Status: Malicious
| Category | Package | Started | Completed | Duration | Options | Log(s) | MalScore |
|---|---|---|---|---|---|---|---|
| FILE | exe | 2025-12-08 16:42:47 | 2025-12-08 16:43:39 | 52 seconds | Show Options | Show Analysis Log | 8.0 |
vnc_port=5902
2025-12-06 09:30:10,719 [root] INFO: Date set to: 20251208T08:32:11, timeout set to: 180 2025-12-08 08:32:11,015 [root] DEBUG: Starting analyzer from: C:\tmplvgo8bly 2025-12-08 08:32:11,015 [root] DEBUG: Storing results at: C:\jYwvXhpEc 2025-12-08 08:32:11,015 [root] DEBUG: Pipe server name: \\.\PIPE\ImvVfmhb 2025-12-08 08:32:11,015 [root] DEBUG: Python path: C:\Python38 2025-12-08 08:32:11,015 [root] INFO: analysis running as an admin 2025-12-08 08:32:11,015 [root] INFO: analysis package specified: "exe" 2025-12-08 08:32:11,015 [root] DEBUG: importing analysis package module: "modules.packages.exe"... 2025-12-08 08:32:11,015 [root] DEBUG: imported analysis package "exe" 2025-12-08 08:32:11,015 [root] DEBUG: initializing analysis package "exe"... 2025-12-08 08:32:11,015 [lib.common.common] INFO: wrapping 2025-12-08 08:32:11,015 [lib.core.compound] INFO: C:\Users\user\AppData\Local\Temp already exists, skipping creation 2025-12-08 08:32:11,015 [root] DEBUG: New location of moved file: C:\Users\user\AppData\Local\Temp\e9b7110334eeff9ee59b.exe 2025-12-08 08:32:11,015 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option 2025-12-08 08:32:11,015 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option 2025-12-08 08:32:11,015 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader option 2025-12-08 08:32:11,015 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader_64 option 2025-12-08 08:32:11,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser" 2025-12-08 08:32:11,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.curtain" 2025-12-08 08:32:11,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise" 2025-12-08 08:32:11,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.during_script" 2025-12-08 08:32:11,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.end_noisy_tasks" 2025-12-08 08:32:11,062 [root] DEBUG: Imported auxiliary module "modules.auxiliary.evtx" 2025-12-08 08:32:11,078 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human" 2025-12-08 08:32:11,078 [root] DEBUG: Imported auxiliary module "modules.auxiliary.pre_script" 2025-12-08 08:32:11,078 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2025-12-08 08:32:11,109 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2025-12-08 08:32:11,109 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2025-12-08 08:32:11,109 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots" 2025-12-08 08:32:11,125 [root] DEBUG: Imported auxiliary module "modules.auxiliary.sysmon" 2025-12-08 08:32:11,125 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump" 2025-12-08 08:32:11,125 [root] DEBUG: Imported auxiliary module "modules.auxiliary.usage" 2025-12-08 08:32:11,125 [root] DEBUG: Initialized auxiliary module "Browser" 2025-12-08 08:32:11,125 [root] DEBUG: attempting to configure 'Browser' from data 2025-12-08 08:32:11,125 [root] DEBUG: module Browser does not support data configuration, ignoring 2025-12-08 08:32:11,125 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"... 2025-12-08 08:32:11,125 [root] DEBUG: Started auxiliary module modules.auxiliary.browser 2025-12-08 08:32:11,125 [root] DEBUG: Initialized auxiliary module "Curtain" 2025-12-08 08:32:11,125 [root] DEBUG: attempting to configure 'Curtain' from data 2025-12-08 08:32:11,125 [root] DEBUG: module Curtain does not support data configuration, ignoring 2025-12-08 08:32:11,125 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.curtain"... 2025-12-08 08:32:11,125 [root] DEBUG: Started auxiliary module modules.auxiliary.curtain 2025-12-08 08:32:11,125 [root] DEBUG: Initialized auxiliary module "Disguise" 2025-12-08 08:32:11,125 [root] DEBUG: attempting to configure 'Disguise' from data 2025-12-08 08:32:11,125 [root] DEBUG: module Disguise does not support data configuration, ignoring 2025-12-08 08:32:11,125 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"... 2025-12-08 08:32:11,125 [modules.auxiliary.disguise] INFO: Disguising GUID to 92cce67d-fb96-4843-a2ce-37841dadda6a 2025-12-08 08:32:11,125 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise 2025-12-08 08:32:11,125 [root] DEBUG: Initialized auxiliary module "End_noisy_tasks" 2025-12-08 08:32:11,125 [root] DEBUG: attempting to configure 'End_noisy_tasks' from data 2025-12-08 08:32:11,125 [root] DEBUG: module End_noisy_tasks does not support data configuration, ignoring 2025-12-08 08:32:11,125 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.end_noisy_tasks"... 2025-12-08 08:32:11,125 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM wuauclt.exe 2025-12-08 08:32:11,125 [root] DEBUG: Started auxiliary module modules.auxiliary.end_noisy_tasks 2025-12-08 08:32:11,125 [root] DEBUG: Initialized auxiliary module "Evtx" 2025-12-08 08:32:11,125 [root] DEBUG: attempting to configure 'Evtx' from data 2025-12-08 08:32:11,125 [root] DEBUG: module Evtx does not support data configuration, ignoring 2025-12-08 08:32:11,125 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.evtx"... 2025-12-08 08:32:11,125 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security State Change" /success:enable /failure:enable 2025-12-08 08:32:11,125 [root] DEBUG: Started auxiliary module modules.auxiliary.evtx 2025-12-08 08:32:11,125 [root] DEBUG: Initialized auxiliary module "Human" 2025-12-08 08:32:11,125 [root] DEBUG: attempting to configure 'Human' from data 2025-12-08 08:32:11,125 [root] DEBUG: module Human does not support data configuration, ignoring 2025-12-08 08:32:11,125 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"... 2025-12-08 08:32:11,125 [root] DEBUG: Started auxiliary module modules.auxiliary.human 2025-12-08 08:32:11,140 [root] DEBUG: Initialized auxiliary module "Pre_script" 2025-12-08 08:32:11,140 [root] DEBUG: attempting to configure 'Pre_script' from data 2025-12-08 08:32:11,140 [root] DEBUG: module Pre_script does not support data configuration, ignoring 2025-12-08 08:32:11,140 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.pre_script"... 2025-12-08 08:32:11,140 [root] DEBUG: Started auxiliary module modules.auxiliary.pre_script 2025-12-08 08:32:11,140 [root] DEBUG: Initialized auxiliary module "Screenshots" 2025-12-08 08:32:11,140 [root] DEBUG: attempting to configure 'Screenshots' from data 2025-12-08 08:32:11,140 [root] DEBUG: module Screenshots does not support data configuration, ignoring 2025-12-08 08:32:11,140 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"... 2025-12-08 08:32:11,140 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots 2025-12-08 08:32:11,140 [root] DEBUG: Initialized auxiliary module "Sysmon" 2025-12-08 08:32:11,140 [root] DEBUG: attempting to configure 'Sysmon' from data 2025-12-08 08:32:11,140 [root] DEBUG: module Sysmon does not support data configuration, ignoring 2025-12-08 08:32:11,140 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.sysmon"... 2025-12-08 08:32:11,203 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security System Extension" /success:enable /failure:enable 2025-12-08 08:32:11,234 [root] WARNING: Cannot execute auxiliary module modules.auxiliary.sysmon: In order to use the Sysmon functionality, it is required to have the SMaster(64|32).exe file and sysmonconfig-export.xml file in the bin path. Note that the SMaster(64|32).exe files are just the standard Sysmon binaries renamed to avoid anti-analysis detection techniques. 2025-12-08 08:32:11,234 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets" 2025-12-08 08:32:11,234 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data 2025-12-08 08:32:11,234 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring 2025-12-08 08:32:11,234 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"... 2025-12-08 08:32:11,249 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 392 2025-12-08 08:32:11,249 [lib.api.process] INFO: Monitor config for <Process 392 lsass.exe>: C:\tmplvgo8bly\dll\392.ini 2025-12-08 08:32:11,249 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2025-12-08 08:32:11,249 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:11,249 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"System Integrity" /success:enable /failure:enable 2025-12-08 08:32:11,265 [root] DEBUG: Loader: Injecting process 392 with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:11,281 [root] DEBUG: 392: Python path set to 'C:\Python38'. 2025-12-08 08:32:11,296 [root] INFO: Disabling sleep skipping. 2025-12-08 08:32:11,296 [root] DEBUG: 392: TLS secret dump mode enabled. 2025-12-08 08:32:11,296 [root] DEBUG: 392: Monitor initialised: 32-bit capemon loaded in process 392 at 0x6c9a0000, thread 3116, image base 0x570000, stack from 0xf36000-0xf40000 2025-12-08 08:32:11,296 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Driver" /success:disable /failure:disable 2025-12-08 08:32:11,312 [root] DEBUG: 392: Commandline: C:\Windows\system32\lsass.exe 2025-12-08 08:32:11,312 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM wusa.exe 2025-12-08 08:32:11,312 [root] DEBUG: 392: Hooked 5 out of 5 functions 2025-12-08 08:32:11,312 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-12-08 08:32:11,312 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:11,312 [lib.api.process] INFO: Injected into 32-bit <Process 392 lsass.exe> 2025-12-08 08:32:11,312 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump 2025-12-08 08:32:11,312 [root] DEBUG: Initialized auxiliary module "Usage" 2025-12-08 08:32:11,312 [root] DEBUG: attempting to configure 'Usage' from data 2025-12-08 08:32:11,312 [root] DEBUG: module Usage does not support data configuration, ignoring 2025-12-08 08:32:11,312 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.usage"... 2025-12-08 08:32:11,312 [root] DEBUG: Started auxiliary module modules.auxiliary.usage 2025-12-08 08:32:11,312 [root] DEBUG: Initialized auxiliary module "During_script" 2025-12-08 08:32:11,312 [root] DEBUG: attempting to configure 'During_script' from data 2025-12-08 08:32:11,312 [root] DEBUG: module During_script does not support data configuration, ignoring 2025-12-08 08:32:11,312 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.during_script"... 2025-12-08 08:32:11,328 [root] DEBUG: Started auxiliary module modules.auxiliary.during_script 2025-12-08 08:32:11,343 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other System Events" /success:disable /failure:enable 2025-12-08 08:32:11,390 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM WindowsUpdate.exe 2025-12-08 08:32:11,406 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Logon" /success:enable /failure:enable 2025-12-08 08:32:11,437 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM GoogleUpdate.exe 2025-12-08 08:32:11,437 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Logoff" /success:enable /failure:enable 2025-12-08 08:32:11,453 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Account Lockout" /success:enable /failure:enable 2025-12-08 08:32:11,484 [modules.auxiliary.end_noisy_tasks] DEBUG: taskkill /f /IM MicrosoftEdgeUpdate.exe 2025-12-08 08:32:11,484 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Main Mode" /success:disable /failure:disable 2025-12-08 08:32:11,500 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Quick Mode" /success:disable /failure:disable 2025-12-08 08:32:11,515 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"IPsec Extended Mode" /success:disable /failure:disable 2025-12-08 08:32:11,546 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Logon/Logoff Events" /success:enable /failure:enable 2025-12-08 08:32:11,546 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v DisableWindowsUpdateAccess /t REG_DWORD /d 1 /f 2025-12-08 08:32:11,562 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable 2025-12-08 08:32:11,578 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f 2025-12-08 08:32:11,593 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Special Logon" /success:enable /failure:enable 2025-12-08 08:32:11,593 [modules.auxiliary.end_noisy_tasks] DEBUG: Command executed with exit code 0: reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v EnableICMPRedirect /t REG_DWORD /d 0 /f 2025-12-08 08:32:11,609 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"File System" /success:enable /failure:enable 2025-12-08 08:32:11,625 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Registry" /success:enable /failure:enable 2025-12-08 08:32:11,640 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kernel Object" /success:enable /failure:enable 2025-12-08 08:32:11,656 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"SAM" /success:disable /failure:disable 2025-12-08 08:32:11,671 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Certification Services" /success:enable /failure:enable 2025-12-08 08:32:11,687 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Handle Manipulation" /success:disable /failure:disable 2025-12-08 08:32:11,703 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Application Generated" /success:enable /failure:enable 2025-12-08 08:32:11,718 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"File Share" /success:enable /failure:enable 2025-12-08 08:32:11,734 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:disable /failure:disable 2025-12-08 08:32:11,750 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:disable 2025-12-08 08:32:11,765 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Object Access Events" /success:disable /failure:disable 2025-12-08 08:32:11,781 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Sensitive Privilege Use" /success:disable /failure:disable 2025-12-08 08:32:11,796 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Non Sensitive Privilege Use" /success:disable /failure:disable 2025-12-08 08:32:11,812 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Privilege Use Events" /success:disable /failure:disable 2025-12-08 08:32:11,828 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"RPC Events" /success:enable /failure:enable 2025-12-08 08:32:11,843 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Audit Policy Change" /success:enable /failure:enable 2025-12-08 08:32:11,875 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Authentication Policy Change" /success:enable /failure:enable 2025-12-08 08:32:11,890 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"MPSSVC Rule-Level Policy Change" /success:disable /failure:disable 2025-12-08 08:32:11,906 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Filtering Platform Policy Change" /success:disable /failure:disable 2025-12-08 08:32:11,921 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Policy Change Events" /success:disable /failure:enable 2025-12-08 08:32:11,937 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable 2025-12-08 08:32:11,953 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Computer Account Management" /success:enable /failure:enable 2025-12-08 08:32:11,968 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable 2025-12-08 08:32:11,968 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Distribution Group Management" /success:enable /failure:enable 2025-12-08 08:32:11,984 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Application Group Management" /success:enable /failure:enable 2025-12-08 08:32:12,000 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Account Management Events" /success:enable /failure:enable 2025-12-08 08:32:12,015 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Access" /success:enable /failure:enable 2025-12-08 08:32:12,031 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Changes" /success:enable /failure:enable 2025-12-08 08:32:12,046 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Directory Service Replication" /success:disable /failure:enable 2025-12-08 08:32:12,062 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Detailed Directory Service Replication" /success:disable /failure:disable 2025-12-08 08:32:12,078 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Credential Validation" /success:enable /failure:enable 2025-12-08 08:32:12,093 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kerberos Service Ticket Operations" /success:enable /failure:enable 2025-12-08 08:32:12,109 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Other Account Logon Events" /success:enable /failure:enable 2025-12-08 08:32:12,140 [modules.auxiliary.evtx] DEBUG: Enabling advanced logging -> auditpol /set /subcategory:"Kerberos Authentication Service" /success:enable /failure:enable 2025-12-08 08:32:12,140 [modules.auxiliary.evtx] DEBUG: Wiping Application 2025-12-08 08:32:12,156 [modules.auxiliary.evtx] DEBUG: Wiping HardwareEvents 2025-12-08 08:32:12,171 [modules.auxiliary.evtx] DEBUG: Wiping Internet Explorer 2025-12-08 08:32:12,187 [modules.auxiliary.evtx] DEBUG: Wiping Key Management Service 2025-12-08 08:32:12,203 [modules.auxiliary.evtx] DEBUG: Wiping OAlerts 2025-12-08 08:32:12,218 [modules.auxiliary.evtx] DEBUG: Wiping Security 2025-12-08 08:32:12,234 [modules.auxiliary.evtx] DEBUG: Wiping Setup 2025-12-08 08:32:12,249 [modules.auxiliary.evtx] DEBUG: Wiping System 2025-12-08 08:32:12,249 [modules.auxiliary.evtx] DEBUG: Wiping Windows PowerShell 2025-12-08 08:32:12,265 [modules.auxiliary.evtx] DEBUG: Wiping Microsoft-Windows-Sysmon/Operational 2025-12-08 08:32:16,531 [root] INFO: Restarting WMI Service 2025-12-08 08:32:18,562 [root] DEBUG: package modules.packages.exe does not support configure, ignoring 2025-12-08 08:32:18,562 [root] WARNING: configuration error for package modules.packages.exe: error importing data.packages.exe: No module named 'data.packages' 2025-12-08 08:32:18,562 [lib.core.compound] INFO: C:\Users\user\AppData\Local\Temp already exists, skipping creation 2025-12-08 08:32:18,562 [lib.api.process] INFO: Successfully executed process from path "C:\Users\user\AppData\Local\Temp\e9b7110334eeff9ee59b.exe" with arguments "" with pid 3012 2025-12-08 08:32:18,562 [lib.api.process] INFO: Monitor config for <Process 3012 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3012.ini 2025-12-08 08:32:18,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:18,578 [root] DEBUG: Loader: Injecting process 3012 (thread 3052) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:18,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-12-08 08:32:18,578 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:18,578 [lib.api.process] INFO: Injected into 32-bit <Process 3012 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:20,578 [lib.api.process] INFO: Successfully resumed <Process 3012 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:20,578 [root] DEBUG: 3012: Python path set to 'C:\Python38'. 2025-12-08 08:32:20,578 [root] INFO: Disabling sleep skipping. 2025-12-08 08:32:20,578 [root] DEBUG: 3012: Dropped file limit defaulting to 100. 2025-12-08 08:32:20,578 [root] DEBUG: 3012: YaraInit: Compiled 41 rule files 2025-12-08 08:32:20,578 [root] DEBUG: 3012: YaraInit: Compiled rules saved to file C:\tmplvgo8bly\data\yara\capemon.yac 2025-12-08 08:32:20,578 [root] DEBUG: 3012: YaraScan: Scanning 0x00400000, size 0x475c02 2025-12-08 08:32:20,593 [root] DEBUG: 3012: Monitor initialised: 32-bit capemon loaded in process 3012 at 0x6c9a0000, thread 3052, image base 0x400000, stack from 0x126000-0x130000 2025-12-08 08:32:20,593 [root] DEBUG: 3012: Commandline: "C:\Users\user\AppData\Local\Temp\e9b7110334eeff9ee59b.exe" 2025-12-08 08:32:20,593 [root] DEBUG: 3012: GetAddressByYara: ModuleBase 0x774E0000 FunctionName LdrpCallInitRoutine 2025-12-08 08:32:20,609 [root] DEBUG: 3012: hook_api: LdrpCallInitRoutine export address 0x77538810 obtained via GetFunctionAddress 2025-12-08 08:32:20,609 [root] DEBUG: 3012: hook_api: Warning - CreateRemoteThreadEx export address 0x764AF98F differs from GetProcAddress -> 0x754EBB18 (KERNELBASE.dll::0xbb18) 2025-12-08 08:32:20,609 [root] DEBUG: 3012: hook_api: Warning - UpdateProcThreadAttribute export address 0x764B020F differs from GetProcAddress -> 0x754F43FB (KERNELBASE.dll::0x143fb) 2025-12-08 08:32:20,609 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-12-08 08:32:20,609 [root] DEBUG: 3012: set_hooks: Unable to hook GetCommandLineA 2025-12-08 08:32:20,609 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-12-08 08:32:20,609 [root] DEBUG: 3012: set_hooks: Unable to hook GetCommandLineW 2025-12-08 08:32:20,609 [root] DEBUG: 3012: Hooked 611 out of 613 functions 2025-12-08 08:32:20,609 [root] DEBUG: 3012: WoW64 not detected. 2025-12-08 08:32:20,609 [root] INFO: Loaded monitor into process with pid 3012 2025-12-08 08:32:20,625 [root] DEBUG: 3012: caller_dispatch: Added region at 0x00400000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x0040B84D, thread 3052). 2025-12-08 08:32:20,625 [root] DEBUG: 3012: YaraScan: Scanning 0x00400000, size 0x475c02 2025-12-08 08:32:20,640 [root] DEBUG: 3012: ProcessImageBase: Main module image at 0x00400000 unmodified (entropy change 0.000000e+00) 2025-12-08 08:32:20,640 [root] DEBUG: 3012: ProtectionHandler: Adding region at 0x001B4C70 to tracked regions. 2025-12-08 08:32:20,640 [root] DEBUG: 3012: api-rate-cap: GetSystemDefaultLangID hook disabled due to rate 2025-12-08 08:32:21,765 [root] DEBUG: 3012: DLL loaded at 0x73AC0000: C:\Windows\system32\msimg32 (0x5000 bytes). 2025-12-08 08:32:21,765 [root] DEBUG: 3012: DumpPEsInRange: Scanning range 0x00180000 - 0x001EFFFF. 2025-12-08 08:32:21,765 [root] DEBUG: 3012: ScanForDisguisedPE: PE image located at: 0x001EA548 2025-12-08 08:32:21,765 [root] DEBUG: 3012: DumpImageInCurrentProcess: Disguised PE image (bad MZ and/or PE headers) at 0x001EA548 2025-12-08 08:32:21,765 [root] DEBUG: 3012: DumpImageInCurrentProcess: Attempting to dump 'raw' PE image (process 3012) 2025-12-08 08:32:21,765 [root] DEBUG: 3012: DumpPE: Instantiating PeParser with address: 0x001EA548. 2025-12-08 08:32:21,765 [root] DEBUG: 3012: DumpPE: Error: Invalid PE file or invalid PE header. 2025-12-08 08:32:21,765 [root] DEBUG: 3012: DumpImageInCurrentProcess: Failed to dump 'raw' PE image from 0x001EA548, dumping memory region. 2025-12-08 08:32:21,765 [lib.common.results] INFO: Uploading file C:\jYwvXhpEc\CAPE\3012_2349927021321081122025 to CAPE\107dfc7d856e6ffec76897096f099e3b4e0e6c2d6f47033509d67a17a7bc044e; Size is 458751; Max size: 100000000 2025-12-08 08:32:21,781 [root] DEBUG: 3012: DumpMemory: Payload successfully created: C:\jYwvXhpEc\CAPE\3012_2349927021321081122025 (size 458751 bytes) 2025-12-08 08:32:21,781 [root] DEBUG: 3012: DumpRegion: Dumped entire allocation from 0x00180000, size 458752 bytes. 2025-12-08 08:32:21,781 [root] DEBUG: 3012: ProcessTrackedRegion: Dumped region at 0x00180000. 2025-12-08 08:32:21,781 [root] DEBUG: 3012: YaraScan: Scanning 0x00180000, size 0x6ffff 2025-12-08 08:32:21,781 [root] DEBUG: 3012: AllocationHandler: Adding allocation to tracked region list: 0x00360000, size: 0x63000. 2025-12-08 08:32:21,781 [root] DEBUG: 3012: AddTrackedRegion: GetEntropy failed. 2025-12-08 08:32:21,781 [root] DEBUG: 3012: AllocationHandler: Processing previous tracked region at: 0x00180000. 2025-12-08 08:32:21,781 [root] DEBUG: 3012: DumpPEsInRange: Scanning range 0x00180000 - 0x001EFFFF. 2025-12-08 08:32:21,781 [root] DEBUG: 3012: ScanForDisguisedPE: No PE image located in range 0x00180000-0x001EFFFF. 2025-12-08 08:32:21,781 [lib.common.results] INFO: Uploading file C:\jYwvXhpEc\CAPE\3012_230793312132081122025 to CAPE\623ce9e6ea84f5767731cc948e8de66fac2570029c32bb257bb437dd12e64ca5; Size is 458751; Max size: 100000000 2025-12-08 08:32:21,796 [root] DEBUG: 3012: DumpMemory: Payload successfully created: C:\jYwvXhpEc\CAPE\3012_230793312132081122025 (size 458751 bytes) 2025-12-08 08:32:21,796 [root] DEBUG: 3012: DumpRegion: Dumped entire allocation from 0x00180000, size 458752 bytes. 2025-12-08 08:32:21,796 [root] DEBUG: 3012: ProcessTrackedRegion: Dumped region at 0x00180000. 2025-12-08 08:32:21,796 [root] DEBUG: 3012: YaraScan: Scanning 0x00180000, size 0x6ffff 2025-12-08 08:32:21,796 [root] DEBUG: 3012: DumpPEsInRange: Scanning range 0x00360000 - 0x003C1FB3. 2025-12-08 08:32:21,796 [root] DEBUG: 3012: ScanForDisguisedPE: PE image located at: 0x003615A0 2025-12-08 08:32:21,796 [root] DEBUG: 3012: DumpImageInCurrentProcess: Attempting to dump 'raw' PE image (process 3012) 2025-12-08 08:32:21,796 [root] DEBUG: 3012: DumpPE: Instantiating PeParser with address: 0x003615A0. 2025-12-08 08:32:21,796 [lib.common.results] INFO: Uploading file C:\jYwvXhpEc\CAPE\3012_2099848021321081122025 to CAPE\917780ccc514b26e57a9ea34b5ffb3379e837850185456fb86a521895205468a; Size is 396288; Max size: 100000000 2025-12-08 08:32:21,812 [root] DEBUG: 3012: DumpPE: PE file at 0x003615A0 dumped successfully - dump size 0x60c00. 2025-12-08 08:32:21,812 [root] DEBUG: 3012: ScanForDisguisedPE: No PE image located in range 0x003625A0-0x003C1FB3. 2025-12-08 08:32:21,812 [lib.common.results] INFO: Uploading file C:\jYwvXhpEc\CAPE\3012_919427621321081122025 to CAPE\5dc1a7d866ddcc2fab51bdb0597cfbcc36d965331b770f34c3151317c477bcdb; Size is 401331; Max size: 100000000 2025-12-08 08:32:21,812 [root] DEBUG: 3012: DumpMemory: Payload successfully created: C:\jYwvXhpEc\CAPE\3012_919427621321081122025 (size 401331 bytes) 2025-12-08 08:32:21,812 [root] DEBUG: 3012: DumpRegion: Dumped entire allocation from 0x00360000, size 405504 bytes. 2025-12-08 08:32:21,812 [root] DEBUG: 3012: ProcessTrackedRegion: Dumped region at 0x00360000. 2025-12-08 08:32:21,812 [root] DEBUG: 3012: YaraScan: Scanning 0x00360000, size 0x61fb3 2025-12-08 08:32:21,828 [root] DEBUG: 3012: DLL loaded at 0x74170000: C:\Windows\system32\uxtheme (0x40000 bytes). 2025-12-08 08:32:21,828 [root] DEBUG: 3012: DLL loaded at 0x73E80000: C:\Windows\system32\dwmapi (0x13000 bytes). 2025-12-08 08:32:21,828 [root] DEBUG: 3012: CreateProcessHandler: Injection info set for new process 3472: C:\Users\user\AppData\Local\Temp\e9b7110334eeff9ee59b.exe, ImageBase: 0x00400000 2025-12-08 08:32:21,828 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,828 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,828 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-12-08 08:32:21,828 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,828 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,828 [root] DEBUG: 3012: DLL loaded at 0x75390000: C:\Windows\system32\apphelp (0x4c000 bytes). 2025-12-08 08:32:21,843 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,843 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,843 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,843 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,843 [root] DEBUG: InjectDllViaIAT: This image has already been patched. 2025-12-08 08:32:21,843 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,843 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,843 [root] DEBUG: 3012: WriteMemoryHandler: Executable binary injected into process 3472 (ImageBase 0x400000) 2025-12-08 08:32:21,843 [root] DEBUG: 3012: DumpImageInCurrentProcess: Attempting to dump 'raw' PE image (process 3012) 2025-12-08 08:32:21,843 [root] DEBUG: 3012: DumpPE: Instantiating PeParser with address: 0x003615A0. 2025-12-08 08:32:21,859 [lib.common.results] INFO: Uploading file C:\jYwvXhpEc\CAPE\3012_1100379021321081122025 to CAPE\917780ccc514b26e57a9ea34b5ffb3379e837850185456fb86a521895205468a; Size is 396288; Max size: 100000000 2025-12-08 08:32:21,875 [root] DEBUG: 3012: DumpPE: PE file at 0x003615A0 dumped successfully - dump size 0x60c00. 2025-12-08 08:32:21,875 [root] DEBUG: 3012: WriteMemoryHandler: Dumped PE image from buffer at 0x3615a0, SizeOfImage 0x67000. 2025-12-08 08:32:21,875 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,875 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,875 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,875 [root] DEBUG: InjectDllViaIAT: Blank import descriptor, aborting IAT patch. 2025-12-08 08:32:21,875 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,875 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,875 [root] DEBUG: 3012: WriteMemoryHandler: injection of section of PE image which has already been dumped. 2025-12-08 08:32:21,875 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,875 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,875 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,875 [root] DEBUG: InjectDllViaIAT: Blank import descriptor, aborting IAT patch. 2025-12-08 08:32:21,875 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,875 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,890 [root] DEBUG: 3012: WriteMemoryHandler: injection of section of PE image which has already been dumped. 2025-12-08 08:32:21,890 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,890 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,890 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,890 [root] DEBUG: InjectDllViaIAT: Blank import descriptor, aborting IAT patch. 2025-12-08 08:32:21,890 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,890 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,890 [root] DEBUG: 3012: WriteMemoryHandler: injection of section of PE image which has already been dumped. 2025-12-08 08:32:21,890 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,890 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,890 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,890 [root] DEBUG: InjectDllViaIAT: Blank import descriptor, aborting IAT patch. 2025-12-08 08:32:21,890 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,906 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,906 [root] DEBUG: 3012: WriteMemoryHandler: injection of section of PE image which has already been dumped. 2025-12-08 08:32:21,906 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,906 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,906 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,906 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,906 [root] DEBUG: InjectDllViaIAT: Blank import descriptor, aborting IAT patch. 2025-12-08 08:32:21,906 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,906 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,906 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,906 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,906 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,906 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,906 [root] DEBUG: InjectDllViaIAT: Blank import descriptor, aborting IAT patch. 2025-12-08 08:32:21,906 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,906 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,921 [root] DEBUG: 3012: WriteMemoryHandler: injection of section of PE image which has already been dumped. 2025-12-08 08:32:21,921 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,921 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,921 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-12-08 08:32:21,921 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,921 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,921 [root] DEBUG: 3012: WriteMemoryHandler: injection of section of PE image which has already been dumped. 2025-12-08 08:32:21,921 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,921 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,921 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched. 2025-12-08 08:32:21,921 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,921 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,921 [root] DEBUG: 3012: WriteMemoryHandler: injection of section of PE image which has already been dumped. 2025-12-08 08:32:21,921 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,937 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,937 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched. 2025-12-08 08:32:21,937 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,937 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,937 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,937 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,937 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched. 2025-12-08 08:32:21,937 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,937 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,937 [root] DEBUG: 3012: SetThreadContextHandler: Hollow process entry point reset via NtSetContextThread to 0x000014C0 (process 3472). 2025-12-08 08:32:21,937 [root] INFO: Announced 32-bit process name: e9b7110334eeff9ee59b.exe pid: 3472 2025-12-08 08:32:21,937 [lib.api.process] INFO: Monitor config for <Process 3472 e9b7110334eeff9ee59b.exe>: C:\tmplvgo8bly\dll\3472.ini 2025-12-08 08:32:21,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmplvgo8bly\dll\GKaMkD.dll, loader C:\tmplvgo8bly\bin\EDSCeho.exe 2025-12-08 08:32:21,953 [root] DEBUG: Loader: Injecting process 3472 (thread 3424) with C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched. 2025-12-08 08:32:21,953 [root] DEBUG: Successfully injected DLL C:\tmplvgo8bly\dll\GKaMkD.dll. 2025-12-08 08:32:21,953 [lib.api.process] INFO: Injected into 32-bit <Process 3472 e9b7110334eeff9ee59b.exe> 2025-12-08 08:32:21,953 [root] DEBUG: 3012: NtTerminateProcess hook: Attempting to dump process 3012 2025-12-08 08:32:21,953 [root] DEBUG: 3012: DoProcessDump: Skipping process dump as code is identical on disk. 2025-12-08 08:32:21,968 [root] INFO: Process with pid 3012 has terminated 2025-12-08 08:32:21,968 [root] DEBUG: 3472: Python path set to 'C:\Python38'. 2025-12-08 08:32:21,968 [root] DEBUG: 3472: Dropped file limit defaulting to 100. 2025-12-08 08:32:21,968 [root] INFO: Disabling sleep skipping. 2025-12-08 08:32:21,968 [root] DEBUG: 3472: YaraInit: Compiled rules loaded from existing file C:\tmplvgo8bly\data\yara\capemon.yac 2025-12-08 08:32:21,968 [root] DEBUG: 3472: YaraScan: Scanning 0x00400000, size 0x66013 2025-12-08 08:32:21,968 [root] DEBUG: 3472: CAPE_init: Main executable image temporarily remapped for scanning at 0x00310000 2025-12-08 08:32:21,968 [root] DEBUG: 3472: YaraScan: Scanning 0x00310000, size 0x67000 2025-12-08 08:32:21,984 [root] DEBUG: 3472: Monitor initialised: 32-bit capemon loaded in process 3472 at 0x6c9a0000, thread 3424, image base 0x400000, stack from 0x126000-0x130000 2025-12-08 08:32:21,984 [root] DEBUG: 3472: Commandline: "C:\Users\user\AppData\Local\Temp\e9b7110334eeff9ee59b.exe" 2025-12-08 08:32:21,984 [root] DEBUG: 3472: GetAddressByYara: ModuleBase 0x774E0000 FunctionName LdrpCallInitRoutine 2025-12-08 08:32:21,984 [root] DEBUG: 3472: hook_api: LdrpCallInitRoutine export address 0x77538810 obtained via GetFunctionAddress 2025-12-08 08:32:21,984 [root] DEBUG: 3472: hook_api: Warning - CreateRemoteThreadEx export address 0x764AF98F differs from GetProcAddress -> 0x754EBB18 (KERNELBASE.dll::0xbb18) 2025-12-08 08:32:21,984 [root] DEBUG: 3472: hook_api: Warning - UpdateProcThreadAttribute export address 0x764B020F differs from GetProcAddress -> 0x754F43FB (KERNELBASE.dll::0x143fb) 2025-12-08 08:32:21,984 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-12-08 08:32:22,000 [root] DEBUG: 3472: set_hooks: Unable to hook GetCommandLineA 2025-12-08 08:32:22,000 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-12-08 08:32:22,000 [root] DEBUG: 3472: set_hooks: Unable to hook GetCommandLineW 2025-12-08 08:32:22,000 [root] DEBUG: 3472: Hooked 611 out of 613 functions 2025-12-08 08:32:22,000 [root] DEBUG: 3472: WoW64 not detected. 2025-12-08 08:32:22,000 [root] INFO: Loaded monitor into process with pid 3472 2025-12-08 08:32:22,000 [root] DEBUG: 3472: YaraScan: Scanning 0x00400000, size 0x66013 2025-12-08 08:32:22,000 [root] DEBUG: 3472: YaraScan: Scanning 0x00400000, size 0x66013 2025-12-08 08:32:22,000 [root] DEBUG: 3472: YaraScan: Scanning 0x00400000, size 0x66013 2025-12-08 08:32:22,000 [root] DEBUG: 3472: caller_dispatch: Added region at 0x00400000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x00442DCF, thread 3424). 2025-12-08 08:32:22,015 [root] DEBUG: 3472: YaraScan: Scanning 0x00400000, size 0x66013 2025-12-08 08:32:22,031 [root] DEBUG: 3472: ProcessImageBase: Main module image at 0x00400000 unmodified (entropy change 0.000000e+00) 2025-12-08 08:32:22,031 [root] DEBUG: 3472: DLL loaded at 0x75E10000: C:\Windows\system32\Urlmon (0x14a000 bytes). 2025-12-08 08:32:22,031 [root] DEBUG: 3472: DLL loaded at 0x75790000: C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes). 2025-12-08 08:32:22,031 [root] DEBUG: 3472: DLL loaded at 0x757E0000: C:\Windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0 (0x4000 bytes). 2025-12-08 08:32:22,031 [root] DEBUG: 3472: DLL loaded at 0x755C0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l1-1-0 (0x5000 bytes). 2025-12-08 08:32:22,031 [root] DEBUG: 3472: DLL loaded at 0x75610000: C:\Windows\system32\api-ms-win-downlevel-user32-l1-1-0 (0x4000 bytes). 2025-12-08 08:32:22,031 [root] DEBUG: 3472: DLL loaded at 0x75620000: C:\Windows\system32\api-ms-win-downlevel-version-l1-1-0 (0x4000 bytes). 2025-12-08 08:32:22,031 [root] DEBUG: 3472: DLL loaded at 0x74960000: C:\Windows\system32\version (0x9000 bytes). 2025-12-08 08:32:22,046 [root] DEBUG: 3472: DLL loaded at 0x75600000: C:\Windows\system32\api-ms-win-downlevel-normaliz-l1-1-0 (0x3000 bytes). 2025-12-08 08:32:22,046 [root] DEBUG: 3472: DLL loaded at 0x77630000: C:\Windows\system32\normaliz (0x3000 bytes). 2025-12-08 08:32:22,046 [root] DEBUG: 3472: DLL loaded at 0x761B0000: C:\Windows\system32\iertutil (0x232000 bytes). 2025-12-08 08:32:22,062 [root] DEBUG: 3472: DLL loaded at 0x75920000: C:\Windows\system32\WININET (0x1e4000 bytes). 2025-12-08 08:32:22,062 [root] DEBUG: 3472: DLL loaded at 0x757C0000: C:\Windows\system32\USERENV (0x17000 bytes). 2025-12-08 08:32:22,078 [root] DEBUG: 3472: DLL loaded at 0x754D0000: C:\Windows\system32\profapi (0xb000 bytes). 2025-12-08 08:32:22,078 [root] DEBUG: 3472: DLL loaded at 0x74170000: C:\Windows\system32\uxtheme (0x40000 bytes). 2025-12-08 08:32:22,093 [root] DEBUG: 3472: DLL loaded at 0x6FB50000: C:\Windows\system32\api-ms-win-downlevel-shlwapi-l2-1-0 (0x4000 bytes). 2025-12-08 08:32:22,109 [root] DEBUG: 3472: DLL loaded at 0x75350000: C:\Windows\system32\Secur32 (0x8000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x766D0000: C:\Windows\system32\SHELL32 (0xc4c000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x72CD0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x72BF0000: C:\Windows\system32\winhttp (0x58000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x72BA0000: C:\Windows\system32\webio (0x50000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x73640000: C:\Windows\system32\IPHLPAPI (0x1c000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x736D0000: C:\Windows\system32\WINNSI (0x7000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x74E90000: C:\Windows\system32\mswsock (0x3c000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x74E80000: C:\Windows\System32\wship6 (0x6000 bytes). 2025-12-08 08:32:22,171 [root] DEBUG: 3472: DLL loaded at 0x75D80000: C:\Windows\system32\OLEAUT32 (0x8f000 bytes). 2025-12-08 08:32:22,187 [root] DEBUG: 3472: DLL loaded at 0x74D50000: C:\Windows\system32\DNSAPI (0x44000 bytes). 2025-12-08 08:32:22,187 [root] DEBUG: 3472: DLL loaded at 0x753E0000: C:\Windows\system32\CRYPTBASE (0xc000 bytes). 2025-12-08 08:32:22,203 [root] DEBUG: 3472: DLL loaded at 0x76100000: C:\Windows\system32\CLBCatQ (0x83000 bytes). 2025-12-08 08:32:22,203 [root] DEBUG: 3472: DLL loaded at 0x72B10000: C:\Windows\System32\netprofm (0x5a000 bytes). 2025-12-08 08:32:22,203 [root] DEBUG: 3472: DLL loaded at 0x72C90000: C:\Windows\System32\nlaapi (0x10000 bytes). 2025-12-08 08:32:22,203 [root] DEBUG: 3472: DLL loaded at 0x735C0000: C:\Windows\system32\dhcpcsvc6 (0xd000 bytes). 2025-12-08 08:32:22,203 [root] DEBUG: 3472: DLL loaded at 0x73540000: C:\Windows\system32\dhcpcsvc (0x12000 bytes). 2025-12-08 08:32:22,203 [root] DEBUG: 3472: DLL loaded at 0x749F0000: C:\Windows\System32\wshtcpip (0x5000 bytes). 2025-12-08 08:32:22,218 [root] DEBUG: 3472: DLL loaded at 0x72500000: C:\Windows\system32\rasadhlp (0x6000 bytes). 2025-12-08 08:32:22,218 [root] DEBUG: 3472: DLL loaded at 0x74ED0000: C:\Windows\system32\CRYPTSP (0x16000 bytes). 2025-12-08 08:32:22,218 [root] DEBUG: 3472: DLL loaded at 0x74C60000: C:\Windows\system32\rsaenh (0x3b000 bytes). 2025-12-08 08:32:22,218 [root] DEBUG: 3472: DLL loaded at 0x75450000: C:\Windows\system32\RpcRtRemote (0xe000 bytes). 2025-12-08 08:32:22,234 [root] DEBUG: 3472: DLL loaded at 0x72C80000: C:\Windows\System32\npmproxy (0x8000 bytes). 2025-12-08 08:32:22,234 [root] DEBUG: 3472: DLL loaded at 0x73600000: C:\Windows\System32\fwpuclnt (0x38000 bytes). 2025-12-08 08:32:22,234 [root] DEBUG: 3472: DLL loaded at 0x743F0000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\Comctl32 (0x19e000 bytes). 2025-12-08 08:32:33,234 [root] DEBUG: 3472: DLL loaded at 0x72B10000: C:\Windows\System32\netprofm (0x5a000 bytes). 2025-12-08 08:32:33,234 [root] DEBUG: 3472: DLL loaded at 0x72C90000: C:\Windows\System32\nlaapi (0x10000 bytes). 2025-12-08 08:32:33,234 [root] DEBUG: 3472: DLL loaded at 0x72C80000: C:\Windows\System32\npmproxy (0x8000 bytes). 2025-12-08 08:32:43,468 [modules.auxiliary.human] INFO: Found button "close the program", clicking it 2025-12-08 08:32:44,468 [root] INFO: Process with pid 3472 has terminated 2025-12-08 08:32:44,468 [root] DEBUG: 3472: NtTerminateProcess hook: Attempting to dump process 3472 2025-12-08 08:32:44,468 [root] DEBUG: 3472: CAPEExceptionFilter: Exception 0xc0000005 accessing 0x875004 caught at RVA 0x4ae6 in capemon (expected in memory scans), passing to next handler. 2025-12-08 08:32:44,468 [root] DEBUG: 3472: VerifyCodeSection: Exception rebasing image from 0x00400000 to 0x00400000. 2025-12-08 08:32:44,468 [root] DEBUG: 3472: ReverseScanForNonZero: Error - Supplied address inaccessible: 0x00875FFF 2025-12-08 08:32:44,468 [root] DEBUG: 3472: CAPEExceptionFilter: Exception 0xc0000005 accessing 0x2e3840f caught at RVA 0x4c1e in capemon (expected in memory scans), passing to next handler. 2025-12-08 08:32:44,468 [root] DEBUG: 3472: VerifyCodeSection: Exception counting import thunks 2025-12-08 08:32:44,468 [root] DEBUG: 3472: DoProcessDump: Skipping process dump as code is identical on disk. 2025-12-08 08:32:50,578 [root] INFO: Process list is empty, terminating analysis 2025-12-08 08:32:51,578 [root] INFO: Created shutdown mutex 2025-12-08 08:32:52,578 [root] INFO: Shutting down package 2025-12-08 08:32:52,578 [root] INFO: Stopping auxiliary modules 2025-12-08 08:32:52,578 [root] INFO: Stopping auxiliary module: Browser 2025-12-08 08:32:52,578 [root] INFO: Stopping auxiliary module: Curtain 2025-12-08 08:32:52,593 [lib.common.results] INFO: Uploading file C:\curtain.log to curtain/1765153972.59375.curtain.log; Size is 36; Max size: 100000000 2025-12-08 08:32:52,593 [root] INFO: Stopping auxiliary module: End_noisy_tasks 2025-12-08 08:32:52,593 [root] INFO: Stopping auxiliary module: Evtx 2025-12-08 08:32:52,593 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Application.evtx to zip dump 2025-12-08 08:32:52,593 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\HardwareEvents.evtx to zip dump 2025-12-08 08:32:52,593 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Internet Explorer.evtx to zip dump 2025-12-08 08:32:52,593 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Key Management Service.evtx to zip dump 2025-12-08 08:32:52,609 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Microsoft-Windows-Sysmon%4Operational.evtx to zip dump 2025-12-08 08:32:52,609 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\OAlerts.evtx to zip dump 2025-12-08 08:32:52,609 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Security.evtx to zip dump 2025-12-08 08:32:52,609 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Setup.evtx to zip dump 2025-12-08 08:32:52,609 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\System.evtx to zip dump 2025-12-08 08:32:52,625 [modules.auxiliary.evtx] DEBUG: Adding C:/Windows/System32/winevt/Logs\Windows PowerShell.evtx to zip dump 2025-12-08 08:32:52,687 [modules.auxiliary.evtx] DEBUG: Uploading evtx.zip to host 2025-12-08 08:32:52,687 [lib.common.results] INFO: Uploading file evtx.zip to evtx/evtx.zip; Size is 322455; Max size: 100000000 2025-12-08 08:32:52,687 [root] INFO: Stopping auxiliary module: Human 2025-12-08 08:32:55,531 [root] INFO: Stopping auxiliary module: Pre_script 2025-12-08 08:32:55,531 [root] INFO: Stopping auxiliary module: Screenshots 2025-12-08 08:32:56,187 [root] INFO: Stopping auxiliary module: Usage 2025-12-08 08:32:57,343 [root] INFO: Stopping auxiliary module: During_script 2025-12-08 08:32:57,343 [root] INFO: Finishing auxiliary modules 2025-12-08 08:32:57,343 [root] INFO: Shutting down pipe server and dumping dropped files 2025-12-08 08:32:57,343 [root] WARNING: Folder at path "C:\jYwvXhpEc\debugger" does not exist, skipping 2025-12-08 08:32:57,343 [root] WARNING: Folder at path "C:\jYwvXhpEc\tlsdump" does not exist, skipping 2025-12-08 08:32:57,343 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| win7-32bit-1 | win7-32bit-1 | KVM | 2025-12-08 16:42:47 | 2025-12-08 16:43:39 | inetsim |
| File Name |
e9b7110334eeff9ee59b.exe
|
|---|---|
| File Type | PE32 executable (GUI) Intel 80386, for MS Windows |
| File Size | 491022 bytes |
| MD5 | 1f48341ff3031b71e213c19d3fafbc46 |
| SHA1 | b03f6332adb7098e73be63f54f5b5c36ed0dd1ee |
| SHA256 | e9b7110334eeff9ee59b644a4cbc8f0bd8e90c5cdb7c6b0c6426cbbd4567176d [VT] [MWDB] [Bazaar] |
| SHA3-384 | f580d1975e485582cdbe754b6440499d2a35bea8f02ba9265649b2a8a00a09ce61c822a1cc05da1e7aa9a10f8d4bfa32 |
| CRC32 | 45ABAA61 |
| TLSH | T1BEA4E021F6B2D472CF9185308439CBA45EBA68320561CA3F3797269D1E70FF1A666337 |
| Ssdeep | 6144:+4qZR5CH1lgLqTwSuKr0mWshFXsn3o/3I/4ZhuPtrd9UkZlkVEbcfPRSBQGAlc7M:3q3lBK6YBs3i3I/KUt7Uk0VnEBQxt |
| PE | File Strings BinGraph Vba2Graph |
| Image Base | Entry Point | Reported Checksum | Actual Checksum | Minimum OS Version | PDB Path | Compile Time | Import Hash | Icon | Icon Exact Hash | Icon Similarity Hash | Icon DHash |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 0x00400000 | 0x00004dc9 | 0x0007916b | 0x0007916b | 5.0 | C:\cire47\cobigagocutuj\wemovoyeha\wobitu\wuvare\xata.pdb | 2021-11-10 16:32:53 | 803fde251b2a69721fa12bfe881971ea | 44f3c23e70659a6038b20a97a65b0a03 | 1ebc4b3ab3b23f896de2d55a4efdf473 | 8c8efccc8c8c8cc8 |
| FileVersions | 32.89.0.100 |
|---|---|
| InternationalName | povgwaoci.iwe |
| Copyright | Copyright (C) 2022, somoklos |
| ProjectsVersion | 75.0.48.6 |
| Name | RAW Address | Virtual Address | Virtual Size | Size of Raw Data | Characteristics | Entropy |
|---|---|---|---|---|---|---|
| .text | 0x00000400 | 0x00001000 | 0x00011f40 | 0x00012000 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ | 6.69 |
| .data | 0x00012400 | 0x00013000 | 0x0044ba3c | 0x0004ba00 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 6.54 |
| .rsrc | 0x0005de00 | 0x0045f000 | 0x00015ad0 | 0x00015c00 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 6.54 |
| .reloc | 0x00073a00 | 0x00475000 | 0x0000435c | 0x00004400 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ | 1.77 |
| Offset | 0x00077e00 |
| Size | 0x0000000e |
| Name | Offset | Size | Language | Sub-language | Entropy | File type |
|---|---|---|---|---|---|---|
| AFX_DIALOG_LAYOUT | 0x00473b78 | 0x00000002 | LANG_TSWANA | SUBLANG_DEFAULT | 1.00 | None |
| AFX_DIALOG_LAYOUT | 0x00473b68 | 0x0000000e | LANG_TSWANA | SUBLANG_DEFAULT | 3.18 | None |
| AFX_DIALOG_LAYOUT | 0x00473b58 | 0x0000000e | LANG_TSWANA | SUBLANG_DEFAULT | 3.18 | None |
| RT_CURSOR | 0x00473b80 | 0x00000130 | LANG_TSWANA | SUBLANG_DEFAULT | 2.66 | None |
| RT_CURSOR | 0x00473cb0 | 0x000000b0 | LANG_TSWANA | SUBLANG_DEFAULT | 2.20 | None |
| RT_ICON | 0x0045f7c0 | 0x00000ea8 | LANG_TSWANA | SUBLANG_DEFAULT | 4.19 | None |
| RT_ICON | 0x00460668 | 0x000008a8 | LANG_TSWANA | SUBLANG_DEFAULT | 5.03 | None |
| RT_ICON | 0x00460f10 | 0x000025a8 | LANG_TSWANA | SUBLANG_DEFAULT | 6.51 | None |
| RT_ICON | 0x004634b8 | 0x000010a8 | LANG_TSWANA | SUBLANG_DEFAULT | 6.47 | None |
| RT_ICON | 0x00464560 | 0x00000468 | LANG_TSWANA | SUBLANG_DEFAULT | 6.30 | None |
| RT_ICON | 0x00464a18 | 0x000006c8 | LANG_TSWANA | SUBLANG_DEFAULT | 5.31 | None |
| RT_ICON | 0x004650e0 | 0x000025a8 | LANG_TSWANA | SUBLANG_DEFAULT | 5.58 | None |
| RT_ICON | 0x00467688 | 0x00000468 | LANG_TSWANA | SUBLANG_DEFAULT | 5.95 | None |
| RT_ICON | 0x00467b20 | 0x00000ea8 | LANG_TSWANA | SUBLANG_DEFAULT | 5.57 | None |
| RT_ICON | 0x004689c8 | 0x000008a8 | LANG_TSWANA | SUBLANG_DEFAULT | 5.51 | None |
| RT_ICON | 0x00469270 | 0x00000568 | LANG_TSWANA | SUBLANG_DEFAULT | 6.01 | None |
| RT_ICON | 0x004697d8 | 0x000025a8 | LANG_TSWANA | SUBLANG_DEFAULT | 6.15 | None |
| RT_ICON | 0x0046bd80 | 0x000010a8 | LANG_TSWANA | SUBLANG_DEFAULT | 6.32 | None |
| RT_ICON | 0x0046ce28 | 0x00000988 | LANG_TSWANA | SUBLANG_DEFAULT | 6.31 | None |
| RT_ICON | 0x0046d7b0 | 0x00000468 | LANG_TSWANA | SUBLANG_DEFAULT | 5.65 | None |
| RT_ICON | 0x0046dc80 | 0x00000ea8 | LANG_TSWANA | SUBLANG_DEFAULT | 5.68 | None |
| RT_ICON | 0x0046eb28 | 0x000008a8 | LANG_TSWANA | SUBLANG_DEFAULT | 6.18 | None |
| RT_ICON | 0x0046f3d0 | 0x000006c8 | LANG_TSWANA | SUBLANG_DEFAULT | 6.05 | None |
| RT_ICON | 0x0046fa98 | 0x00000568 | LANG_TSWANA | SUBLANG_DEFAULT | 5.95 | None |
| RT_ICON | 0x00470000 | 0x000025a8 | LANG_TSWANA | SUBLANG_DEFAULT | 6.04 | None |
| RT_ICON | 0x004725a8 | 0x000010a8 | LANG_TSWANA | SUBLANG_DEFAULT | 6.61 | None |
| RT_ICON | 0x00473650 | 0x00000468 | LANG_TSWANA | SUBLANG_DEFAULT | 6.85 | None |
| RT_STRING | 0x00473f78 | 0x000004a8 | LANG_TSWANA | SUBLANG_DEFAULT | 3.22 | None |
| RT_STRING | 0x00474420 | 0x000006ae | LANG_TSWANA | SUBLANG_DEFAULT | 3.27 | None |
| RT_ACCELERATOR | 0x00473b20 | 0x00000038 | LANG_TSWANA | SUBLANG_DEFAULT | 3.02 | None |
| RT_GROUP_CURSOR | 0x00473d60 | 0x00000022 | LANG_TSWANA | SUBLANG_DEFAULT | 2.33 | None |
| RT_GROUP_ICON | 0x004649c8 | 0x0000004c | LANG_TSWANA | SUBLANG_DEFAULT | 2.63 | None |
| RT_GROUP_ICON | 0x00473ab8 | 0x00000068 | LANG_TSWANA | SUBLANG_DEFAULT | 2.91 | None |
| RT_GROUP_ICON | 0x00467af0 | 0x00000030 | LANG_TSWANA | SUBLANG_DEFAULT | 2.75 | None |
| RT_GROUP_ICON | 0x0046dc18 | 0x00000068 | LANG_TSWANA | SUBLANG_DEFAULT | 2.90 | None |
| RT_VERSION | 0x00473d88 | 0x000001ec | LANG_TSWANA | SUBLANG_DEFAULT | 3.40 | None |
| Defense Evasion | Discovery | Command and Control | Execution | Privilege Escalation |
|
|
|
|
|---|
No hosts contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP