDFromProgIDEx export address 0x77890861 differs from GetProcAddress -> 0x771DFF40 (combase.dll::0x6ff40)
2025-12-09 07:40:11,643 [root] DEBUG: 1940: Hooked 611 out of 613 functions
2025-12-09 07:40:11,643 [root] DEBUG: 1940: Syscall hook installed, syscall logging level 1
2025-12-09 07:40:11,643 [root] DEBUG: 1940: WoW64fix: Windows version 10.0 not supported.
2025-12-09 07:40:11,658 [root] INFO: Loaded monitor into process with pid 1940
2025-12-09 07:40:11,658 [root] DEBUG: 1940: YaraScan: Scanning 0x73620000, size 0x14b06
2025-12-09 07:40:11,674 [root] DEBUG: 1940: caller_dispatch: Added region at 0x73620000 to tracked regions list (ntdll::LdrLoadDll returns to 0x7362824F, thread 6660).
2025-12-09 07:40:11,674 [root] DEBUG: 1940: caller_dispatch: Scanning calling region at 0x73620000...
2025-12-09 07:40:11,674 [root] DEBUG: 1940: ProcessTrackedRegion: Region at 0x73620000 mapped as \Device\HarddiskVolume2\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\vcruntime140.dll, skipping
2025-12-09 07:40:11,690 [root] DEBUG: 1940: YaraScan: Scanning 0x73640000, size 0x6c73e
2025-12-09 07:40:11,690 [root] DEBUG: 1940: YaraScan: Scanning 0x740E0000, size 0x91e24
2025-12-09 07:40:11,690 [root] DEBUG: 1940: YaraScan: Scanning 0x740E0000, size 0x91e24
2025-12-09 07:40:11,690 [root] DEBUG: 1940: YaraScan: Scanning 0x740E0000, size 0x91e24
2025-12-09 07:40:11,705 [root] DEBUG: 1940: caller_dispatch: Added region at 0x73640000 to tracked regions list (ntdll::LdrLoadDll returns to 0x7366BD1E, thread 6660).
2025-12-09 07:40:11,705 [root] DEBUG: 1940: caller_dispatch: Scanning calling region at 0x73640000...
2025-12-09 07:40:11,721 [root] DEBUG: 1940: ProcessTrackedRegion: Region at 0x73640000 mapped as \Device\HarddiskVolume2\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\msvcp140.dll, skipping
2025-12-09 07:40:11,721 [root] DEBUG: 1940: DLL loaded at 0x77560000: C:\Windows\System32\bcryptPrimitives (0x62000 bytes).
2025-12-09 07:40:11,721 [root] DEBUG: 1940: InstrumentationCallback: Added region at 0x76EE0000 to tracked regions list (thread 6660).
2025-12-09 07:40:11,721 [root] DEBUG: 1940: YaraScan: Scanning 0x74060000, size 0x759f4
2025-12-09 07:40:11,737 [root] DEBUG: 1940: YaraScan: Scanning 0x6F4A0000, size 0x14d4fc
2025-12-09 07:40:11,752 [root] DEBUG: 1940: YaraScan: Scanning 0x6F4A0000, size 0x14d4fc
2025-12-09 07:40:11,752 [root] DEBUG: 1940: caller_dispatch: Added region at 0x6F4A0000 to tracked regions list (ntdll::LdrLoadDll returns to 0x6F4AEC9B, thread 6660).
2025-12-09 07:40:11,768 [root] DEBUG: 1940: caller_dispatch: Scanning calling region at 0x6F4A0000...
2025-12-09 07:40:11,768 [root] DEBUG: 1940: ProcessTrackedRegion: Region at 0x6F4A0000 mapped as \Device\HarddiskVolume2\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\adal.dll, skipping
2025-12-09 07:40:11,768 [root] DEBUG: 1940: YaraScan: Scanning 0x73470000, size 0x7e188
2025-12-09 07:40:11,768 [root] DEBUG: 1940: YaraScan: Scanning 0x6F410000, size 0x80b22
2025-12-09 07:40:11,783 [root] DEBUG: 1940: YaraScan: Scanning 0x6F5F0000, size 0x41ab94
2025-12-09 07:40:11,799 [root] DEBUG: 1940: YaraScan: Scanning 0x6F5F0000, size 0x41ab94
2025-12-09 07:40:11,830 [root] DEBUG: 1940: YaraScan: Scanning 0x6F5F0000, size 0x41ab94
2025-12-09 07:40:11,846 [root] DEBUG: 1940: caller_dispatch: Added region at 0x00F00000 to tracked regions list (ntdll::memcpy returns to 0x00F67BAC, thread 6660).
2025-12-09 07:40:11,862 [root] DEBUG: 1940: YaraScan: Scanning 0x00F00000, size 0xcb190
2025-12-09 07:40:11,862 [root] DEBUG: 1940: ProcessImageBase: Main module image at 0x00F00000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:40:11,862 [root] DEBUG: 1940: caller_dispatch: Added region at 0x740E0000 to tracked regions list (ntdll::NtAllocateVirtualMemory returns to 0x74132B0C, thread 6660).
2025-12-09 07:40:11,862 [root] DEBUG: 1940: ProcessTrackedRegion: Region at 0x740E0000 mapped as \Device\HarddiskVolume2\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\LoggingPlatform.dll, skipping
2025-12-09 07:40:11,893 [root] DEBUG: 1940: DLL loaded at 0x74DF0000: C:\Windows\SYSTEM32\CRYPTSP (0x15000 bytes).
2025-12-09 07:40:11,893 [root] DEBUG: 1940: DLL loaded at 0x74DC0000: C:\Windows\system32\rsaenh (0x30000 bytes).
2025-12-09 07:40:11,924 [root] DEBUG: 1940: DLL loaded at 0x752D0000: C:\Windows\SYSTEM32\wintypes (0xc7000 bytes).
2025-12-09 07:40:11,940 [root] DEBUG: 1940: DLL loaded at 0x746A0000: C:\Windows\SYSTEM32\windows.storage (0x6ec000 bytes).
2025-12-09 07:40:11,955 [root] DEBUG: 1940: DLL loaded at 0x77700000: C:\Windows\System32\SHCORE (0xc1000 bytes).
2025-12-09 07:40:11,955 [root] DEBUG: 1940: DLL loaded at 0x744F0000: C:\Windows\SYSTEM32\profapi (0x1d000 bytes).
2025-12-09 07:40:11,987 [root] DEBUG: 1940: DLL loaded at 0x75740000: C:\Windows\SYSTEM32\IPHLPAPI (0x24000 bytes).
2025-12-09 07:40:11,987 [root] DEBUG: 1940: DLL loaded at 0x6F230000: C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\OneDriveTelemetryStable (0x1a2000 bytes).
2025-12-09 07:40:11,987 [root] DEBUG: 1940: DLL loaded at 0x6F1B0000: C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\FileSyncTelemetryExtensions (0x71000 bytes).
2025-12-09 07:40:12,033 [root] DEBUG: 1940: set_hooks_by_export_directory: Hooked 0 out of 613 functions
2025-12-09 07:40:12,033 [root] DEBUG: 1940: DLL loaded at 0x755C0000: C:\Windows\SYSTEM32\kernel.appcore (0x13000 bytes).
2025-12-09 07:40:12,033 [root] DEBUG: 1940: DLL loaded at 0x753D0000: C:\Windows\system32\uxtheme (0x7f000 bytes).
2025-12-09 07:40:12,049 [root] DEBUG: 1940: DLL loaded at 0x76E50000: C:\Windows\System32\clbcatq (0x82000 bytes).
2025-12-09 07:40:12,065 [root] DEBUG: 1940: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:40:12,080 [root] DEBUG: 1940: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:40:12,080 [root] DEBUG: 1940: DLL loaded at 0x6F180000: C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\FileCoAuthLib (0x2b000 bytes).
2025-12-09 07:40:18,293 [root] INFO: Added new file to list with pid None and path C:\Users\user\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2025-12-10.0040.1940.1.aodl
2025-12-09 07:40:18,309 [root] DEBUG: 1940: NtTerminateProcess hook: Attempting to dump process 1940
2025-12-09 07:40:18,309 [root] DEBUG: 1940: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:40:18,309 [root] INFO: Process with pid 1940 has terminated
2025-12-09 07:40:20,075 [root] DEBUG: 848: CreateProcessHandler: Injection info set for new process 580: C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\FileCoAuth.exe, ImageBase: 0x0000000000F00000
2025-12-09 07:40:20,106 [root] INFO: Announced 32-bit process name: FileCoAuth.exe pid: 580
2025-12-09 07:40:20,106 [lib.api.process] INFO: Monitor config for <Process 580 FileCoAuth.exe>: C:\tmpuce0d7me\dll\580.ini
2025-12-09 07:40:20,153 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:40:20,215 [root] DEBUG: Loader: Injecting process 580 (thread 4132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:40:20,231 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:40:20,247 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:40:20,372 [lib.api.process] INFO: Injected into 32-bit <Process 580 FileCoAuth.exe>
2025-12-09 07:40:20,403 [root] INFO: Announced 32-bit process name: FileCoAuth.exe pid: 580
2025-12-09 07:40:20,403 [lib.api.process] INFO: Monitor config for <Process 580 FileCoAuth.exe>: C:\tmpuce0d7me\dll\580.ini
2025-12-09 07:40:20,434 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpuce0d7me\dll\WFVXeB.dll, loader C:\tmpuce0d7me\bin\EpgvxWG.exe
2025-12-09 07:40:20,544 [root] DEBUG: Loader: Injecting process 580 (thread 4132) with C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:40:20,544 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-09 07:40:20,559 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\WFVXeB.dll.
2025-12-09 07:40:20,653 [lib.api.process] INFO: Injected into 32-bit <Process 580 FileCoAuth.exe>
2025-12-09 07:40:20,762 [root] DEBUG: 580: Python path set to 'C:\Python38'.
2025-12-09 07:40:20,762 [root] DEBUG: 580: Dropped file limit defaulting to 100.
2025-12-09 07:40:20,778 [root] INFO: Disabling sleep skipping.
2025-12-09 07:40:20,809 [root] DEBUG: 580: YaraInit: Compiled rules loaded from existing file C:\tmpuce0d7me\data\yara\capemon.yac
2025-12-09 07:40:20,809 [root] DEBUG: 580: YaraScan: Scanning 0x00F00000, size 0xcb190
2025-12-09 07:40:20,825 [root] DEBUG: 580: AmsiDumper initialised.
2025-12-09 07:40:20,840 [root] DEBUG: 580: Monitor initialised: 32-bit capemon loaded in process 580 at 0x74fc0000, thread 4132, image base 0xf00000, stack from 0x5356000-0x5360000
2025-12-09 07:40:20,840 [root] DEBUG: 580: Commandline: "C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\FileCoAuth.exe" -Embedding
2025-12-09 07:40:20,872 [root] DEBUG: 580: GetAddressByYara: ModuleBase 0x77AF0000 FunctionName LdrpCallInitRoutine
2025-12-09 07:40:20,887 [root] DEBUG: 580: hook_api: LdrpCallInitRoutine export address 0x77B666A0 obtained via GetFunctionAddress
2025-12-09 07:40:20,903 [root] DEBUG: 580: hook_api: Warning - CreateRemoteThreadEx export address 0x75FC9A4C differs from GetProcAddress -> 0x76FFDDB0 (KERNELBASE.dll::0x11ddb0)
2025-12-09 07:40:20,919 [root] DEBUG: 580: hook_api: Warning - CoCreateInstance export address 0x77890FEB differs from GetProcAddress -> 0x7724FF70 (combase.dll::0xdff70)
2025-12-09 07:40:20,934 [root] DEBUG: 580: hook_api: Warning - CoCreateInstanceEx export address 0x7789102A differs from GetProcAddress -> 0x7729CCF0 (combase.dll::0x12ccf0)
2025-12-09 07:40:20,950 [root] DEBUG: 580: hook_api: Warning - CoGetClassObject export address 0x778915BA differs from GetProcAddress -> 0x77212BD0 (combase.dll::0xa2bd0)
2025-12-09 07:40:20,965 [root] DEBUG: 580: hook_api: Warning - UpdateProcThreadAttribute export address 0x75FD18BA differs from GetProcAddress -> 0x7702BD10 (KERNELBASE.dll::0x14bd10)
2025-12-09 07:40:20,981 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-09 07:40:20,981 [root] DEBUG: 580: set_hooks: Unable to hook GetCommandLineA
2025-12-09 07:40:20,981 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-09 07:40:20,997 [root] DEBUG: 580: set_hooks: Unable to hook GetCommandLineW
2025-12-09 07:40:21,012 [root] DEBUG: 580: hook_api: Warning - CLSIDFromProgID export address 0x77890824 differs from GetProcAddress -> 0x771E54C0 (combase.dll::0x754c0)
2025-12-09 07:40:21,012 [root] DEBUG: 580: hook_api: Warning - CLSIDFromProgIDEx export address 0x77890861 differs from GetProcAddress -> 0x771DFF40 (combase.dll::0x6ff40)
2025-12-09 07:40:21,028 [root] DEBUG: 580: Hooked 611 out of 613 functions
2025-12-09 07:40:21,028 [root] DEBUG: 580: Syscall hook installed, syscall logging level 1
2025-12-09 07:40:21,044 [root] DEBUG: 580: WoW64fix: Windows version 10.0 not supported.
2025-12-09 07:40:21,044 [root] INFO: Loaded monitor into process with pid 580
2025-12-09 07:40:21,044 [root] DEBUG: 580: YaraScan: Scanning 0x73620000, size 0x14b06
2025-12-09 07:40:21,059 [root] DEBUG: 580: caller_dispatch: Added region at 0x73620000 to tracked regions list (ntdll::LdrLoadDll returns to 0x7362824F, thread 4132).
2025-12-09 07:40:21,075 [root] DEBUG: 580: caller_dispatch: Scanning calling region at 0x73620000...
2025-12-09 07:40:21,075 [root] DEBUG: 580: ProcessTrackedRegion: Region at 0x73620000 mapped as \Device\HarddiskVolume2\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\vcruntime140.dll, skipping
2025-12-09 07:40:21,075 [root] DEBUG: 580: YaraScan: Scanning 0x73640000, size 0x6c73e
2025-12-09 07:40:21,090 [root] DEBUG: 580: YaraScan: Scanning 0x740E0000, size 0x91e24
2025-12-09 07:40:21,090 [root] DEBUG: 580: YaraScan: Scanning 0x740E0000, size 0x91e24
2025-12-09 07:40:21,106 [root] DEBUG: 580: YaraScan: Scanning 0x740E0000, size 0x91e24
2025-12-09 07:40:21,137 [root] DEBUG: 580: caller_dispatch: Added region at 0x73640000 to tracked regions list (ntdll::LdrLoadDll returns to 0x7366BD1E, thread 4132).
2025-12-09 07:40:21,153 [root] DEBUG: 580: caller_dispatch: Scanning calling region at 0x73640000...
2025-12-09 07:40:21,169 [root] DEBUG: 580: ProcessTrackedRegion: Region at 0x73640000 mapped as \Device\HarddiskVolume2\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\msvcp140.dll, skipping
2025-12-09 07:40:21,200 [root] DEBUG: 580: DLL loaded at 0x77560000: C:\Windows\System32\bcryptPrimitives (0x62000 bytes).
2025-12-09 07:40:21,247 [root] DEBUG: 580: InstrumentationCallback: Added region at 0x76EE0000 to tracked regions list (thread 4132).
2025-12-09 07:40:21,262 [root] DEBUG: 580: YaraScan: Scanning 0x74060000, size 0x759f4
2025-12-09 07:40:21,262 [root] DEBUG: 580: YaraScan: Scanning 0x6F4A0000, size 0x14d4fc
2025-12-09 07:40:21,309 [root] DEBUG: 580: YaraScan: Scanning 0x6F4A0000, size 0x14d4fc
2025-12-09 07:40:21,325 [root] DEBUG: 580: caller_dispatch: Added region at 0x6F4A0000 to tracked regions list (ntdll::LdrLoadDll returns to 0x6F4AEC9B, thread 4132).
2025-12-09 07:40:21,341 [root] DEBUG: 580: caller_dispatch: Scanning calling region at 0x6F4A0000...
2025-12-09 07:40:21,356 [root] DEBUG: 580: ProcessTrackedRegion: Region at 0x6F4A0000 mapped as \Device\HarddiskVolume2\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\adal.dll, skipping
2025-12-09 07:40:21,356 [root] DEBUG: 580: YaraScan: Scanning 0x73470000, size 0x7e188
2025-12-09 07:40:21,372 [root] DEBUG: 580: YaraScan: Scanning 0x6F410000, size 0x80b22
2025-12-09 07:40:21,372 [root] DEBUG: 580: YaraScan: Scanning 0x6F5F0000, size 0x41ab94
2025-12-09 07:40:21,403 [root] DEBUG: 580: YaraScan: Scanning 0x6F5F0000, size 0x41ab94
2025-12-09 07:40:21,434 [root] DEBUG: 580: YaraScan: Scanning 0x6F5F0000, size 0x41ab94
2025-12-09 07:40:21,466 [root] DEBUG: 580: caller_dispatch: Added region at 0x00F00000 to tracked regions list (ntdll::memcpy returns to 0x00F67BAC, thread 4132).
2025-12-09 07:40:21,481 [root] DEBUG: 580: YaraScan: Scanning 0x00F00000, size 0xcb190
2025-12-09 07:40:21,497 [root] DEBUG: 580: ProcessImageBase: Main module image at 0x00F00000 unmodified (entropy change 0.000000e+00)
2025-12-09 07:40:21,513 [root] DEBUG: 580: caller_dispatch: Added region at 0x740E0000 to tracked regions list (ntdll::NtAllocateVirtualMemory returns to 0x74132B0C, thread 4132).
2025-12-09 07:40:21,513 [root] DEBUG: 580: ProcessTrackedRegion: Region at 0x740E0000 mapped as \Device\HarddiskVolume2\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\LoggingPlatform.dll, skipping
2025-12-09 07:40:21,528 [root] DEBUG: 580: DLL loaded at 0x74DF0000: C:\Windows\SYSTEM32\CRYPTSP (0x15000 bytes).
2025-12-09 07:40:21,543 [root] DEBUG: 580: DLL loaded at 0x74DC0000: C:\Windows\system32\rsaenh (0x30000 bytes).
2025-12-09 07:40:21,590 [root] DEBUG: 580: DLL loaded at 0x752D0000: C:\Windows\SYSTEM32\wintypes (0xc7000 bytes).
2025-12-09 07:40:21,590 [root] DEBUG: 580: DLL loaded at 0x746A0000: C:\Windows\SYSTEM32\windows.storage (0x6ec000 bytes).
2025-12-09 07:40:21,653 [root] DEBUG: 580: DLL loaded at 0x77700000: C:\Windows\System32\SHCORE (0xc1000 bytes).
2025-12-09 07:40:21,700 [root] DEBUG: 580: DLL loaded at 0x744F0000: C:\Windows\SYSTEM32\profapi (0x1d000 bytes).
2025-12-09 07:40:21,763 [root] DEBUG: 580: DLL loaded at 0x75740000: C:\Windows\SYSTEM32\IPHLPAPI (0x24000 bytes).
2025-12-09 07:40:21,793 [root] DEBUG: 580: DLL loaded at 0x6F230000: C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\OneDriveTelemetryStable (0x1a2000 bytes).
2025-12-09 07:40:21,825 [root] DEBUG: 580: DLL loaded at 0x6F1B0000: C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\FileSyncTelemetryExtensions (0x71000 bytes).
2025-12-09 07:40:21,840 [root] DEBUG: 580: set_hooks_by_export_directory: Hooked 0 out of 613 functions
2025-12-09 07:40:21,856 [root] DEBUG: 580: DLL loaded at 0x755C0000: C:\Windows\SYSTEM32\kernel.appcore (0x13000 bytes).
2025-12-09 07:40:21,872 [root] DEBUG: 580: DLL loaded at 0x753D0000: C:\Windows\system32\uxtheme (0x7f000 bytes).
2025-12-09 07:40:21,903 [root] DEBUG: 580: DLL loaded at 0x76E50000: C:\Windows\System32\clbcatq (0x82000 bytes).
2025-12-09 07:40:22,028 [root] DEBUG: 580: api-rate-cap: memcpy hook disabled due to rate
2025-12-09 07:40:22,075 [root] DEBUG: 580: DLL loaded at 0x6F180000: C:\Program Files (x86)\Microsoft OneDrive\23.038.0219.0001\FileCoAuthLib (0x2b000 bytes).
2025-12-09 07:40:23,622 [root] INFO: Announced starting service "b'DPS'"
2025-12-09 07:40:23,622 [lib.api.process] INFO: Monitor config for <Process 680 services.exe>: C:\tmpuce0d7me\dll\680.ini
2025-12-09 07:40:23,653 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpuce0d7me\dll\uusrbr.dll, loader C:\tmpuce0d7me\bin\MSGZtlUS.exe
2025-12-09 07:40:23,716 [root] DEBUG: Loader: Injecting process 680 with C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:40:23,778 [root] DEBUG: Loader: Copied config file C:\tmpuce0d7me\dll\680.ini to system path C:\680.ini
2025-12-09 07:40:28,796 [root] INFO: Added new file to list with pid None and path C:\Users\user\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2025-12-10.0040.580.1.aodl
2025-12-09 07:40:28,812 [root] DEBUG: 580: NtTerminateProcess hook: Attempting to dump process 580
2025-12-09 07:40:28,812 [root] DEBUG: 580: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-09 07:40:28,859 [root] INFO: Process with pid 580 has terminated
2025-12-09 07:40:33,282 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 820 (handle 0x6a0).
2025-12-09 07:40:33,361 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 3828 (handle 0x6a4).
2025-12-09 07:40:43,383 [root] DEBUG: 6320: InitNewThreadBreakpoints: Breakpoints set for thread 2384 (handle 0x578).
2025-12-09 07:40:48,013 [root] DEBUG: Loader: Unable to open process, launched: PPLinject64.exe 680 C:\tmpuce0d7me\dll\uusrbr.dll
2025-12-09 07:40:48,091 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:40:48,263 [lib.api.process] INFO: Injected into 64-bit <Process 680 services.exe>
2025-12-09 07:40:50,672 [root] DEBUG: 1260: CreateProcessHandler: Injection info set for new process 3352: C:\Windows\system32\sc.exe, ImageBase: 0x00007FF6C7E90000
2025-12-09 07:40:50,687 [root] INFO: Announced 64-bit process name: sc.exe pid: 3352
2025-12-09 07:40:50,687 [lib.api.process] INFO: Monitor config for <Process 3352 sc.exe>: C:\tmpuce0d7me\dll\3352.ini
2025-12-09 07:40:50,719 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpuce0d7me\dll\uusrbr.dll, loader C:\tmpuce0d7me\bin\MSGZtlUS.exe
2025-12-09 07:40:50,828 [root] DEBUG: Loader: Injecting process 3352 (thread 5504) with C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:40:50,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-09 07:40:50,890 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:40:51,064 [lib.api.process] INFO: Injected into 64-bit <Process 3352 sc.exe>
2025-12-09 07:40:51,080 [root] INFO: Announced 64-bit process name: sc.exe pid: 3352
2025-12-09 07:40:51,080 [lib.api.process] INFO: Monitor config for <Process 3352 sc.exe>: C:\tmpuce0d7me\dll\3352.ini
2025-12-09 07:40:51,221 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpuce0d7me\dll\uusrbr.dll, loader C:\tmpuce0d7me\bin\MSGZtlUS.exe
2025-12-09 07:40:51,253 [root] DEBUG: Loader: Injecting process 3352 (thread 5504) with C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:40:51,315 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-09 07:40:51,331 [root] DEBUG: Successfully injected DLL C:\tmpuce0d7me\dll\uusrbr.dll.
2025-12-09 07:40:51,457 [lib.api.process] INFO: Injected into 64-bit <Process 3352 sc.exe>
| Name | Label | Manager | Started On | Shutdown On |
|---|---|---|---|---|
| win11-64bit-tiny-1 | win11-64bit-tiny-1 | KVM | 2025-12-09 15:36:52 | 2025-12-09 15:40:58 |
| File Name |
BL 216238068 DOCS.exe
|
|---|---|
| File Type | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| File Size | 783872 bytes |
| MD5 | ba9c807ba1ef35055af5a4443bacd20b |
| SHA1 | 40f3736780a7d02a5d7edf18a982e4d5ff48d8db |
| SHA256 | 35745f99399f9d2a3cddb1ea463dcfbc8793ad471cb5913354d9a8fcf201c817 [VT] [MWDB] [Bazaar] |
| SHA3-384 | 36036fc5acdf4a800b8d630621c8ee09c99199dae75865d853b87b0e33986d36530fba23bc8e64231fd13037f4075e97 |
| CRC32 | 40570D21 |
| TLSH | T1EAF419BD715472AFC837C1728A945C64F650A8FB630B4A17E4931B9A9D0F4C7EF840BA |
| Ssdeep | 12288:h39PvaeRL7WE3P00c+IpFjsE5e0lZtwQY6hUr36out1QAYe3t6Yuf+afo0QE7T8C:htPy/1QfK6Yufrtj46dP |
| PE DotNET | File Strings BinGraph Vba2Graph |
| Image Base | Entry Point | Reported Checksum | Actual Checksum | Minimum OS Version | Compile Time | Import Hash |
|---|---|---|---|---|---|---|
| 0x00400000 | 0x000c600a | 0x00000000 | 0x000cd452 | 4.0 | 2082-09-15 13:41:50 | f34d5f2d4577ed6d9ceec516c1f5a744 |
| Translation | 0x0000 0x04b0 |
|---|---|
| Comments | |
| CompanyName | |
| FileDescription | Werkstatt |
| FileVersion | 1.2.0.0 |
| InternalName | uNVLZ7O.exe |
| LegalCopyright | Copyright รยฉ Trust123 2021 |
| LegalTrademarks | |
| OriginalFilename | uNVLZ7O.exe |
| ProductName | Werkstatt |
| ProductVersion | 1.2.0.0 |
| Assembly Version | 1.2.0.0 |
| Name | RAW Address | Virtual Address | Virtual Size | Size of Raw Data | Characteristics | Entropy |
|---|---|---|---|---|---|---|
| TFk"(6>+ | 0x00000400 | 0x00002000 | 0x00014ba4 | 0x00014c00 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 8.00 |
| .text | 0x00015000 | 0x00018000 | 0x000a8f18 | 0x000a9000 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ | 6.94 |
| .rsrc | 0x000be000 | 0x000c2000 | 0x00001188 | 0x00001200 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 5.05 |
| .reloc | 0x000bf200 | 0x000c4000 | 0x0000000c | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ | 0.09 |
| 0x000bf400 | 0x000c6000 | 0x00000010 | 0x00000200 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ | 0.14 |
| Name | Offset | Size | Language | Sub-language | Entropy | File type |
|---|---|---|---|---|---|---|
| RT_VERSION | 0x000c20a0 | 0x00000324 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 3.35 | None |
| RT_MANIFEST | 0x000c23c4 | 0x00000dbf | LANG_NEUTRAL | SUBLANG_NEUTRAL | 5.05 | None |
| Name | Address |
|---|---|
| _CorExeMain | 0x4c6000 |
| Name | uNVLZ7O |
|---|---|
| Version | 1.2.0.0 |
| Name | Version |
|---|---|
| Microsoft.VisualBasic | 10.0.0.0 |
| mscorlib | 4.0.0.0 |
| System.Drawing | 4.0.0.0 |
| System | 4.0.0.0 |
| System.Windows.Forms | 4.0.0.0 |
| System.Data | 4.0.0.0 |
| System | 2.0.0.0 |
| Type | Name | Value |
|---|---|---|
| Property | [System]System.ComponentModel.Design.HelpKeywordAttribute | My.Comput |
| Assembly | [mscorlib]System.Reflection.AssemblyCopyrightAttribute | Copyright \xc2\xa9 Trust123 20 |
| Assembly | [mscorlib]System.Reflection.AssemblyFileVersionAttribute | 1.2.0 |
| Assembly | [mscorlib]System.Runtime.InteropServices.GuidAttribute | 6d62bb4f-2a29-4dae-8512-733e7b14da |
| Assembly | [mscorlib]System.Reflection.AssemblyTitleAttribute | Werksta |
| Assembly | [mscorlib]System.Reflection.AssemblyProductAttribute | Werksta |
| Property | [System]System.ComponentModel.Design.HelpKeywordAttribute | My.Applicati |
| Property | [System]System.ComponentModel.Design.HelpKeywordAttribute | My.Us |
| Property | [System]System.Configuration.DefaultSettingValueAttribute | https://www.dropbox.com/s/mg7204nq9bccsrq/update.txt?dl |
| Property | [System]System.Configuration.DefaultSettingValueAttribute | https://unity-wow.tk/download/Werkstatt.e |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| Property | [System]System.Configuration.DefaultSettingValueAttribute | https://unity-wow.tk/download/update.b |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| Property | [System]System.ComponentModel.Design.HelpKeywordAttribute | My.Settin |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ComboBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ComboBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ComboBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | OpenFileDialo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | GroupBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ListBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | GroupBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ListBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ComboBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | RichTextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | MonthCalenda |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | PictureBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | GroupBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ListBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Butto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ToolStri |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ToolStripDropDownButto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | EinstellungenToolStripMenuIt |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | BeendenToolStripMenuIt |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ListBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | PrintPreviewDialo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | PrintDocumen |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ToolStripMenuIte |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | ToolStripDropDownButto |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | AnlegenToolStripMenuIt |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | \xc3\x84ndernToolStripMenuIt |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | TextBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Labe |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | Label |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | PictureBo |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | uplab |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | upbutt |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | BackgroundWorke |
| FieldDef | [mscorlib]System.Runtime.CompilerServices.AccessedThroughPropertyAttribute | uplabeln |
| Assembly | Type Name |
|---|---|
| Microsoft.VisualBasic | Microsoft.VisualBasic.ApplicationServices.WindowsFormsApplicationBase |
| Microsoft.VisualBasic | Microsoft.VisualBasic.Devices.Computer |
| mscorlib | System.Object |
| Microsoft.VisualBasic | Microsoft.VisualBasic.ApplicationServices.User |
| mscorlib | System.Collections.Hashtable |
| mscorlib | System.Type |
| mscorlib | System.RuntimeTypeHandle |
| mscorlib | System.InvalidOperationException |
| mscorlib | System.Exception |
| mscorlib | System.ArgumentException |
| mscorlib | System.Resources.ResourceManager |
| mscorlib | System.Globalization.CultureInfo |
| System.Drawing | System.Drawing.Bitmap |
| mscorlib | System.Reflection.Assembly |
| System | System.Configuration.ApplicationSettingsBase |
| mscorlib | System.EventArgs |
| System | System.Configuration.SettingsBase |
| Microsoft.VisualBasic | Microsoft.VisualBasic.ApplicationServices.ShutdownEventHandler |
| System.Windows.Forms | System.Windows.Forms.Form |
| System | System.ComponentModel.IContainer |
| System.Windows.Forms | System.Windows.Forms.Button |
| System.Windows.Forms | System.Windows.Forms.Label |
| System.Windows.Forms | System.Windows.Forms.ComboBox |
| mscorlib | System.EventHandler |
| mscorlib | System.IDisposable |
| System | System.ComponentModel.ComponentResourceManager |
| System.Windows.Forms | System.Windows.Forms.Control |
| System.Drawing | System.Drawing.Color |
| System.Windows.Forms | System.Windows.Forms.ButtonBase |
| System.Drawing | System.Drawing.Point |
| System.Drawing | System.Drawing.Size |
| System.Windows.Forms | System.Windows.Forms.RightToLeft |
| System.Drawing | System.Drawing.Font |
| System.Drawing | System.Drawing.FontStyle |
| System.Drawing | System.Drawing.GraphicsUnit |
| System.Windows.Forms | System.Windows.Forms.ListControl |
| System.Windows.Forms | System.Windows.Forms.ContainerControl |
| System.Drawing | System.Drawing.SizeF |
| System.Windows.Forms | System.Windows.Forms.AutoScaleMode |
| System.Windows.Forms | System.Windows.Forms.Control/ControlCollection |
| System.Windows.Forms | System.Windows.Forms.FormBorderStyle |
| System.Drawing | System.Drawing.Icon |
| System.Data | System.Data.Odbc.OdbcConnection |
| System.Data | System.Data.Odbc.OdbcCommand |
| System.Data | System.Data.Odbc.OdbcDataReader |
| System.Windows.Forms | System.Windows.Forms.ComboBox/ObjectCollection |
| Microsoft.VisualBasic | Microsoft.VisualBasic.MsgBoxResult |
| Microsoft.VisualBasic | Microsoft.VisualBasic.MsgBoxStyle |
| System.Windows.Forms | System.Windows.Forms.TextBox |
| System.Windows.Forms | System.Windows.Forms.OpenFileDialog |
| System.Windows.Forms | System.Windows.Forms.FileDialog |
| System.Windows.Forms | System.Windows.Forms.DialogResult |
| System.Windows.Forms | System.Windows.Forms.CommonDialog |
| System.Windows.Forms | System.Windows.Forms.GroupBox |
| System.Windows.Forms | System.Windows.Forms.ListBox |
| System.Windows.Forms | System.Windows.Forms.RichTextBox |
| System.Windows.Forms | System.Windows.Forms.MonthCalendar |
| System.Windows.Forms | System.Windows.Forms.PictureBox |
| System.Windows.Forms | System.Windows.Forms.ToolStrip |
| System.Windows.Forms | System.Windows.Forms.ToolStripDropDownButton |
| System.Windows.Forms | System.Windows.Forms.ToolStripMenuItem |
| System.Windows.Forms | System.Windows.Forms.PrintPreviewDialog |
| System.Drawing | System.Drawing.Printing.PrintDocument |
| System.Windows.Forms | System.Windows.Forms.ToolStripLabel |
| System.Windows.Forms | System.Windows.Forms.ToolStripButton |
| System | System.ComponentModel.BackgroundWorker |
| System.Drawing | System.Drawing.Printing.PrintPageEventArgs |
| System.Windows.Forms | System.Windows.Forms.ToolStripItem |
| System.Windows.Forms | System.Windows.Forms.ListBox/ObjectCollection |
| mscorlib | System.DateTime |
| System.Drawing | System.Drawing.Graphics |
| System.Drawing | System.Drawing.Brush |
| System.Drawing | System.Drawing.Image |
| System | System.Net.WebRequest |
| System | System.Net.WebResponse |
| System | System.Net.HttpWebRequest |
| mscorlib | System.IO.Stream |
| System | System.Net.HttpWebResponse |
| mscorlib | System.IO.StreamReader |
| Microsoft.VisualBasic | Microsoft.VisualBasic.MyServices.FileSystemProxy |
| Microsoft.VisualBasic | Microsoft.VisualBasic.Devices.ServerComputer |
| Microsoft.VisualBasic | Microsoft.VisualBasic.Devices.Network |
| System | System.Diagnostics.Process |
| System | System.ComponentModel.ISupportInitialize |
| System.Windows.Forms | System.Windows.Forms.ToolStripItemCollection |
| System.Windows.Forms | System.Windows.Forms.ToolStripItemDisplayStyle |
| System.Windows.Forms | System.Windows.Forms.ToolStripDropDownItem |
| System.Windows.Forms | System.Windows.Forms.ToolStripItemImageScaling |
| System.Windows.Forms | System.Windows.Forms.PictureBoxSizeMode |
| mscorlib | System.Reflection.MethodInfo |
| mscorlib | System.Reflection.MethodBase |
| mscorlib | System.AppDomain |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CallType |
| mscorlib | System.Text.StringBuilder |
| System.Drawing | System.Drawing.Printing.PrintPageEventHandler |
| mscorlib | System.Runtime.CompilerServices.CompilationRelaxationsAttribute |
| mscorlib | System.Runtime.CompilerServices.RuntimeCompatibilityAttribute |
| mscorlib | System.Diagnostics.DebuggableAttribute |
| mscorlib | System.Diagnostics.DebuggableAttribute/DebuggingModes |
| mscorlib | System.Reflection.AssemblyTitleAttribute |
| mscorlib | System.Reflection.AssemblyDescriptionAttribute |
| mscorlib | System.Reflection.AssemblyCompanyAttribute |
| mscorlib | System.Reflection.AssemblyProductAttribute |
| mscorlib | System.Reflection.AssemblyCopyrightAttribute |
| mscorlib | System.Reflection.AssemblyTrademarkAttribute |
| mscorlib | System.Runtime.InteropServices.ComVisibleAttribute |
| mscorlib | System.Runtime.InteropServices.GuidAttribute |
| mscorlib | System.Reflection.AssemblyFileVersionAttribute |
| mscorlib | System.Runtime.Versioning.TargetFrameworkAttribute |
| System | System.CodeDom.Compiler.GeneratedCodeAttribute |
| System | System.ComponentModel.EditorBrowsableAttribute |
| System | System.ComponentModel.EditorBrowsableState |
| mscorlib | System.STAThreadAttribute |
| mscorlib | System.Diagnostics.DebuggerHiddenAttribute |
| mscorlib | System.Diagnostics.DebuggerStepThroughAttribute |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CompilerServices.StandardModuleAttribute |
| Microsoft.VisualBasic | Microsoft.VisualBasic.HideModuleNameAttribute |
| System | System.ComponentModel.Design.HelpKeywordAttribute |
| Microsoft.VisualBasic | Microsoft.VisualBasic.MyGroupCollectionAttribute |
| mscorlib | System.ThreadStaticAttribute |
| mscorlib | System.Runtime.CompilerServices.CompilerGeneratedAttribute |
| mscorlib | System.Diagnostics.DebuggerNonUserCodeAttribute |
| System | System.Configuration.UserScopedSettingAttribute |
| System | System.Configuration.DefaultSettingValueAttribute |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CompilerServices.DesignerGeneratedAttribute |
| mscorlib | System.Diagnostics.DebuggerBrowsableAttribute |
| mscorlib | System.Diagnostics.DebuggerBrowsableState |
| mscorlib | System.Runtime.CompilerServices.AccessedThroughPropertyAttribute |
| mscorlib | System.Reflection.Module |
| mscorlib | System.String |
| mscorlib | System.Runtime.InteropServices.Marshal |
| mscorlib | System.IntPtr |
| mscorlib | System.Environment |
| System | System.Diagnostics.Process |
| mscorlib | System.UInt32 |
| Microsoft.VisualBasic | Microsoft.VisualBasic.ApplicationServices.AuthenticationMode |
| Microsoft.VisualBasic | Microsoft.VisualBasic.ApplicationServices.ShutdownMode |
| System.Windows.Forms | System.Windows.Forms.Application |
| mscorlib | System.Reflection.TargetInvocationException |
| mscorlib | System.Activator |
| System | System.ComponentModel.Component |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CompilerServices.Utils |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CompilerServices.ProjectData |
| mscorlib | System.Runtime.CompilerServices.RuntimeHelpers |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CompilerServices.ObjectFlowControl |
| mscorlib | System.Threading.Monitor |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CompilerServices.Conversions |
| System.Drawing | System.Drawing.SystemColors |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CompilerServices.Operators |
| Microsoft.VisualBasic | Microsoft.VisualBasic.Interaction |
| mscorlib | System.Int32 |
| mscorlib | System.Convert |
| System.Drawing | System.Drawing.Brushes |
| Microsoft.VisualBasic | Microsoft.VisualBasic.CompilerServices.Versioned |
| Microsoft.VisualBasic | Microsoft.VisualBasic.Strings |
| Credential Access | Defense Evasion | Discovery | Command and Control | Execution | Privilege Escalation |
|
|
|
|
|
|
|---|
No hosts contacted.
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP