Analysis

Category Package Started Completed Duration Log(s)
FILE archive 2025-11-20 10:16:48 2025-11-20 10:17:48 60 seconds Show Analysis Log
2025-11-20 02:01:54,046 [root] INFO: Date set to: 20251120T10:16:41, timeout set to: 200
2025-11-20 10:16:41,024 [root] DEBUG: Starting analyzer from: C:\k2ffbmig
2025-11-20 10:16:41,025 [root] DEBUG: Storing results at: C:\PrCQdMR
2025-11-20 10:16:41,025 [root] DEBUG: Pipe server name: \\.\PIPE\LTZoRN
2025-11-20 10:16:41,026 [root] DEBUG: Python path: C:\Users\Admin\AppData\Local\Programs\Python\Python313-32
2025-11-20 10:16:41,026 [root] INFO: analysis running as an admin
2025-11-20 10:16:41,027 [root] INFO: analysis package specified: "archive"
2025-11-20 10:16:41,027 [root] DEBUG: importing analysis package module: "modules.packages.archive"...
2025-11-20 10:16:41,073 [root] DEBUG: imported analysis package "archive"
2025-11-20 10:16:41,074 [root] DEBUG: initializing analysis package "archive"...
2025-11-20 10:16:41,074 [lib.common.common] INFO: wrapping
2025-11-20 10:16:41,074 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 10:16:41,074 [root] DEBUG: New location of moved file: C:\Temp\vesktop.zip
2025-11-20 10:16:41,075 [root] INFO: Analyzer: Package modules.packages.archive does not specify a DLL option
2025-11-20 10:16:41,075 [root] INFO: Analyzer: Package modules.packages.archive does not specify a DLL_64 option
2025-11-20 10:16:41,075 [root] INFO: Analyzer: Package modules.packages.archive does not specify a loader option
2025-11-20 10:16:41,075 [root] INFO: Analyzer: Package modules.packages.archive does not specify a loader_64 option
2025-11-20 10:16:41,094 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser"
2025-11-20 10:16:41,121 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig"
2025-11-20 10:16:41,177 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise"
2025-11-20 10:16:41,212 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human"
2025-11-20 10:16:41,219 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2025-11-20 10:16:41,541 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab'
2025-11-20 10:16:41,543 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw'
2025-11-20 10:16:41,751 [lib.api.screenshot] INFO: Please upgrade Pillow to >= 5.4.1 for best performance
2025-11-20 10:16:41,751 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots"
2025-11-20 10:16:41,754 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump"
2025-11-20 10:16:41,755 [root] DEBUG: Initialized auxiliary module "Browser"
2025-11-20 10:16:41,755 [root] DEBUG: attempting to configure 'Browser' from data
2025-11-20 10:16:41,757 [root] DEBUG: module Browser does not support data configuration, ignoring
2025-11-20 10:16:41,757 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"...
2025-11-20 10:16:41,758 [root] DEBUG: Started auxiliary module modules.auxiliary.browser
2025-11-20 10:16:41,758 [root] DEBUG: Initialized auxiliary module "DigiSig"
2025-11-20 10:16:41,758 [root] DEBUG: attempting to configure 'DigiSig' from data
2025-11-20 10:16:41,758 [root] DEBUG: module DigiSig does not support data configuration, ignoring
2025-11-20 10:16:41,759 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.digisig"...
2025-11-20 10:16:41,759 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature
2025-11-20 10:16:43,280 [modules.auxiliary.digisig] DEBUG: File format not recognized
2025-11-20 10:16:43,280 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2025-11-20 10:16:43,290 [root] DEBUG: Started auxiliary module modules.auxiliary.digisig
2025-11-20 10:16:43,291 [root] DEBUG: Initialized auxiliary module "Disguise"
2025-11-20 10:16:43,291 [root] DEBUG: attempting to configure 'Disguise' from data
2025-11-20 10:16:43,291 [root] DEBUG: module Disguise does not support data configuration, ignoring
2025-11-20 10:16:43,291 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"...
2025-11-20 10:16:43,292 [modules.auxiliary.disguise] INFO: Disguising GUID to 31d9701d-8c5a-4eb5-8616-1d9dbb97ef23
2025-11-20 10:16:43,292 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise
2025-11-20 10:16:43,292 [root] DEBUG: Initialized auxiliary module "Human"
2025-11-20 10:16:43,293 [root] DEBUG: attempting to configure 'Human' from data
2025-11-20 10:16:43,293 [root] DEBUG: module Human does not support data configuration, ignoring
2025-11-20 10:16:43,293 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"...
2025-11-20 10:16:43,296 [root] DEBUG: Started auxiliary module modules.auxiliary.human
2025-11-20 10:16:43,296 [root] DEBUG: Initialized auxiliary module "Screenshots"
2025-11-20 10:16:43,297 [root] DEBUG: attempting to configure 'Screenshots' from data
2025-11-20 10:16:43,297 [root] DEBUG: module Screenshots does not support data configuration, ignoring
2025-11-20 10:16:43,298 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"...
2025-11-20 10:16:43,298 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots
2025-11-20 10:16:43,299 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets"
2025-11-20 10:16:43,299 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data
2025-11-20 10:16:43,300 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring
2025-11-20 10:16:43,300 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"...
2025-11-20 10:16:43,303 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 608
2025-11-20 10:16:43,537 [lib.api.process] INFO: Monitor config for <Process 608 lsass.exe>: C:\k2ffbmig\dll\608.ini
2025-11-20 10:16:43,540 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor
2025-11-20 10:16:43,564 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:16:43,589 [root] DEBUG: Loader: Injecting process 608 with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:16:43,598 [root] DEBUG: 608: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:16:43,600 [root] DEBUG: 608: Disabling sleep skipping.
2025-11-20 10:16:43,601 [root] DEBUG: 608: TLS secret dump mode enabled.
2025-11-20 10:16:43,637 [root] DEBUG: 608: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0
2025-11-20 10:16:43,638 [root] DEBUG: 608: Monitor initialised: 64-bit capemon loaded in process 608 at 0x00007FFEB9130000, thread 3428, image base 0x00007FF60EE30000, stack from 0x000000A5F4B72000-0x000000A5F4B80000
2025-11-20 10:16:43,639 [root] DEBUG: 608: Commandline: C:\Windows\system32\lsass.exe
2025-11-20 10:16:43,651 [root] DEBUG: 608: Hooked 5 out of 5 functions
2025-11-20 10:16:43,653 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2025-11-20 10:16:43,654 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:16:43,658 [lib.api.process] INFO: Injected into 64-bit <Process 608 lsass.exe>
2025-11-20 10:16:43,658 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump
2025-11-20 10:16:46,859 [root] INFO: Restarting WMI Service
2025-11-20 10:16:48,974 [root] DEBUG: package modules.packages.archive does not support configure, ignoring
2025-11-20 10:16:48,975 [root] WARNING: configuration error for package modules.packages.archive: error importing data.packages.archive: No module named 'data.packages'
2025-11-20 10:16:48,996 [lib.common.zip_utils] DEBUG: ['C:\\Program Files\\7-Zip\\7z.exe', 'l', 'C:\\Temp\\vesktop.zip']
2025-11-20 10:16:49,180 [lib.common.zip_utils] DEBUG: ['C:\\Program Files\\7-Zip\\7z.exe', 'x', '-p', '-y', '-oC:\\vesktop.zip', 'C:\\Temp\\vesktop.zip']
2025-11-20 10:16:53,468 [lib.common.zip_utils] DEBUG: b'\r\n7-Zip 23.01 (x64) : Copyright (c) 1999-2023 Igor Pavlov : 2023-06-20\r\n\r\nScanning the drive for archives:\r\n1 file, 135061806 bytes (129 MiB)\r\n\r\nExtracting archive: C:\\Temp\\vesktop.zip\r\n--\r\nPath = C:\\Temp\\vesktop.zip\r\nType = zip\r\nPhysical Size = 135061806\r\n\r\nEverything is Ok\r\n\r\nFolders: 3\r\nFiles: 77\r\nSize:       355116794\r\nCompressed: 135061806\r\n' b''
2025-11-20 10:16:53,470 [modules.packages.archive] DEBUG: ['vesktop\\chrome_100_percent.pak', 'vesktop\\chrome_200_percent.pak', 'vesktop\\d3dcompiler_47.dll', 'vesktop\\dxcompiler.dll', 'vesktop\\dxil.dll', 'vesktop\\ffmpeg.dll', 'vesktop\\icudtl.dat', 'vesktop\\libEGL.dll', 'vesktop\\libGLESv2.dll', 'vesktop\\LICENSE.electron.txt', 'vesktop\\LICENSES.chromium.html', 'vesktop\\resources.pak', 'vesktop\\snapshot_blob.bin', 'vesktop\\Uninstall vesktop.exe', 'vesktop\\v8_context_snapshot.bin', 'vesktop\\vesktop.exe', 'vesktop\\vk_swiftshader.dll', 'vesktop\\vk_swiftshader_icd.json', 'vesktop\\vulkan-1.dll', 'vesktop\\locales\\af.pak', 'vesktop\\locales\\am.pak', 'vesktop\\locales\\ar.pak', 'vesktop\\locales\\bg.pak', 'vesktop\\locales\\bn.pak', 'vesktop\\locales\\ca.pak', 'vesktop\\locales\\cs.pak', 'vesktop\\locales\\da.pak', 'vesktop\\locales\\de.pak', 'vesktop\\locales\\el.pak', 'vesktop\\locales\\en-GB.pak', 'vesktop\\locales\\en-US.pak', 'vesktop\\locales\\es-419.pak', 'vesktop\\locales\\es.pak', 'vesktop\\locales\\et.pak', 'vesktop\\locales\\fa.pak', 'vesktop\\locales\\fi.pak', 'vesktop\\locales\\fil.pak', 'vesktop\\locales\\fr.pak', 'vesktop\\locales\\gu.pak', 'vesktop\\locales\\he.pak', 'vesktop\\locales\\hi.pak', 'vesktop\\locales\\hr.pak', 'vesktop\\locales\\hu.pak', 'vesktop\\locales\\id.pak', 'vesktop\\locales\\it.pak', 'vesktop\\locales\\ja.pak', 'vesktop\\locales\\kn.pak', 'vesktop\\locales\\ko.pak', 'vesktop\\locales\\lt.pak', 'vesktop\\locales\\lv.pak', 'vesktop\\locales\\ml.pak', 'vesktop\\locales\\mr.pak', 'vesktop\\locales\\ms.pak', 'vesktop\\locales\\nb.pak', 'vesktop\\locales\\nl.pak', 'vesktop\\locales\\pl.pak', 'vesktop\\locales\\pt-BR.pak', 'vesktop\\locales\\pt-PT.pak', 'vesktop\\locales\\ro.pak', 'vesktop\\locales\\ru.pak', 'vesktop\\locales\\sk.pak', 'vesktop\\locales\\sl.pak', 'vesktop\\locales\\sr.pak', 'vesktop\\locales\\sv.pak', 'vesktop\\locales\\sw.pak', 'vesktop\\locales\\ta.pak', 'vesktop\\locales\\te.pak', 'vesktop\\locales\\th.pak', 'vesktop\\locales\\tr.pak', 'vesktop\\locales\\uk.pak', 'vesktop\\locales\\ur.pak', 'vesktop\\locales\\vi.pak', 'vesktop\\locales\\zh-CN.pak', 'vesktop\\locales\\zh-TW.pak', 'vesktop\\resources\\app-update.yml', 'vesktop\\resources\\app.asar', 'vesktop\\resources\\elevate.exe']
2025-11-20 10:16:53,471 [modules.packages.archive] DEBUG: Replacing ['vesktop', 'vesktop\\chrome_100_percent.pak', 'vesktop\\chrome_200_percent.pak', 'vesktop\\d3dcompiler_47.dll', 'vesktop\\dxcompiler.dll', 'vesktop\\dxil.dll', 'vesktop\\ffmpeg.dll', 'vesktop\\icudtl.dat', 'vesktop\\libEGL.dll', 'vesktop\\libGLESv2.dll', 'vesktop\\LICENSE.electron.txt', 'vesktop\\LICENSES.chromium.html', 'vesktop\\locales', 'vesktop\\locales\\af.pak', 'vesktop\\locales\\am.pak', 'vesktop\\locales\\ar.pak', 'vesktop\\locales\\bg.pak', 'vesktop\\locales\\bn.pak', 'vesktop\\locales\\ca.pak', 'vesktop\\locales\\cs.pak', 'vesktop\\locales\\da.pak', 'vesktop\\locales\\de.pak', 'vesktop\\locales\\el.pak', 'vesktop\\locales\\en-GB.pak', 'vesktop\\locales\\en-US.pak', 'vesktop\\locales\\es-419.pak', 'vesktop\\locales\\es.pak', 'vesktop\\locales\\et.pak', 'vesktop\\locales\\fa.pak', 'vesktop\\locales\\fi.pak', 'vesktop\\locales\\fil.pak', 'vesktop\\locales\\fr.pak', 'vesktop\\locales\\gu.pak', 'vesktop\\locales\\he.pak', 'vesktop\\locales\\hi.pak', 'vesktop\\locales\\hr.pak', 'vesktop\\locales\\hu.pak', 'vesktop\\locales\\id.pak', 'vesktop\\locales\\it.pak', 'vesktop\\locales\\ja.pak', 'vesktop\\locales\\kn.pak', 'vesktop\\locales\\ko.pak', 'vesktop\\locales\\lt.pak', 'vesktop\\locales\\lv.pak', 'vesktop\\locales\\ml.pak', 'vesktop\\locales\\mr.pak', 'vesktop\\locales\\ms.pak', 'vesktop\\locales\\nb.pak', 'vesktop\\locales\\nl.pak', 'vesktop\\locales\\pl.pak', 'vesktop\\locales\\pt-BR.pak', 'vesktop\\locales\\pt-PT.pak', 'vesktop\\locales\\ro.pak', 'vesktop\\locales\\ru.pak', 'vesktop\\locales\\sk.pak', 'vesktop\\locales\\sl.pak', 'vesktop\\locales\\sr.pak', 'vesktop\\locales\\sv.pak', 'vesktop\\locales\\sw.pak', 'vesktop\\locales\\ta.pak', 'vesktop\\locales\\te.pak', 'vesktop\\locales\\th.pak', 'vesktop\\locales\\tr.pak', 'vesktop\\locales\\uk.pak', 'vesktop\\locales\\ur.pak', 'vesktop\\locales\\vi.pak', 'vesktop\\locales\\zh-CN.pak', 'vesktop\\locales\\zh-TW.pak', 'vesktop\\resources', 'vesktop\\resources\\app-update.yml', 'vesktop\\resources\\app.asar', 'vesktop\\resources\\elevate.exe', 'vesktop\\resources.pak', 'vesktop\\snapshot_blob.bin', 'vesktop\\Uninstall vesktop.exe', 'vesktop\\v8_context_snapshot.bin', 'vesktop\\vesktop.exe', 'vesktop\\vk_swiftshader.dll', 'vesktop\\vk_swiftshader_icd.json', 'vesktop\\vulkan-1.dll'] with ['vesktop\\chrome_100_percent.pak', 'vesktop\\chrome_200_percent.pak', 'vesktop\\d3dcompiler_47.dll', 'vesktop\\dxcompiler.dll', 'vesktop\\dxil.dll', 'vesktop\\ffmpeg.dll', 'vesktop\\icudtl.dat', 'vesktop\\libEGL.dll', 'vesktop\\libGLESv2.dll', 'vesktop\\LICENSE.electron.txt', 'vesktop\\LICENSES.chromium.html', 'vesktop\\resources.pak', 'vesktop\\snapshot_blob.bin', 'vesktop\\Uninstall vesktop.exe', 'vesktop\\v8_context_snapshot.bin', 'vesktop\\vesktop.exe', 'vesktop\\vk_swiftshader.dll', 'vesktop\\vk_swiftshader_icd.json', 'vesktop\\vulkan-1.dll', 'vesktop\\locales\\af.pak', 'vesktop\\locales\\am.pak', 'vesktop\\locales\\ar.pak', 'vesktop\\locales\\bg.pak', 'vesktop\\locales\\bn.pak', 'vesktop\\locales\\ca.pak', 'vesktop\\locales\\cs.pak', 'vesktop\\locales\\da.pak', 'vesktop\\locales\\de.pak', 'vesktop\\locales\\el.pak', 'vesktop\\locales\\en-GB.pak', 'vesktop\\locales\\en-US.pak', 'vesktop\\locales\\es-419.pak', 'vesktop\\locales\\es.pak', 'vesktop\\locales\\et.pak', 'vesktop\\locales\\fa.pak', 'vesktop\\locales\\fi.pak', 'vesktop\\locales\\fil.pak', 'vesktop\\locales\\fr.pak', 'vesktop\\locales\\gu.pak', 'vesktop\\locales\\he.pak', 'vesktop\\locales\\hi.pak', 'vesktop\\locales\\hr.pak', 'vesktop\\locales\\hu.pak', 'vesktop\\locales\\id.pak', 'vesktop\\locales\\it.pak', 'vesktop\\locales\\ja.pak', 'vesktop\\locales\\kn.pak', 'vesktop\\locales\\ko.pak', 'vesktop\\locales\\lt.pak', 'vesktop\\locales\\lv.pak', 'vesktop\\locales\\ml.pak', 'vesktop\\locales\\mr.pak', 'vesktop\\locales\\ms.pak', 'vesktop\\locales\\nb.pak', 'vesktop\\locales\\nl.pak', 'vesktop\\locales\\pl.pak', 'vesktop\\locales\\pt-BR.pak', 'vesktop\\locales\\pt-PT.pak', 'vesktop\\locales\\ro.pak', 'vesktop\\locales\\ru.pak', 'vesktop\\locales\\sk.pak', 'vesktop\\locales\\sl.pak', 'vesktop\\locales\\sr.pak', 'vesktop\\locales\\sv.pak', 'vesktop\\locales\\sw.pak', 'vesktop\\locales\\ta.pak', 'vesktop\\locales\\te.pak', 'vesktop\\locales\\th.pak', 'vesktop\\locales\\tr.pak', 'vesktop\\locales\\uk.pak', 'vesktop\\locales\\ur.pak', 'vesktop\\locales\\vi.pak', 'vesktop\\locales\\zh-CN.pak', 'vesktop\\locales\\zh-TW.pak', 'vesktop\\resources\\app-update.yml', 'vesktop\\resources\\app.asar', 'vesktop\\resources\\elevate.exe']
2025-11-20 10:16:53,471 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\chrome_100_percent.pak to host
2025-11-20 10:16:53,475 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\chrome_100_percent.pak to files/45d14a4278b1e152b363197401a5604aa5a3cee6512a6b52df978038fa521a0f; Size is 114781; Max size: 100000000
2025-11-20 10:16:53,482 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\chrome_200_percent.pak to host
2025-11-20 10:16:53,485 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\chrome_200_percent.pak to files/aafc61b89748d17fcbc9fecd9844a77be2c584529a81714c98e0c4d453ea9496; Size is 186658; Max size: 100000000
2025-11-20 10:16:53,500 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\d3dcompiler_47.dll to host
2025-11-20 10:16:53,551 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\d3dcompiler_47.dll to files/c8e25abd3d45dfb55966a74613258c39b4a83ea2ac77f2f80903499f4d5c03f0; Size is 4741480; Max size: 100000000
2025-11-20 10:16:53,598 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\dxcompiler.dll to host
2025-11-20 10:16:53,853 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\dxcompiler.dll to files/25910d2b13581368afd6351feda6b7167ca16f1d8d45676c28b82cb641593594; Size is 26071040; Max size: 100000000
2025-11-20 10:16:54,025 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\dxil.dll to host
2025-11-20 10:16:54,039 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\dxil.dll to files/436f128f22050ae27323da61321a469de0678def7a4e6d86f9ccad4858724f0a; Size is 1503600; Max size: 100000000
2025-11-20 10:16:54,053 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\ffmpeg.dll to host
2025-11-20 10:16:54,080 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\ffmpeg.dll to files/572bb16b97da5d79c3ed44873981aa0e7e1efaf5926db81e00e4546d88434e89; Size is 3058176; Max size: 100000000
2025-11-20 10:16:54,124 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\icudtl.dat to host
2025-11-20 10:16:54,227 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\icudtl.dat to files/5070de99fbd8a48378543511fb7a072f85bf36f94b4f4e1d420d54be1435d6f1; Size is 10467680; Max size: 100000000
2025-11-20 10:16:54,303 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\libEGL.dll to host
2025-11-20 10:16:54,309 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\libEGL.dll to files/8a1b5f0c6d491ec67d03816fd7b7baf7772cb5deb41f37cd949e7788bfde1997; Size is 504320; Max size: 100000000
2025-11-20 10:16:54,329 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\libGLESv2.dll to host
2025-11-20 10:16:54,403 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\libGLESv2.dll to files/7e9623fe8e641bfe80fdeb611029ac266d5ca9f2c65d306f190bcf9f63638acb; Size is 8399872; Max size: 100000000
2025-11-20 10:16:54,577 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\LICENSE.electron.txt to host
2025-11-20 10:16:54,580 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\LICENSE.electron.txt to files/5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d; Size is 1096; Max size: 100000000
2025-11-20 10:16:54,583 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\LICENSES.chromium.html to host
2025-11-20 10:16:54,722 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\LICENSES.chromium.html to files/c16ee3cc1aa0d1669a839428ef26869d7a3844a43df505377b85077e1db14396; Size is 15102119; Max size: 100000000
2025-11-20 10:16:54,815 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\resources.pak to host
2025-11-20 10:16:54,872 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\resources.pak to files/75759d014d085ad2dc8772775ce165eda55fff890bdae0acd252796e32ccd836; Size is 6300973; Max size: 100000000
2025-11-20 10:16:54,937 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\snapshot_blob.bin to host
2025-11-20 10:16:54,942 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\snapshot_blob.bin to files/53b1d8a58564147d34384e6dd4e6f4eb76c9c78eae8c9e48baed031817c18937; Size is 403834; Max size: 100000000
2025-11-20 10:16:54,965 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\Uninstall vesktop.exe to host
2025-11-20 10:16:54,971 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\Uninstall vesktop.exe to files/ae3015444332c009803c56016931af3a68391dfeaf9f7867951b4c97f9b48942; Size is 528833; Max size: 100000000
2025-11-20 10:16:54,986 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\v8_context_snapshot.bin to host
2025-11-20 10:16:54,994 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\v8_context_snapshot.bin to files/18e61e7439cac6193040e2590e47c43fa59ae74d86c881e581852554c29fa06d; Size is 776865; Max size: 100000000
2025-11-20 10:16:55,001 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\vesktop.exe to host
2025-11-20 10:16:56,928 [lib.common.results] WARNING: File C:\vesktop.zip\vesktop\vesktop.exe size is too big: 210838528, ignoring
2025-11-20 10:16:56,929 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\vk_swiftshader.dll to host
2025-11-20 10:16:56,978 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\vk_swiftshader.dll to files/d9a45d05a557028db82c374230b1797cca3f87cb7b7656846360be2a84f88149; Size is 5640704; Max size: 100000000
2025-11-20 10:16:57,020 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\vk_swiftshader_icd.json to host
2025-11-20 10:16:57,021 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\vk_swiftshader_icd.json to files/32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9; Size is 106; Max size: 100000000
2025-11-20 10:16:57,034 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\vulkan-1.dll to host
2025-11-20 10:16:57,044 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\vulkan-1.dll to files/bf53271ae7ce29ee5865b871ac834b20cb2d451b807a3f812f59c80fe26f9a18; Size is 944128; Max size: 100000000
2025-11-20 10:16:57,050 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\af.pak to host
2025-11-20 10:16:57,056 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\af.pak to files/ebfdf1ca739f74b0b58a7965094274523fe2deb44fa0afff5bed98635b70326a; Size is 581539; Max size: 100000000
2025-11-20 10:16:57,069 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\am.pak to host
2025-11-20 10:16:57,078 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\am.pak to files/e04aff8c10e90113e7fd281e067ad2b95703a1ebfa2cfac5a38c7090ae58d5bd; Size is 943256; Max size: 100000000
2025-11-20 10:16:57,086 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ar.pak to host
2025-11-20 10:16:57,103 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ar.pak to files/44c7e802f47dd41335825b824d11a50b7122f065469378da258fe68df5f59c0b; Size is 1041242; Max size: 100000000
2025-11-20 10:16:57,113 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\bg.pak to host
2025-11-20 10:16:57,124 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\bg.pak to files/c66991330d9f7423ee26ecb8737f234e17982d782237121352ae925c2e44f904; Size is 1075890; Max size: 100000000
2025-11-20 10:16:57,139 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\bn.pak to host
2025-11-20 10:16:57,152 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\bn.pak to files/15a6cefa698a938d2212d1b0d275299dea5a2e8a3c292f80ef7ca43fd27472a4; Size is 1388243; Max size: 100000000
2025-11-20 10:16:57,194 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ca.pak to host
2025-11-20 10:16:57,200 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ca.pak to files/f65d82a9e81a8c135e35de1086bb1728e84125e650c5a9bb3a1a5592612ca4a0; Size is 655658; Max size: 100000000
2025-11-20 10:16:57,213 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\cs.pak to host
2025-11-20 10:16:57,222 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\cs.pak to files/d1b71e5fc5eeae3fe3a0e7434d0be2a72db1de4b8e2d7a7bd2ef8aad111a3e23; Size is 679712; Max size: 100000000
2025-11-20 10:16:57,237 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\da.pak to host
2025-11-20 10:16:57,244 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\da.pak to files/6c6c35e64f6a9213f64b76cee34d7f18ed5c456355a449ff2c51201600915fd4; Size is 612361; Max size: 100000000
2025-11-20 10:16:57,260 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\de.pak to host
2025-11-20 10:16:57,267 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\de.pak to files/0f320e62aed97197de2e27bb06a797b8faeb2674f53fc334af525905a987a707; Size is 656517; Max size: 100000000
2025-11-20 10:16:57,284 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\el.pak to host
2025-11-20 10:16:57,296 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\el.pak to files/c7e3ffd6424050f77a204cd243da7ad615e7df6096474589f33f5bbbd992dd8f; Size is 1183268; Max size: 100000000
2025-11-20 10:16:57,310 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\en-GB.pak to host
2025-11-20 10:16:57,316 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\en-GB.pak to files/d25573feb04edd24b29f3f1e6139a3348ea31ac5d50586cf032a8f56a5bbe198; Size is 530749; Max size: 100000000
2025-11-20 10:16:57,334 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\en-US.pak to host
2025-11-20 10:16:57,340 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\en-US.pak to files/d4b35269d3b629c9895f3a6f98178f8578db37a7e840c9ea496c53044729b796; Size is 536882; Max size: 100000000
2025-11-20 10:16:57,350 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\es-419.pak to host
2025-11-20 10:16:57,357 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\es-419.pak to files/78480bc1b80a923f8bf4209ea6ee3f6963518864c54c09888e8a531eaf298fb0; Size is 646017; Max size: 100000000
2025-11-20 10:16:57,362 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\es.pak to host
2025-11-20 10:16:57,369 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\es.pak to files/e97de891605549684ccb3700871b448327d6777f14f1946cd33de326e10b7d9d; Size is 643718; Max size: 100000000
2025-11-20 10:16:57,386 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\et.pak to host
2025-11-20 10:16:57,392 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\et.pak to files/f304e16a3820f8f9f624c1c5ed1eae2c2fd20807616280f0aa9736d50674d694; Size is 587336; Max size: 100000000
2025-11-20 10:16:57,409 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\fa.pak to host
2025-11-20 10:16:57,418 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\fa.pak to files/fac7c1836c64eeaabcf437fbb8f9b6c12060686b6502e7f28c60e31605f58474; Size is 969319; Max size: 100000000
2025-11-20 10:16:57,431 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\fi.pak to host
2025-11-20 10:16:57,438 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\fi.pak to files/29220b9d2e2aacb542ee0905b676b914a748332bc7831fe0da0f453252f88235; Size is 598169; Max size: 100000000
2025-11-20 10:16:57,444 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\fil.pak to host
2025-11-20 10:16:57,452 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\fil.pak to files/9c2c3db51dd197c0ece433fa103829a96daa5a4b3335324f1a98bcd7345cafaa; Size is 678514; Max size: 100000000
2025-11-20 10:16:57,460 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\fr.pak to host
2025-11-20 10:16:57,467 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\fr.pak to files/38139282dbcd2229e4adead79ff4763c60d261b55c64057c66d9db666be2cb02; Size is 698515; Max size: 100000000
2025-11-20 10:16:57,472 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\gu.pak to host
2025-11-20 10:16:57,485 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\gu.pak to files/149237780840b625b95321117cfaeccf5d54d6ac870a9886fcb9a3bcb1e6080a; Size is 1370341; Max size: 100000000
2025-11-20 10:16:57,496 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\he.pak to host
2025-11-20 10:16:57,505 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\he.pak to files/c4a828d6425bfc888d6e79ac1d9220926af6737c3eea05d86f0796206f7eef62; Size is 849299; Max size: 100000000
2025-11-20 10:16:57,524 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\hi.pak to host
2025-11-20 10:16:57,538 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\hi.pak to files/2acf2e5770dc1d8ca5fe4b93eef94f0395e44780e97eac8c03b3707c0e0e40ef; Size is 1449018; Max size: 100000000
2025-11-20 10:16:57,559 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\hr.pak to host
2025-11-20 10:16:57,566 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\hr.pak to files/a104df3eadd5a8217d58204b7407724c3c7731a32fb47fb6265090ece347ee86; Size is 654642; Max size: 100000000
2025-11-20 10:16:57,585 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\hu.pak to host
2025-11-20 10:16:57,592 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\hu.pak to files/0e3d482b4b09cacadf58043acd55baa2705fa631d1217ca0e10c7a8cc114fa73; Size is 701000; Max size: 100000000
2025-11-20 10:16:57,601 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\id.pak to host
2025-11-20 10:16:57,607 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\id.pak to files/0b35177ee2ca68f9ed7b516d6920696971cc9dbf2187c92f63adfa8e696e4921; Size is 579257; Max size: 100000000
2025-11-20 10:16:57,612 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\it.pak to host
2025-11-20 10:16:57,619 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\it.pak to files/ed64dadb92c0113bd03c56c0417e0c1930d0ef17d76f5f6c356e6ede66a094eb; Size is 634659; Max size: 100000000
2025-11-20 10:16:57,632 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ja.pak to host
2025-11-20 10:16:57,640 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ja.pak to files/25b71276ae5ddbe98e8cd237031d25954d02883584dba4a86ba5e16d7c308493; Size is 772093; Max size: 100000000
2025-11-20 10:16:57,644 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\kn.pak to host
2025-11-20 10:16:57,658 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\kn.pak to files/1ba01542213e2d3e9da15d930922a12c0916b002665d6d7d9a2fb2f483f3aa6a; Size is 1568918; Max size: 100000000
2025-11-20 10:16:57,698 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ko.pak to host
2025-11-20 10:16:57,706 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ko.pak to files/baa4dc565c14119a4cae9016314b284d2795fbc427a76e54b27799910d3b777a; Size is 655400; Max size: 100000000
2025-11-20 10:16:57,727 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\lt.pak to host
2025-11-20 10:16:57,734 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\lt.pak to files/cc3ad14a054ef5db438523d56f33cec0eddddcec82161c3ff231eeb6cd747e4f; Size is 710958; Max size: 100000000
2025-11-20 10:16:57,783 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\lv.pak to host
2025-11-20 10:16:57,805 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\lv.pak to files/b792d7adf76e8a87cd0fe28947b0683859e91d0f05b119a14964239d28165b2e; Size is 708648; Max size: 100000000
2025-11-20 10:16:57,815 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ml.pak to host
2025-11-20 10:16:57,830 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ml.pak to files/007fbd34d82ad4faf6ff8c0192a09783b37bf988ef76f4dc6ce8a93cd7364fff; Size is 1620601; Max size: 100000000
2025-11-20 10:16:57,855 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\mr.pak to host
2025-11-20 10:16:57,868 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\mr.pak to files/c0b460f8fcf6a46f94385ffe57d9be6ca1bbff317cc866bd2c7722d813c04df1; Size is 1340792; Max size: 100000000
2025-11-20 10:16:57,898 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ms.pak to host
2025-11-20 10:16:57,904 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ms.pak to files/195a63e82ca877f07e12eb531779e2b93f35b4f45accaea4e9d133d6b52f1883; Size is 609504; Max size: 100000000
2025-11-20 10:16:57,911 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\nb.pak to host
2025-11-20 10:16:57,917 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\nb.pak to files/0eeca6206c27b7246a9ef09217b00e60ba3d0f72cce528e9dc21836c32ac2d66; Size is 585928; Max size: 100000000
2025-11-20 10:16:57,927 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\nl.pak to host
2025-11-20 10:16:57,933 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\nl.pak to files/8189f284e1e1b665c17b91becf084cdad8e88d0574dd99f165c994885a7668c9; Size is 609092; Max size: 100000000
2025-11-20 10:16:57,939 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\pl.pak to host
2025-11-20 10:16:57,945 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\pl.pak to files/504077baf20983656f334b7a2bd78e97ad267c1243ffaca05d83723724c30508; Size is 679415; Max size: 100000000
2025-11-20 10:16:57,955 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\pt-BR.pak to host
2025-11-20 10:16:57,961 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\pt-BR.pak to files/423059732c14cd00c450ea2d6b9204c34954ac117169abb506ec248da6250052; Size is 636976; Max size: 100000000
2025-11-20 10:16:57,970 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\pt-PT.pak to host
2025-11-20 10:16:57,976 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\pt-PT.pak to files/6ae5c44e2044c1fa754d2cfbd79a33d3b9c2bd24702622df0f641bdbc7991435; Size is 640614; Max size: 100000000
2025-11-20 10:16:57,986 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ro.pak to host
2025-11-20 10:16:57,993 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ro.pak to files/8880b2ee29244efa9fe250d88f17dd5ae8f3e56a354c8208c5d4be4ff7cc3b74; Size is 664052; Max size: 100000000
2025-11-20 10:16:58,001 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ru.pak to host
2025-11-20 10:16:58,012 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ru.pak to files/4de88dade1118467dce77afa84802c2e52e49a574bf91cd8db9262d687f86000; Size is 1099422; Max size: 100000000
2025-11-20 10:16:58,025 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\sk.pak to host
2025-11-20 10:16:58,032 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\sk.pak to files/d0aa4f73024ae7f8bc95a6e6e8975fdf65cfa52d0c500f7e04db483d13fc1566; Size is 691087; Max size: 100000000
2025-11-20 10:16:58,056 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\sl.pak to host
2025-11-20 10:16:58,067 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\sl.pak to files/7fb4f5154e2f158777bb5b03dfd35f1037bafa6be772203f96e5c53f7a771643; Size is 661889; Max size: 100000000
2025-11-20 10:16:58,079 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\sr.pak to host
2025-11-20 10:16:58,090 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\sr.pak to files/39dffe2ac8a038bc8ab98b3796da08109d7b0201299a0b8411d0290b507dafda; Size is 1017075; Max size: 100000000
2025-11-20 10:16:58,105 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\sv.pak to host
2025-11-20 10:16:58,111 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\sv.pak to files/78c25c86c120e4db41ecce3d91ebe550d127a97d8b72c719d3a2a433973946d2; Size is 591734; Max size: 100000000
2025-11-20 10:16:58,126 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\sw.pak to host
2025-11-20 10:16:58,133 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\sw.pak to files/c2df1fc14a64c19c92d9b9b891aee74ee1d9319cc054642251c517ed00363bae; Size is 625307; Max size: 100000000
2025-11-20 10:16:58,142 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ta.pak to host
2025-11-20 10:16:58,157 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ta.pak to files/b7dcc6f63181392752f4522d3bbb573fd4a6ec65f9058a922ac61ce21b257b76; Size is 1611499; Max size: 100000000
2025-11-20 10:16:58,183 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\te.pak to host
2025-11-20 10:16:58,197 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\te.pak to files/72cf1e05c189751946df56b1847776ffbbc2b4460fad07a070c4c33396516ef2; Size is 1491212; Max size: 100000000
2025-11-20 10:16:58,213 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\th.pak to host
2025-11-20 10:16:58,226 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\th.pak to files/45a573589f11c1694490913c00bbff65d57e232d33ca2270ac2e443207b971d2; Size is 1251780; Max size: 100000000
2025-11-20 10:16:58,243 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\tr.pak to host
2025-11-20 10:16:58,250 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\tr.pak to files/a75be19b6203daafc5c01f8ada1ba464076346a4d4959a2e05e91523ac56c446; Size is 636522; Max size: 100000000
2025-11-20 10:16:58,271 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\uk.pak to host
2025-11-20 10:16:58,282 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\uk.pak to files/01989ebc539c272ed8eddd3a9d25810e39c7fa0276a19562492f5b332ddc380f; Size is 1105739; Max size: 100000000
2025-11-20 10:16:58,319 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\ur.pak to host
2025-11-20 10:16:58,328 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\ur.pak to files/d99ccf422979a0dda1c46919934e6eb599d2b75a7c724c34b761da8215a727db; Size is 956025; Max size: 100000000
2025-11-20 10:16:58,345 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\vi.pak to host
2025-11-20 10:16:58,353 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\vi.pak to files/2b28fc3de60a6f3e75423bde8bd681fdfd149372455070e6aa0508581707e94d; Size is 755237; Max size: 100000000
2025-11-20 10:16:58,365 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\zh-CN.pak to host
2025-11-20 10:16:58,371 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\zh-CN.pak to files/03754412deb511ddac23a23e0858bba40373b5053bf97cc21e9e0b3c5d00ec4c; Size is 541981; Max size: 100000000
2025-11-20 10:16:58,376 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\locales\zh-TW.pak to host
2025-11-20 10:16:58,382 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\locales\zh-TW.pak to files/d97e1a4b2b3b7b64e92dd419480f8abe84fe3148834cdef5abc31b36f69391bd; Size is 535963; Max size: 100000000
2025-11-20 10:16:58,392 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\resources\app-update.yml to host
2025-11-20 10:16:58,394 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\resources\app-update.yml to files/00f7a4b067d59666fe8c6daff7df43b73572d079ef55e465e86b0deeb9b56451; Size is 83; Max size: 100000000
2025-11-20 10:16:58,407 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\resources\app.asar to host
2025-11-20 10:16:58,522 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\resources\app.asar to files/d5559be502dbfa0730af12eb48756769032face7417deb4786bb5a7b61ef9413; Size is 13103814; Max size: 100000000
2025-11-20 10:16:58,624 [lib.common.zip_utils] INFO: Uploading C:\vesktop.zip\vesktop\resources\elevate.exe to host
2025-11-20 10:16:58,627 [lib.common.results] INFO: Uploading file C:\vesktop.zip\vesktop\resources\elevate.exe to files/9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37; Size is 107520; Max size: 100000000
2025-11-20 10:16:59,634 [modules.packages.archive] DEBUG: Missing file option, auto executing: ['vesktop\\d3dcompiler_47.dll', 'vesktop\\dxcompiler.dll', 'vesktop\\dxil.dll', 'vesktop\\ffmpeg.dll', 'vesktop\\icudtl.dat', 'vesktop\\libEGL.dll', 'vesktop\\libGLESv2.dll', 'vesktop\\LICENSES.chromium.html', 'vesktop\\Uninstall vesktop.exe', 'vesktop\\vesktop.exe', 'vesktop\\vk_swiftshader.dll', 'vesktop\\vulkan-1.dll', 'vesktop\\resources\\elevate.exe']
2025-11-20 10:16:59,636 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 10:16:59,648 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\rundll32.exe" with arguments ""C:\vesktop.zip\vesktop\d3dcompiler_47.dll",#1" with pid 1368
2025-11-20 10:16:59,648 [lib.api.process] INFO: Monitor config for <Process 1368 rundll32.exe>: C:\k2ffbmig\dll\1368.ini
2025-11-20 10:16:59,654 [lib.api.process] INFO: 32-bit DLL to inject is C:\k2ffbmig\dll\VGCgjUjb.dll, loader C:\k2ffbmig\bin\oLlatlP.exe
2025-11-20 10:16:59,681 [root] DEBUG: Loader: Injecting process 1368 (thread 2312) with C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:16:59,683 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:16:59,685 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:16:59,688 [lib.api.process] INFO: Injected into 32-bit <Process 1368 rundll32.exe>
2025-11-20 10:17:01,701 [lib.api.process] INFO: Successfully resumed <Process 1368 rundll32.exe>
2025-11-20 10:17:01,703 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 10:17:01,708 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\rundll32.exe" with arguments ""C:\vesktop.zip\vesktop\dxcompiler.dll",#1" with pid 2100
2025-11-20 10:17:01,709 [lib.api.process] INFO: Monitor config for <Process 2100 rundll32.exe>: C:\k2ffbmig\dll\2100.ini
2025-11-20 10:17:01,713 [lib.api.process] INFO: 32-bit DLL to inject is C:\k2ffbmig\dll\VGCgjUjb.dll, loader C:\k2ffbmig\bin\oLlatlP.exe
2025-11-20 10:17:01,726 [root] DEBUG: Loader: Injecting process 2100 (thread 2052) with C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:01,727 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:01,728 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:01,731 [lib.api.process] INFO: Injected into 32-bit <Process 2100 rundll32.exe>
2025-11-20 10:17:01,762 [root] DEBUG: 1368: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:01,764 [root] DEBUG: 1368: Disabling sleep skipping.
2025-11-20 10:17:01,765 [root] DEBUG: 1368: Dropped file limit defaulting to 100.
2025-11-20 10:17:01,783 [root] DEBUG: 1368: YaraInit: Compiled 43 rule files
2025-11-20 10:17:01,787 [root] DEBUG: 1368: YaraInit: Compiled rules saved to file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:01,788 [root] DEBUG: 1368: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:01,790 [root] DEBUG: 1368: Monitor initialised: 32-bit capemon loaded in process 1368 at 0x72e90000, thread 2312, image base 0x280000, stack from 0x2673000-0x2680000
2025-11-20 10:17:01,791 [root] DEBUG: 1368: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\d3dcompiler_47.dll",#1
2025-11-20 10:17:01,837 [root] DEBUG: 1368: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress
2025-11-20 10:17:01,842 [root] DEBUG: 1368: hook_api: Warning - CreateProcessA export address 0x76552D70 differs from GetProcAddress -> 0x731F22A0 (AcLayers.DLL::0x222a0)
2025-11-20 10:17:01,842 [root] DEBUG: 1368: hook_api: Warning - CreateProcessW export address 0x765388E0 differs from GetProcAddress -> 0x731F24E0 (AcLayers.DLL::0x224e0)
2025-11-20 10:17:01,843 [root] DEBUG: 1368: hook_api: Warning - WinExec export address 0x7657CF20 differs from GetProcAddress -> 0x731F27A0 (AcLayers.DLL::0x227a0)
2025-11-20 10:17:01,876 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-11-20 10:17:01,876 [root] DEBUG: 1368: set_hooks: Unable to hook GetCommandLineA
2025-11-20 10:17:01,877 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-11-20 10:17:01,878 [root] DEBUG: 1368: set_hooks: Unable to hook GetCommandLineW
2025-11-20 10:17:01,893 [root] DEBUG: 1368: Hooked 625 out of 627 functions
2025-11-20 10:17:01,895 [root] DEBUG: 1368: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:01,902 [root] DEBUG: 1368: RestoreHeaders: Restored original import table.
2025-11-20 10:17:01,903 [root] INFO: Loaded monitor into process with pid 1368
2025-11-20 10:17:01,905 [root] DEBUG: 1368: caller_dispatch: Added region at 0x00280000 to tracked regions list (ntdll::memcpy returns to 0x00285F1A, thread 2312).
2025-11-20 10:17:01,905 [root] DEBUG: 1368: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:01,907 [root] DEBUG: 1368: ProcessImageBase: Main module image at 0x00280000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:01,931 [root] DEBUG: 1368: InstrumentationCallback: Added region at 0x7654274C (base 0x76520000) to tracked regions list (thread 2312).
2025-11-20 10:17:01,932 [root] DEBUG: 1368: ProcessTrackedRegion: Region at 0x76520000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\kernel32.dll is in known range, skipping
2025-11-20 10:17:01,940 [root] DEBUG: 1368: CreateProcessHandler: Injection info set for new process 1012: C:\Windows\system32\rundll32.exe, ImageBase: 0x00000000
2025-11-20 10:17:01,941 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1012
2025-11-20 10:17:01,942 [lib.api.process] INFO: Monitor config for <Process 1012 rundll32.exe>: C:\k2ffbmig\dll\1012.ini
2025-11-20 10:17:01,945 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:01,955 [root] DEBUG: Loader: Injecting process 1012 (thread 3552) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:01,956 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:01,957 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:01,959 [lib.api.process] INFO: Injected into 64-bit <Process 1012 rundll32.exe>
2025-11-20 10:17:01,991 [root] DEBUG: 1368: InstrumentationCallback: Added region at 0x75A163DC (base 0x758D0000) to tracked regions list (thread 2312).
2025-11-20 10:17:01,992 [root] DEBUG: 1368: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping
2025-11-20 10:17:01,993 [root] DEBUG: 1368: WriteMemoryHandler: shellcode at 0x0278DE68 (size 0x11c0) injected into process 1012 at 0xC2A30000.
2025-11-20 10:17:01,996 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\1368_102000341177204112025 to CAPE\3b4049aac941247676ffc6680092e97c6c555ac47e049a6e6fcdbed347ddd476; Size is 4449; Max size: 100000000
2025-11-20 10:17:02,000 [root] DEBUG: 1368: DumpMemory: Payload successfully created: C:\PrCQdMR\CAPE\1368_102000341177204112025 (size 4449 bytes)
2025-11-20 10:17:02,000 [root] DEBUG: 1368: WriteMemoryHandler: Dumped injected code/data from buffer.
2025-11-20 10:17:02,001 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1012
2025-11-20 10:17:02,002 [lib.api.process] INFO: Monitor config for <Process 1012 rundll32.exe>: C:\k2ffbmig\dll\1012.ini
2025-11-20 10:17:02,005 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:02,015 [root] DEBUG: Loader: Injecting process 1012 (thread 3552) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:02,016 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:02,016 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:02,019 [lib.api.process] INFO: Injected into 64-bit <Process 1012 rundll32.exe>
2025-11-20 10:17:02,020 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1012
2025-11-20 10:17:02,020 [lib.api.process] INFO: Monitor config for <Process 1012 rundll32.exe>: C:\k2ffbmig\dll\1012.ini
2025-11-20 10:17:02,023 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:02,032 [root] DEBUG: Loader: Injecting process 1012 (thread 3552) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:02,033 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:02,034 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:02,036 [lib.api.process] INFO: Injected into 64-bit <Process 1012 rundll32.exe>
2025-11-20 10:17:02,037 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1012
2025-11-20 10:17:02,038 [lib.api.process] INFO: Monitor config for <Process 1012 rundll32.exe>: C:\k2ffbmig\dll\1012.ini
2025-11-20 10:17:02,041 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:02,051 [root] DEBUG: Loader: Injecting process 1012 (thread 3552) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:02,052 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:02,053 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:02,055 [lib.api.process] INFO: Injected into 64-bit <Process 1012 rundll32.exe>
2025-11-20 10:17:02,069 [root] DEBUG: 1012: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:02,070 [root] DEBUG: 1012: Dropped file limit defaulting to 100.
2025-11-20 10:17:02,074 [root] DEBUG: 1012: Disabling sleep skipping.
2025-11-20 10:17:02,077 [root] DEBUG: 1012: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:02,101 [root] DEBUG: 1012: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0
2025-11-20 10:17:02,102 [root] DEBUG: 1012: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:02,104 [root] DEBUG: 1012: Monitor initialised: 64-bit capemon loaded in process 1012 at 0x00007FFEB9130000, thread 3552, image base 0x00007FF6C1D60000, stack from 0x0000007951CB4000-0x0000007951CC0000
2025-11-20 10:17:02,105 [root] DEBUG: 1012: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\d3dcompiler_47.dll",#1
2025-11-20 10:17:02,115 [root] DEBUG: 1012: hook_api: LdrpCallInitRoutine export address 0x00007FFEE34899BC obtained via GetFunctionAddress
2025-11-20 10:17:02,167 [root] WARNING: b'Unable to place hook on LockResource'
2025-11-20 10:17:02,168 [root] DEBUG: 1012: set_hooks: Unable to hook LockResource
2025-11-20 10:17:02,180 [root] DEBUG: 1012: Hooked 619 out of 620 functions
2025-11-20 10:17:02,183 [root] DEBUG: 1012: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:02,193 [root] DEBUG: 1012: RestoreHeaders: Restored original import table.
2025-11-20 10:17:02,194 [root] INFO: Loaded monitor into process with pid 1012
2025-11-20 10:17:02,196 [root] DEBUG: 1012: caller_dispatch: Added region at 0x00007FF6C1D60000 to tracked regions list (msvcrt::memcpy returns to 0x00007FF6C1D6660E, thread 3552).
2025-11-20 10:17:02,197 [root] DEBUG: 1012: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:02,199 [root] DEBUG: 1012: ProcessImageBase: Main module image at 0x00007FF6C1D60000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:02,254 [root] DEBUG: 1012: Target DLL loaded at 0x00007FFEC3E40000: C:\vesktop.zip\vesktop\d3dcompiler_47 (0x48d000 bytes).
2025-11-20 10:17:02,255 [root] DEBUG: 1012: YaraScan: Scanning 0x00007FFEC3E40000, size 0x48ca4f
2025-11-20 10:17:02,343 [root] DEBUG: 1012: caller_dispatch: Added region at 0x00007FFEC3E40000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00007FFEC3F9F13B, thread 3552).
2025-11-20 10:17:02,344 [root] DEBUG: 1012: caller_dispatch: Scanning calling region at 0x00007FFEC3E40000...
2025-11-20 10:17:02,352 [root] DEBUG: 1012: DLL loaded at 0x00007FFEDE5B0000: C:\Windows\system32\uxtheme (0x9e000 bytes).
2025-11-20 10:17:02,365 [root] DEBUG: 1012: DLL loaded at 0x00007FFEE21A0000: C:\Windows\System32\MSCTF (0x114000 bytes).
2025-11-20 10:17:02,378 [root] DEBUG: 1012: Target DLL unloading from 0x00007FFEC3E40000: code modification detected, dumping.
2025-11-20 10:17:02,379 [root] DEBUG: 1012: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2025-11-20 10:17:02,380 [root] DEBUG: 1012: DumpProcess: Instantiating PeParser with address: 0x00007FFEC3E40000.
2025-11-20 10:17:02,381 [root] DEBUG: 1012: DumpProcess: Module entry point VA is 0x000000000016CD60.
2025-11-20 10:17:02,439 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\1012_53137402177204112025 to procdump\564f7d68356ae7d3fa689608b4f0474632e3078727761a5363edfdc00423e398; Size is 4755456; Max size: 100000000
2025-11-20 10:17:02,510 [root] DEBUG: 1012: DumpProcess: Module image dump success - dump size 0x489000.
2025-11-20 10:17:02,533 [root] INFO: Process with pid 1012 has terminated
2025-11-20 10:17:02,542 [root] DEBUG: 1368: NtTerminateProcess hook: Attempting to dump process 1368
2025-11-20 10:17:02,543 [root] DEBUG: 1368: DoProcessDump: Skipping process dump as code is identical on disk.
2025-11-20 10:17:02,553 [root] INFO: Process with pid 1368 has terminated
2025-11-20 10:17:03,744 [lib.api.process] INFO: Successfully resumed <Process 2100 rundll32.exe>
2025-11-20 10:17:03,746 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 10:17:03,751 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\rundll32.exe" with arguments ""C:\vesktop.zip\vesktop\dxil.dll",#1" with pid 2964
2025-11-20 10:17:03,752 [lib.api.process] INFO: Monitor config for <Process 2964 rundll32.exe>: C:\k2ffbmig\dll\2964.ini
2025-11-20 10:17:03,758 [lib.api.process] INFO: 32-bit DLL to inject is C:\k2ffbmig\dll\VGCgjUjb.dll, loader C:\k2ffbmig\bin\oLlatlP.exe
2025-11-20 10:17:03,768 [root] DEBUG: 2100: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:03,769 [root] DEBUG: 2100: Disabling sleep skipping.
2025-11-20 10:17:03,770 [root] DEBUG: 2100: Dropped file limit defaulting to 100.
2025-11-20 10:17:03,771 [root] DEBUG: Loader: Injecting process 2964 (thread 3736) with C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:03,772 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:03,773 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:03,776 [root] DEBUG: 2100: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:03,777 [root] DEBUG: 2100: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:03,778 [lib.api.process] INFO: Injected into 32-bit <Process 2964 rundll32.exe>
2025-11-20 10:17:03,779 [root] DEBUG: 2100: Monitor initialised: 32-bit capemon loaded in process 2100 at 0x72e90000, thread 2052, image base 0x280000, stack from 0x2354000-0x2360000
2025-11-20 10:17:03,780 [root] DEBUG: 2100: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\dxcompiler.dll",#1
2025-11-20 10:17:03,809 [root] DEBUG: 2100: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress
2025-11-20 10:17:03,813 [root] DEBUG: 2100: hook_api: Warning - CreateProcessA export address 0x76552D70 differs from GetProcAddress -> 0x731F22A0 (AcLayers.DLL::0x222a0)
2025-11-20 10:17:03,814 [root] DEBUG: 2100: hook_api: Warning - CreateProcessW export address 0x765388E0 differs from GetProcAddress -> 0x731F24E0 (AcLayers.DLL::0x224e0)
2025-11-20 10:17:03,815 [root] DEBUG: 2100: hook_api: Warning - WinExec export address 0x7657CF20 differs from GetProcAddress -> 0x731F27A0 (AcLayers.DLL::0x227a0)
2025-11-20 10:17:03,844 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-11-20 10:17:03,846 [root] DEBUG: 2100: set_hooks: Unable to hook GetCommandLineA
2025-11-20 10:17:03,847 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-11-20 10:17:03,848 [root] DEBUG: 2100: set_hooks: Unable to hook GetCommandLineW
2025-11-20 10:17:03,858 [root] DEBUG: 2100: Hooked 625 out of 627 functions
2025-11-20 10:17:03,860 [root] DEBUG: 2100: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:03,865 [root] DEBUG: 2100: RestoreHeaders: Restored original import table.
2025-11-20 10:17:03,866 [root] INFO: Loaded monitor into process with pid 2100
2025-11-20 10:17:03,868 [root] DEBUG: 2100: caller_dispatch: Added region at 0x00280000 to tracked regions list (ntdll::memcpy returns to 0x00285F1A, thread 2052).
2025-11-20 10:17:03,868 [root] DEBUG: 2100: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:03,871 [root] DEBUG: 2100: ProcessImageBase: Main module image at 0x00280000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:03,894 [root] DEBUG: 2100: InstrumentationCallback: Added region at 0x7654274C (base 0x76520000) to tracked regions list (thread 2052).
2025-11-20 10:17:03,895 [root] DEBUG: 2100: ProcessTrackedRegion: Region at 0x76520000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\kernel32.dll is in known range, skipping
2025-11-20 10:17:03,902 [root] DEBUG: 2100: CreateProcessHandler: Injection info set for new process 1616: C:\Windows\system32\rundll32.exe, ImageBase: 0x00000000
2025-11-20 10:17:03,903 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1616
2025-11-20 10:17:03,904 [lib.api.process] INFO: Monitor config for <Process 1616 rundll32.exe>: C:\k2ffbmig\dll\1616.ini
2025-11-20 10:17:03,911 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:03,921 [root] DEBUG: Loader: Injecting process 1616 (thread 2452) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:03,922 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:03,923 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:03,925 [lib.api.process] INFO: Injected into 64-bit <Process 1616 rundll32.exe>
2025-11-20 10:17:03,944 [root] DEBUG: 2100: InstrumentationCallback: Added region at 0x75A163DC (base 0x758D0000) to tracked regions list (thread 2052).
2025-11-20 10:17:03,944 [root] DEBUG: 2100: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping
2025-11-20 10:17:03,945 [root] DEBUG: 2100: WriteMemoryHandler: shellcode at 0x027DBA68 (size 0x11c0) injected into process 1616 at 0xF9B80000.
2025-11-20 10:17:03,949 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\2100_169823713177204112025 to CAPE\28e614599ad787145b797d9bac7de992a2950d1a2d798de2f532701c8a343568; Size is 4449; Max size: 100000000
2025-11-20 10:17:03,966 [root] DEBUG: 2100: DumpMemory: Payload successfully created: C:\PrCQdMR\CAPE\2100_169823713177204112025 (size 4449 bytes)
2025-11-20 10:17:03,967 [root] DEBUG: 2100: WriteMemoryHandler: Dumped injected code/data from buffer.
2025-11-20 10:17:03,968 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1616
2025-11-20 10:17:03,968 [lib.api.process] INFO: Monitor config for <Process 1616 rundll32.exe>: C:\k2ffbmig\dll\1616.ini
2025-11-20 10:17:03,973 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:03,984 [root] DEBUG: Loader: Injecting process 1616 (thread 2452) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:03,985 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:03,986 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:03,989 [lib.api.process] INFO: Injected into 64-bit <Process 1616 rundll32.exe>
2025-11-20 10:17:03,991 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1616
2025-11-20 10:17:03,991 [lib.api.process] INFO: Monitor config for <Process 1616 rundll32.exe>: C:\k2ffbmig\dll\1616.ini
2025-11-20 10:17:03,996 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:04,005 [root] DEBUG: Loader: Injecting process 1616 (thread 2452) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:04,006 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:04,007 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:04,010 [lib.api.process] INFO: Injected into 64-bit <Process 1616 rundll32.exe>
2025-11-20 10:17:04,012 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1616
2025-11-20 10:17:04,013 [lib.api.process] INFO: Monitor config for <Process 1616 rundll32.exe>: C:\k2ffbmig\dll\1616.ini
2025-11-20 10:17:04,017 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:04,027 [root] DEBUG: Loader: Injecting process 1616 (thread 2452) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:04,027 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:04,028 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:04,030 [lib.api.process] INFO: Injected into 64-bit <Process 1616 rundll32.exe>
2025-11-20 10:17:04,045 [root] DEBUG: 1616: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:04,046 [root] DEBUG: 1616: Dropped file limit defaulting to 100.
2025-11-20 10:17:04,050 [root] DEBUG: 1616: Disabling sleep skipping.
2025-11-20 10:17:04,053 [root] DEBUG: 1616: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:04,077 [root] DEBUG: 1616: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0
2025-11-20 10:17:04,078 [root] DEBUG: 1616: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:04,080 [root] DEBUG: 1616: Monitor initialised: 64-bit capemon loaded in process 1616 at 0x00007FFEB9130000, thread 2452, image base 0x00007FF6C1D60000, stack from 0x000000B7138A4000-0x000000B7138B0000
2025-11-20 10:17:04,081 [root] DEBUG: 1616: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\dxcompiler.dll",#1
2025-11-20 10:17:04,097 [root] DEBUG: 1616: hook_api: LdrpCallInitRoutine export address 0x00007FFEE34899BC obtained via GetFunctionAddress
2025-11-20 10:17:04,158 [root] WARNING: b'Unable to place hook on LockResource'
2025-11-20 10:17:04,159 [root] DEBUG: 1616: set_hooks: Unable to hook LockResource
2025-11-20 10:17:04,171 [root] DEBUG: 1616: Hooked 619 out of 620 functions
2025-11-20 10:17:04,174 [root] DEBUG: 1616: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:04,182 [root] DEBUG: 1616: RestoreHeaders: Restored original import table.
2025-11-20 10:17:04,182 [root] INFO: Loaded monitor into process with pid 1616
2025-11-20 10:17:04,184 [root] DEBUG: 1616: caller_dispatch: Added region at 0x00007FF6C1D60000 to tracked regions list (kernel32::SetUnhandledExceptionFilter returns to 0x00007FF6C1D66D01, thread 2452).
2025-11-20 10:17:04,185 [root] DEBUG: 1616: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:04,188 [root] DEBUG: 1616: ProcessImageBase: Main module image at 0x00007FF6C1D60000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:04,203 [root] DEBUG: 1616: Target DLL loaded at 0x00007FFEC29E0000: C:\vesktop.zip\vesktop\dxcompiler (0x18ea000 bytes).
2025-11-20 10:17:04,213 [root] DEBUG: 1616: YaraScan: Scanning 0x00007FFEC29E0000, size 0x18e9d28
2025-11-20 10:17:04,682 [root] DEBUG: 1616: caller_dispatch: Added region at 0x00007FFEC29E0000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00007FFEC3E18B03, thread 2452).
2025-11-20 10:17:04,684 [root] DEBUG: 1616: caller_dispatch: Scanning calling region at 0x00007FFEC29E0000...
2025-11-20 10:17:04,691 [root] DEBUG: 1616: DLL loaded at 0x00007FFEDE5B0000: C:\Windows\system32\uxtheme (0x9e000 bytes).
2025-11-20 10:17:04,696 [root] DEBUG: 1616: DLL loaded at 0x00007FFEE21A0000: C:\Windows\System32\MSCTF (0x114000 bytes).
2025-11-20 10:17:05,252 [root] INFO: Process with pid 1616 has terminated
2025-11-20 10:17:05,253 [root] DEBUG: 1616: NtTerminateProcess hook: Attempting to dump process 1616
2025-11-20 10:17:05,255 [root] DEBUG: 1616: DoProcessDump: Code modification detected, dumping Imagebase at 0x00007FFEC29E0000.
2025-11-20 10:17:05,256 [root] DEBUG: 1616: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2025-11-20 10:17:05,257 [root] DEBUG: 1616: DumpProcess: Instantiating PeParser with address: 0x00007FFEC29E0000.
2025-11-20 10:17:05,258 [root] DEBUG: 1616: DumpProcess: Module entry point VA is 0x00000000013FEDD0.
2025-11-20 10:17:05,688 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\1616_74171055177204112025 to procdump\a9208d3aac82022b18aec719c720ea9d505d6079d2d6d258be8b0761a8610c22; Size is 26096640; Max size: 100000000
2025-11-20 10:17:05,803 [lib.api.process] INFO: Successfully resumed <Process 2964 rundll32.exe>
2025-11-20 10:17:05,811 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 10:17:05,822 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\rundll32.exe" with arguments ""C:\vesktop.zip\vesktop\ffmpeg.dll",#1" with pid 3148
2025-11-20 10:17:05,823 [lib.api.process] INFO: Monitor config for <Process 3148 rundll32.exe>: C:\k2ffbmig\dll\3148.ini
2025-11-20 10:17:05,864 [lib.api.process] INFO: 32-bit DLL to inject is C:\k2ffbmig\dll\VGCgjUjb.dll, loader C:\k2ffbmig\bin\oLlatlP.exe
2025-11-20 10:17:05,873 [root] DEBUG: 1616: DumpProcess: Module image dump success - dump size 0x18e3400.
2025-11-20 10:17:05,874 [root] DEBUG: 2964: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:05,876 [root] DEBUG: 2964: Dropped file limit defaulting to 100.
2025-11-20 10:17:05,881 [root] DEBUG: 2964: Disabling sleep skipping.
2025-11-20 10:17:05,884 [root] DEBUG: Loader: Injecting process 3148 (thread 3096) with C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:05,886 [root] DEBUG: 2964: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:05,887 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:05,888 [root] DEBUG: 2964: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:05,889 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:05,893 [root] DEBUG: 2964: Monitor initialised: 32-bit capemon loaded in process 2964 at 0x72e90000, thread 3736, image base 0x280000, stack from 0x23c4000-0x23d0000
2025-11-20 10:17:05,895 [root] DEBUG: 2964: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\dxil.dll",#1
2025-11-20 10:17:05,896 [lib.api.process] INFO: Injected into 32-bit <Process 3148 rundll32.exe>
2025-11-20 10:17:05,913 [root] DEBUG: 2100: NtTerminateProcess hook: Attempting to dump process 2100
2025-11-20 10:17:05,915 [root] DEBUG: 2100: DoProcessDump: Skipping process dump as code is identical on disk.
2025-11-20 10:17:05,923 [root] INFO: Process with pid 2100 has terminated
2025-11-20 10:17:05,931 [root] DEBUG: 2964: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress
2025-11-20 10:17:05,934 [root] DEBUG: 2964: hook_api: Warning - CreateProcessA export address 0x76552D70 differs from GetProcAddress -> 0x731F22A0 (AcLayers.DLL::0x222a0)
2025-11-20 10:17:05,935 [root] DEBUG: 2964: hook_api: Warning - CreateProcessW export address 0x765388E0 differs from GetProcAddress -> 0x731F24E0 (AcLayers.DLL::0x224e0)
2025-11-20 10:17:05,936 [root] DEBUG: 2964: hook_api: Warning - WinExec export address 0x7657CF20 differs from GetProcAddress -> 0x731F27A0 (AcLayers.DLL::0x227a0)
2025-11-20 10:17:05,965 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-11-20 10:17:05,966 [root] DEBUG: 2964: set_hooks: Unable to hook GetCommandLineA
2025-11-20 10:17:05,967 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-11-20 10:17:05,969 [root] DEBUG: 2964: set_hooks: Unable to hook GetCommandLineW
2025-11-20 10:17:05,979 [root] DEBUG: 2964: Hooked 625 out of 627 functions
2025-11-20 10:17:05,981 [root] DEBUG: 2964: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:05,986 [root] DEBUG: 2964: RestoreHeaders: Restored original import table.
2025-11-20 10:17:05,987 [root] INFO: Loaded monitor into process with pid 2964
2025-11-20 10:17:05,989 [root] DEBUG: 2964: caller_dispatch: Added region at 0x00280000 to tracked regions list (ntdll::memcpy returns to 0x00285F1A, thread 3736).
2025-11-20 10:17:05,990 [root] DEBUG: 2964: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:05,993 [root] DEBUG: 2964: ProcessImageBase: Main module image at 0x00280000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:06,013 [root] DEBUG: 2964: InstrumentationCallback: Added region at 0x7654274C (base 0x76520000) to tracked regions list (thread 3736).
2025-11-20 10:17:06,015 [root] DEBUG: 2964: ProcessTrackedRegion: Region at 0x76520000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\kernel32.dll is in known range, skipping
2025-11-20 10:17:06,022 [root] DEBUG: 2964: CreateProcessHandler: Injection info set for new process 1684: C:\Windows\system32\rundll32.exe, ImageBase: 0x00000000
2025-11-20 10:17:06,024 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1684
2025-11-20 10:17:06,025 [lib.api.process] INFO: Monitor config for <Process 1684 rundll32.exe>: C:\k2ffbmig\dll\1684.ini
2025-11-20 10:17:06,034 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:06,044 [root] DEBUG: Loader: Injecting process 1684 (thread 1632) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:06,045 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:06,047 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:06,049 [lib.api.process] INFO: Injected into 64-bit <Process 1684 rundll32.exe>
2025-11-20 10:17:06,067 [root] DEBUG: 2964: InstrumentationCallback: Added region at 0x75A163DC (base 0x758D0000) to tracked regions list (thread 3736).
2025-11-20 10:17:06,068 [root] DEBUG: 2964: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping
2025-11-20 10:17:06,069 [root] DEBUG: 2964: WriteMemoryHandler: shellcode at 0x0268CAF8 (size 0x11c0) injected into process 1684 at 0xAB6C0000.
2025-11-20 10:17:06,074 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\2964_16178286177204112025 to CAPE\b6259a5d399583a41ac7af9ddcec28e883e755634a805b4a71bf25977990d7b5; Size is 4449; Max size: 100000000
2025-11-20 10:17:06,078 [root] DEBUG: 2964: DumpMemory: Payload successfully created: C:\PrCQdMR\CAPE\2964_16178286177204112025 (size 4449 bytes)
2025-11-20 10:17:06,079 [root] DEBUG: 2964: WriteMemoryHandler: Dumped injected code/data from buffer.
2025-11-20 10:17:06,080 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1684
2025-11-20 10:17:06,081 [lib.api.process] INFO: Monitor config for <Process 1684 rundll32.exe>: C:\k2ffbmig\dll\1684.ini
2025-11-20 10:17:06,088 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:06,099 [root] DEBUG: Loader: Injecting process 1684 (thread 1632) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:06,100 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:06,101 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:06,104 [lib.api.process] INFO: Injected into 64-bit <Process 1684 rundll32.exe>
2025-11-20 10:17:06,105 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1684
2025-11-20 10:17:06,107 [lib.api.process] INFO: Monitor config for <Process 1684 rundll32.exe>: C:\k2ffbmig\dll\1684.ini
2025-11-20 10:17:06,113 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:06,123 [root] DEBUG: Loader: Injecting process 1684 (thread 1632) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:06,124 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:06,125 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:06,127 [lib.api.process] INFO: Injected into 64-bit <Process 1684 rundll32.exe>
2025-11-20 10:17:06,129 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 1684
2025-11-20 10:17:06,130 [lib.api.process] INFO: Monitor config for <Process 1684 rundll32.exe>: C:\k2ffbmig\dll\1684.ini
2025-11-20 10:17:06,137 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:06,146 [root] DEBUG: Loader: Injecting process 1684 (thread 1632) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:06,148 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:06,149 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:06,153 [lib.api.process] INFO: Injected into 64-bit <Process 1684 rundll32.exe>
2025-11-20 10:17:06,167 [root] DEBUG: 1684: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:06,168 [root] DEBUG: 1684: Dropped file limit defaulting to 100.
2025-11-20 10:17:06,172 [root] DEBUG: 1684: Disabling sleep skipping.
2025-11-20 10:17:06,174 [root] DEBUG: 1684: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:06,198 [root] DEBUG: 1684: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0
2025-11-20 10:17:06,199 [root] DEBUG: 1684: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:06,203 [root] DEBUG: 1684: Monitor initialised: 64-bit capemon loaded in process 1684 at 0x00007FFEB9130000, thread 1632, image base 0x00007FF6C1D60000, stack from 0x0000004DC3704000-0x0000004DC3710000
2025-11-20 10:17:06,204 [root] DEBUG: 1684: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\dxil.dll",#1
2025-11-20 10:17:06,215 [root] DEBUG: 1684: hook_api: LdrpCallInitRoutine export address 0x00007FFEE34899BC obtained via GetFunctionAddress
2025-11-20 10:17:06,275 [root] WARNING: b'Unable to place hook on LockResource'
2025-11-20 10:17:06,276 [root] DEBUG: 1684: set_hooks: Unable to hook LockResource
2025-11-20 10:17:06,287 [root] DEBUG: 1684: Hooked 619 out of 620 functions
2025-11-20 10:17:06,291 [root] DEBUG: 1684: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:06,299 [root] DEBUG: 1684: RestoreHeaders: Restored original import table.
2025-11-20 10:17:06,301 [root] INFO: Loaded monitor into process with pid 1684
2025-11-20 10:17:06,302 [root] DEBUG: 1684: caller_dispatch: Added region at 0x00007FF6C1D60000 to tracked regions list (kernel32::SetUnhandledExceptionFilter returns to 0x00007FF6C1D66D01, thread 1632).
2025-11-20 10:17:06,304 [root] DEBUG: 1684: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:06,307 [root] DEBUG: 1684: ProcessImageBase: Main module image at 0x00007FF6C1D60000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:06,321 [root] DEBUG: 1684: Target DLL loaded at 0x00007FFED4010000: C:\vesktop.zip\vesktop\dxil (0x173000 bytes).
2025-11-20 10:17:06,322 [root] DEBUG: 1684: YaraScan: Scanning 0x00007FFED4010000, size 0x172c30
2025-11-20 10:17:06,350 [root] DEBUG: 1684: caller_dispatch: Added region at 0x00007FFED4010000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00007FFED4110DA6, thread 1632).
2025-11-20 10:17:06,351 [root] DEBUG: 1684: caller_dispatch: Scanning calling region at 0x00007FFED4010000...
2025-11-20 10:17:06,357 [root] DEBUG: 1684: DLL loaded at 0x00007FFEDE5B0000: C:\Windows\system32\uxtheme (0x9e000 bytes).
2025-11-20 10:17:06,362 [root] DEBUG: 1684: DLL loaded at 0x00007FFEE21A0000: C:\Windows\System32\MSCTF (0x114000 bytes).
2025-11-20 10:17:06,738 [root] INFO: Process with pid 1684 has terminated
2025-11-20 10:17:06,739 [root] DEBUG: 1684: NtTerminateProcess hook: Attempting to dump process 1684
2025-11-20 10:17:06,740 [root] DEBUG: 1684: DoProcessDump: Code modification detected, dumping Imagebase at 0x00007FFED4010000.
2025-11-20 10:17:06,742 [root] DEBUG: 1684: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2025-11-20 10:17:06,743 [root] DEBUG: 1684: DumpProcess: Instantiating PeParser with address: 0x00007FFED4010000.
2025-11-20 10:17:06,744 [root] DEBUG: 1684: DumpProcess: Module entry point VA is 0x00000000001095B0.
2025-11-20 10:17:06,766 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\1684_193475106177204112025 to procdump\82ffd48fba15e4a4596074e04a54177a760dd26b6cb0e6f96e81847ded80306a; Size is 1502720; Max size: 100000000
2025-11-20 10:17:06,780 [root] DEBUG: 1684: DumpProcess: Module image dump success - dump size 0x16ee00.
2025-11-20 10:17:06,797 [root] DEBUG: 2964: NtTerminateProcess hook: Attempting to dump process 2964
2025-11-20 10:17:06,799 [root] DEBUG: 2964: DoProcessDump: Skipping process dump as code is identical on disk.
2025-11-20 10:17:06,808 [root] INFO: Process with pid 2964 has terminated
2025-11-20 10:17:07,901 [lib.api.process] INFO: Successfully resumed <Process 3148 rundll32.exe>
2025-11-20 10:17:07,915 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 10:17:07,920 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\rundll32.exe" with arguments ""C:\vesktop.zip\vesktop\icudtl.dat",#1" with pid 4184
2025-11-20 10:17:07,922 [lib.api.process] INFO: Monitor config for <Process 4184 rundll32.exe>: C:\k2ffbmig\dll\4184.ini
2025-11-20 10:17:07,928 [root] DEBUG: 3148: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:07,930 [root] DEBUG: 3148: Dropped file limit defaulting to 100.
2025-11-20 10:17:07,934 [root] DEBUG: 3148: Disabling sleep skipping.
2025-11-20 10:17:07,937 [root] DEBUG: 3148: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:07,938 [lib.api.process] INFO: 32-bit DLL to inject is C:\k2ffbmig\dll\VGCgjUjb.dll, loader C:\k2ffbmig\bin\oLlatlP.exe
2025-11-20 10:17:07,939 [root] DEBUG: 3148: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:07,942 [root] DEBUG: 3148: Monitor initialised: 32-bit capemon loaded in process 3148 at 0x72e90000, thread 3096, image base 0x280000, stack from 0x2d34000-0x2d40000
2025-11-20 10:17:07,943 [root] DEBUG: 3148: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\ffmpeg.dll",#1
2025-11-20 10:17:07,951 [root] DEBUG: Loader: Injecting process 4184 (thread 4188) with C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:07,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:07,954 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:07,959 [lib.api.process] INFO: Injected into 32-bit <Process 4184 rundll32.exe>
2025-11-20 10:17:07,976 [root] DEBUG: 3148: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress
2025-11-20 10:17:07,980 [root] DEBUG: 3148: hook_api: Warning - CreateProcessA export address 0x76552D70 differs from GetProcAddress -> 0x731F22A0 (AcLayers.DLL::0x222a0)
2025-11-20 10:17:07,981 [root] DEBUG: 3148: hook_api: Warning - CreateProcessW export address 0x765388E0 differs from GetProcAddress -> 0x731F24E0 (AcLayers.DLL::0x224e0)
2025-11-20 10:17:07,983 [root] DEBUG: 3148: hook_api: Warning - WinExec export address 0x7657CF20 differs from GetProcAddress -> 0x731F27A0 (AcLayers.DLL::0x227a0)
2025-11-20 10:17:08,014 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-11-20 10:17:08,017 [root] DEBUG: 3148: set_hooks: Unable to hook GetCommandLineA
2025-11-20 10:17:08,018 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-11-20 10:17:08,019 [root] DEBUG: 3148: set_hooks: Unable to hook GetCommandLineW
2025-11-20 10:17:08,030 [root] DEBUG: 3148: Hooked 625 out of 627 functions
2025-11-20 10:17:08,032 [root] DEBUG: 3148: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:08,037 [root] DEBUG: 3148: RestoreHeaders: Restored original import table.
2025-11-20 10:17:08,038 [root] INFO: Loaded monitor into process with pid 3148
2025-11-20 10:17:08,041 [root] DEBUG: 3148: caller_dispatch: Added region at 0x00280000 to tracked regions list (ntdll::memcpy returns to 0x00285F1A, thread 3096).
2025-11-20 10:17:08,043 [root] DEBUG: 3148: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:08,047 [root] DEBUG: 3148: ProcessImageBase: Main module image at 0x00280000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:08,070 [root] DEBUG: 3148: InstrumentationCallback: Added region at 0x7654274C (base 0x76520000) to tracked regions list (thread 3096).
2025-11-20 10:17:08,071 [root] DEBUG: 3148: ProcessTrackedRegion: Region at 0x76520000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\kernel32.dll is in known range, skipping
2025-11-20 10:17:08,078 [root] DEBUG: 3148: CreateProcessHandler: Injection info set for new process 4356: C:\Windows\system32\rundll32.exe, ImageBase: 0x00000000
2025-11-20 10:17:08,079 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 4356
2025-11-20 10:17:08,080 [lib.api.process] INFO: Monitor config for <Process 4356 rundll32.exe>: C:\k2ffbmig\dll\4356.ini
2025-11-20 10:17:08,089 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:08,100 [root] DEBUG: Loader: Injecting process 4356 (thread 4360) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:08,102 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:08,104 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:08,107 [lib.api.process] INFO: Injected into 64-bit <Process 4356 rundll32.exe>
2025-11-20 10:17:08,127 [root] DEBUG: 3148: InstrumentationCallback: Added region at 0x75A163DC (base 0x758D0000) to tracked regions list (thread 3096).
2025-11-20 10:17:08,128 [root] DEBUG: 3148: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping
2025-11-20 10:17:08,130 [root] DEBUG: 3148: WriteMemoryHandler: shellcode at 0x0326BA78 (size 0x11c0) injected into process 4356 at 0xEE9E0000.
2025-11-20 10:17:08,134 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\3148_1404208177204112025 to CAPE\0ad642e10c33385cfab3caf2833d9e0958886fffe8a6a2da724d13dc8b800f84; Size is 4449; Max size: 100000000
2025-11-20 10:17:08,141 [root] DEBUG: 3148: DumpMemory: Payload successfully created: C:\PrCQdMR\CAPE\3148_1404208177204112025 (size 4449 bytes)
2025-11-20 10:17:08,143 [root] DEBUG: 3148: WriteMemoryHandler: Dumped injected code/data from buffer.
2025-11-20 10:17:08,144 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 4356
2025-11-20 10:17:08,146 [lib.api.process] INFO: Monitor config for <Process 4356 rundll32.exe>: C:\k2ffbmig\dll\4356.ini
2025-11-20 10:17:08,154 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:08,166 [root] DEBUG: Loader: Injecting process 4356 (thread 4360) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:08,169 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:08,171 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:08,174 [lib.api.process] INFO: Injected into 64-bit <Process 4356 rundll32.exe>
2025-11-20 10:17:08,176 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 4356
2025-11-20 10:17:08,177 [lib.api.process] INFO: Monitor config for <Process 4356 rundll32.exe>: C:\k2ffbmig\dll\4356.ini
2025-11-20 10:17:08,185 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:08,197 [root] DEBUG: Loader: Injecting process 4356 (thread 4360) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:08,199 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:08,200 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:08,204 [lib.api.process] INFO: Injected into 64-bit <Process 4356 rundll32.exe>
2025-11-20 10:17:08,205 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 4356
2025-11-20 10:17:08,207 [lib.api.process] INFO: Monitor config for <Process 4356 rundll32.exe>: C:\k2ffbmig\dll\4356.ini
2025-11-20 10:17:08,217 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:08,232 [root] DEBUG: Loader: Injecting process 4356 (thread 4360) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:08,234 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:08,235 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:08,239 [lib.api.process] INFO: Injected into 64-bit <Process 4356 rundll32.exe>
2025-11-20 10:17:08,252 [root] DEBUG: 4356: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:08,254 [root] DEBUG: 4356: Dropped file limit defaulting to 100.
2025-11-20 10:17:08,259 [root] DEBUG: 4356: Disabling sleep skipping.
2025-11-20 10:17:08,261 [root] DEBUG: 4356: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:08,286 [root] DEBUG: 4356: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0
2025-11-20 10:17:08,288 [root] DEBUG: 4356: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:08,291 [root] DEBUG: 4356: Monitor initialised: 64-bit capemon loaded in process 4356 at 0x00007FFEB9130000, thread 4360, image base 0x00007FF6C1D60000, stack from 0x000000CA15D54000-0x000000CA15D60000
2025-11-20 10:17:08,293 [root] DEBUG: 4356: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\ffmpeg.dll",#1
2025-11-20 10:17:08,304 [root] DEBUG: 4356: hook_api: LdrpCallInitRoutine export address 0x00007FFEE34899BC obtained via GetFunctionAddress
2025-11-20 10:17:08,365 [root] WARNING: b'Unable to place hook on LockResource'
2025-11-20 10:17:08,367 [root] DEBUG: 4356: set_hooks: Unable to hook LockResource
2025-11-20 10:17:08,379 [root] DEBUG: 4356: Hooked 619 out of 620 functions
2025-11-20 10:17:08,381 [root] DEBUG: 4356: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:08,390 [root] DEBUG: 4356: RestoreHeaders: Restored original import table.
2025-11-20 10:17:08,391 [root] INFO: Loaded monitor into process with pid 4356
2025-11-20 10:17:08,393 [root] DEBUG: 4356: caller_dispatch: Added region at 0x00007FF6C1D60000 to tracked regions list (kernel32::SetUnhandledExceptionFilter returns to 0x00007FF6C1D66D01, thread 4360).
2025-11-20 10:17:08,395 [root] DEBUG: 4356: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:08,398 [root] DEBUG: 4356: ProcessImageBase: Main module image at 0x00007FF6C1D60000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:08,412 [root] DEBUG: 4356: Target DLL loaded at 0x00007FFEC3F00000: C:\vesktop.zip\vesktop\ffmpeg (0x3cf000 bytes).
2025-11-20 10:17:08,414 [root] DEBUG: 4356: YaraScan: Scanning 0x00007FFEC3F00000, size 0x3ce674
2025-11-20 10:17:08,489 [root] DEBUG: 4356: caller_dispatch: Added region at 0x00007FFEC3F00000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00007FFEC3FE867B, thread 4360).
2025-11-20 10:17:08,491 [root] DEBUG: 4356: caller_dispatch: Scanning calling region at 0x00007FFEC3F00000...
2025-11-20 10:17:08,499 [root] DEBUG: 4356: DLL loaded at 0x00007FFEDE5B0000: C:\Windows\system32\uxtheme (0x9e000 bytes).
2025-11-20 10:17:08,504 [root] DEBUG: 4356: DLL loaded at 0x00007FFEE21A0000: C:\Windows\System32\MSCTF (0x114000 bytes).
2025-11-20 10:17:08,514 [root] DEBUG: 4356: Target DLL unloading from 0x00007FFEC3F00000: code modification detected, dumping.
2025-11-20 10:17:08,516 [root] DEBUG: 4356: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2025-11-20 10:17:08,518 [root] DEBUG: 4356: DumpProcess: Instantiating PeParser with address: 0x00007FFEC3F00000.
2025-11-20 10:17:08,520 [root] DEBUG: 4356: DumpProcess: Module entry point VA is 0x00000000000BA680.
2025-11-20 10:17:08,571 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\4356_169758758177204112025 to procdump\6313a69e16fb0f579ce178a2bd66d1e3ed23e1b983ee0a7f4bf0557539341a47; Size is 3963904; Max size: 100000000
2025-11-20 10:17:08,613 [root] DEBUG: 4356: DumpProcess: Module image dump success - dump size 0x3c7c00.
2025-11-20 10:17:08,622 [root] INFO: Process with pid 4356 has terminated
2025-11-20 10:17:08,630 [root] DEBUG: 3148: NtTerminateProcess hook: Attempting to dump process 3148
2025-11-20 10:17:08,631 [root] DEBUG: 3148: DoProcessDump: Skipping process dump as code is identical on disk.
2025-11-20 10:17:08,644 [root] INFO: Process with pid 3148 has terminated
2025-11-20 10:17:09,971 [lib.api.process] INFO: Successfully resumed <Process 4184 rundll32.exe>
2025-11-20 10:17:09,976 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 10:17:09,986 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\rundll32.exe" with arguments ""C:\vesktop.zip\vesktop\libEGL.dll",#1" with pid 4716
2025-11-20 10:17:09,989 [lib.api.process] INFO: Monitor config for <Process 4716 rundll32.exe>: C:\k2ffbmig\dll\4716.ini
2025-11-20 10:17:10,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\k2ffbmig\dll\VGCgjUjb.dll, loader C:\k2ffbmig\bin\oLlatlP.exe
2025-11-20 10:17:10,005 [root] DEBUG: 4184: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:10,007 [root] DEBUG: 4184: Dropped file limit defaulting to 100.
2025-11-20 10:17:10,015 [root] DEBUG: 4184: Disabling sleep skipping.
2025-11-20 10:17:10,019 [root] DEBUG: 4184: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:10,022 [root] DEBUG: 4184: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:10,023 [root] DEBUG: Loader: Injecting process 4716 (thread 4720) with C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:10,025 [root] DEBUG: 4184: Monitor initialised: 32-bit capemon loaded in process 4184 at 0x72e90000, thread 4188, image base 0x280000, stack from 0x30c4000-0x30d0000
2025-11-20 10:17:10,027 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:10,030 [root] DEBUG: 4184: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\icudtl.dat",#1
2025-11-20 10:17:10,033 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:10,039 [lib.api.process] INFO: Injected into 32-bit <Process 4716 rundll32.exe>
2025-11-20 10:17:10,074 [root] DEBUG: 4184: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress
2025-11-20 10:17:10,079 [root] DEBUG: 4184: hook_api: Warning - CreateProcessA export address 0x76552D70 differs from GetProcAddress -> 0x731F22A0 (AcLayers.DLL::0x222a0)
2025-11-20 10:17:10,082 [root] DEBUG: 4184: hook_api: Warning - CreateProcessW export address 0x765388E0 differs from GetProcAddress -> 0x731F24E0 (AcLayers.DLL::0x224e0)
2025-11-20 10:17:10,083 [root] DEBUG: 4184: hook_api: Warning - WinExec export address 0x7657CF20 differs from GetProcAddress -> 0x731F27A0 (AcLayers.DLL::0x227a0)
2025-11-20 10:17:10,114 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-11-20 10:17:10,117 [root] DEBUG: 4184: set_hooks: Unable to hook GetCommandLineA
2025-11-20 10:17:10,119 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-11-20 10:17:10,120 [root] DEBUG: 4184: set_hooks: Unable to hook GetCommandLineW
2025-11-20 10:17:10,132 [root] DEBUG: 4184: Hooked 625 out of 627 functions
2025-11-20 10:17:10,134 [root] DEBUG: 4184: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:10,140 [root] DEBUG: 4184: RestoreHeaders: Restored original import table.
2025-11-20 10:17:10,141 [root] INFO: Loaded monitor into process with pid 4184
2025-11-20 10:17:10,144 [root] DEBUG: 4184: caller_dispatch: Added region at 0x00280000 to tracked regions list (ntdll::memcpy returns to 0x00285F1A, thread 4188).
2025-11-20 10:17:10,145 [root] DEBUG: 4184: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:10,148 [root] DEBUG: 4184: ProcessImageBase: Main module image at 0x00280000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:10,167 [root] DEBUG: 4184: InstrumentationCallback: Added region at 0x7654274C (base 0x76520000) to tracked regions list (thread 4188).
2025-11-20 10:17:10,168 [root] DEBUG: 4184: ProcessTrackedRegion: Region at 0x76520000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\kernel32.dll is in known range, skipping
2025-11-20 10:17:10,202 [root] DEBUG: 4184: InstrumentationCallback: Added region at 0x75A163AC (base 0x758D0000) to tracked regions list (thread 4188).
2025-11-20 10:17:10,203 [root] DEBUG: 4184: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping
2025-11-20 10:17:10,215 [root] DEBUG: 4184: DLL loaded at 0x72DF0000: C:\Windows\SYSTEM32\TextShaping (0x95000 bytes).
2025-11-20 10:17:10,253 [root] DEBUG: 4184: DLL loaded at 0x739F0000: C:\Windows\system32\uxtheme (0x74000 bytes).
2025-11-20 10:17:10,260 [root] DEBUG: 4184: DLL loaded at 0x76BD0000: C:\Windows\System32\MSCTF (0xd4000 bytes).
2025-11-20 10:17:10,281 [root] DEBUG: 4184: set_hooks_by_export_directory: Hooked 0 out of 627 functions
2025-11-20 10:17:10,283 [root] DEBUG: 4184: DLL loaded at 0x73B80000: C:\Windows\SYSTEM32\kernel.appcore (0xf000 bytes).
2025-11-20 10:17:10,288 [root] DEBUG: 4184: DLL loaded at 0x75800000: C:\Windows\System32\bcryptPrimitives (0x5f000 bytes).
2025-11-20 10:17:10,328 [root] DEBUG: 4184: DLL loaded at 0x73560000: C:\Windows\SYSTEM32\ntmarta (0x29000 bytes).
2025-11-20 10:17:10,330 [root] DEBUG: 4184: DLL loaded at 0x72A10000: C:\Windows\System32\CoreMessaging (0x9b000 bytes).
2025-11-20 10:17:10,331 [root] DEBUG: 4184: DLL loaded at 0x72930000: C:\Windows\SYSTEM32\wintypes (0xdc000 bytes).
2025-11-20 10:17:10,333 [root] DEBUG: 4184: DLL loaded at 0x72AB0000: C:\Windows\System32\CoreUIComponents (0x27f000 bytes).
2025-11-20 10:17:10,335 [root] DEBUG: 4184: DLL loaded at 0x72D30000: C:\Windows\SYSTEM32\textinputframework (0xb9000 bytes).
2025-11-20 10:17:12,043 [lib.api.process] INFO: Successfully resumed <Process 4716 rundll32.exe>
2025-11-20 10:17:12,046 [lib.core.compound] INFO: C:\Temp already exists, skipping creation
2025-11-20 10:17:12,054 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\rundll32.exe" with arguments ""C:\vesktop.zip\vesktop\libGLESv2.dll",#1" with pid 4972
2025-11-20 10:17:12,055 [lib.api.process] INFO: Monitor config for <Process 4972 rundll32.exe>: C:\k2ffbmig\dll\4972.ini
2025-11-20 10:17:12,065 [lib.api.process] INFO: 32-bit DLL to inject is C:\k2ffbmig\dll\VGCgjUjb.dll, loader C:\k2ffbmig\bin\oLlatlP.exe
2025-11-20 10:17:12,070 [root] DEBUG: 4716: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:12,072 [root] DEBUG: 4716: Dropped file limit defaulting to 100.
2025-11-20 10:17:12,077 [root] DEBUG: 4716: Disabling sleep skipping.
2025-11-20 10:17:12,079 [root] DEBUG: Loader: Injecting process 4972 (thread 4976) with C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:12,081 [root] DEBUG: 4716: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:12,083 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:12,084 [root] DEBUG: 4716: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:12,086 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\VGCgjUjb.dll.
2025-11-20 10:17:12,087 [root] DEBUG: 4716: Monitor initialised: 32-bit capemon loaded in process 4716 at 0x72e90000, thread 4720, image base 0x280000, stack from 0x2a94000-0x2aa0000
2025-11-20 10:17:12,088 [root] DEBUG: 4716: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\libEGL.dll",#1
2025-11-20 10:17:12,089 [lib.api.process] INFO: Injected into 32-bit <Process 4972 rundll32.exe>
2025-11-20 10:17:12,123 [root] DEBUG: 4716: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress
2025-11-20 10:17:12,169 [root] DEBUG: 4716: hook_api: Warning - CreateProcessA export address 0x76552D70 differs from GetProcAddress -> 0x731F22A0 (AcLayers.DLL::0x222a0)
2025-11-20 10:17:12,171 [root] DEBUG: 4716: hook_api: Warning - CreateProcessW export address 0x765388E0 differs from GetProcAddress -> 0x731F24E0 (AcLayers.DLL::0x224e0)
2025-11-20 10:17:12,172 [root] DEBUG: 4716: hook_api: Warning - WinExec export address 0x7657CF20 differs from GetProcAddress -> 0x731F27A0 (AcLayers.DLL::0x227a0)
2025-11-20 10:17:12,212 [root] WARNING: b'Unable to place hook on GetCommandLineA'
2025-11-20 10:17:12,214 [root] DEBUG: 4716: set_hooks: Unable to hook GetCommandLineA
2025-11-20 10:17:12,216 [root] WARNING: b'Unable to place hook on GetCommandLineW'
2025-11-20 10:17:12,217 [root] DEBUG: 4716: set_hooks: Unable to hook GetCommandLineW
2025-11-20 10:17:12,230 [root] DEBUG: 4716: Hooked 625 out of 627 functions
2025-11-20 10:17:12,232 [root] DEBUG: 4716: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:12,238 [root] DEBUG: 4716: RestoreHeaders: Restored original import table.
2025-11-20 10:17:12,239 [root] INFO: Loaded monitor into process with pid 4716
2025-11-20 10:17:12,241 [root] DEBUG: 4716: caller_dispatch: Added region at 0x00280000 to tracked regions list (ntdll::memcpy returns to 0x00285F1A, thread 4720).
2025-11-20 10:17:12,243 [root] DEBUG: 4716: YaraScan: Scanning 0x00280000, size 0x136e8
2025-11-20 10:17:12,246 [root] DEBUG: 4716: ProcessImageBase: Main module image at 0x00280000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:12,269 [root] DEBUG: 4716: InstrumentationCallback: Added region at 0x7654274C (base 0x76520000) to tracked regions list (thread 4720).
2025-11-20 10:17:12,270 [root] DEBUG: 4716: ProcessTrackedRegion: Region at 0x76520000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\kernel32.dll is in known range, skipping
2025-11-20 10:17:12,277 [root] DEBUG: 4716: CreateProcessHandler: Injection info set for new process 4100: C:\Windows\system32\rundll32.exe, ImageBase: 0x00000000
2025-11-20 10:17:12,278 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 4100
2025-11-20 10:17:12,281 [lib.api.process] INFO: Monitor config for <Process 4100 rundll32.exe>: C:\k2ffbmig\dll\4100.ini
2025-11-20 10:17:12,288 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:12,299 [root] DEBUG: Loader: Injecting process 4100 (thread 4112) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:12,301 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2025-11-20 10:17:12,303 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:12,306 [lib.api.process] INFO: Injected into 64-bit <Process 4100 rundll32.exe>
2025-11-20 10:17:12,324 [root] DEBUG: 4716: InstrumentationCallback: Added region at 0x75A163DC (base 0x758D0000) to tracked regions list (thread 4720).
2025-11-20 10:17:12,326 [root] DEBUG: 4716: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping
2025-11-20 10:17:12,327 [root] DEBUG: 4716: WriteMemoryHandler: shellcode at 0x02CFB670 (size 0x11c0) injected into process 4100 at 0xB80E0000.
2025-11-20 10:17:12,333 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\4716_651446912177204112025 to CAPE\673cecd0cd8909f665ccfe44ded1b34c366d412e96be8442920371c16d43f294; Size is 4449; Max size: 100000000
2025-11-20 10:17:12,340 [root] DEBUG: 4716: DumpMemory: Payload successfully created: C:\PrCQdMR\CAPE\4716_651446912177204112025 (size 4449 bytes)
2025-11-20 10:17:12,341 [root] DEBUG: 4716: WriteMemoryHandler: Dumped injected code/data from buffer.
2025-11-20 10:17:12,343 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 4100
2025-11-20 10:17:12,344 [lib.api.process] INFO: Monitor config for <Process 4100 rundll32.exe>: C:\k2ffbmig\dll\4100.ini
2025-11-20 10:17:12,356 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:12,368 [root] DEBUG: Loader: Injecting process 4100 (thread 4112) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:12,370 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:12,371 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:12,374 [lib.api.process] INFO: Injected into 64-bit <Process 4100 rundll32.exe>
2025-11-20 10:17:12,376 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 4100
2025-11-20 10:17:12,378 [lib.api.process] INFO: Monitor config for <Process 4100 rundll32.exe>: C:\k2ffbmig\dll\4100.ini
2025-11-20 10:17:12,387 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:12,397 [root] DEBUG: Loader: Injecting process 4100 (thread 4112) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:12,399 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:12,401 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:12,405 [lib.api.process] INFO: Injected into 64-bit <Process 4100 rundll32.exe>
2025-11-20 10:17:12,407 [root] INFO: Announced 64-bit process name: rundll32.exe pid: 4100
2025-11-20 10:17:12,408 [lib.api.process] INFO: Monitor config for <Process 4100 rundll32.exe>: C:\k2ffbmig\dll\4100.ini
2025-11-20 10:17:12,416 [lib.api.process] INFO: 64-bit DLL to inject is C:\k2ffbmig\dll\TjKeBkVB.dll, loader C:\k2ffbmig\bin\QxcuWWBV.exe
2025-11-20 10:17:12,425 [root] DEBUG: Loader: Injecting process 4100 (thread 4112) with C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:12,427 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2025-11-20 10:17:12,428 [root] DEBUG: Successfully injected DLL C:\k2ffbmig\dll\TjKeBkVB.dll.
2025-11-20 10:17:12,430 [lib.api.process] INFO: Injected into 64-bit <Process 4100 rundll32.exe>
2025-11-20 10:17:12,444 [root] DEBUG: 4100: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:12,445 [root] DEBUG: 4100: Dropped file limit defaulting to 100.
2025-11-20 10:17:12,449 [root] DEBUG: 4100: Disabling sleep skipping.
2025-11-20 10:17:12,452 [root] DEBUG: 4100: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:12,477 [root] DEBUG: 4100: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0
2025-11-20 10:17:12,479 [root] DEBUG: 4100: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:12,483 [root] DEBUG: 4100: Monitor initialised: 64-bit capemon loaded in process 4100 at 0x00007FFEB9130000, thread 4112, image base 0x00007FF6C1D60000, stack from 0x000000EB63F24000-0x000000EB63F30000
2025-11-20 10:17:12,485 [root] DEBUG: 4100: Commandline: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\libEGL.dll",#1
2025-11-20 10:17:12,497 [root] DEBUG: 4100: hook_api: LdrpCallInitRoutine export address 0x00007FFEE34899BC obtained via GetFunctionAddress
2025-11-20 10:17:12,567 [root] WARNING: b'Unable to place hook on LockResource'
2025-11-20 10:17:12,568 [root] DEBUG: 4100: set_hooks: Unable to hook LockResource
2025-11-20 10:17:12,580 [root] DEBUG: 4100: Hooked 619 out of 620 functions
2025-11-20 10:17:12,583 [root] DEBUG: 4100: Syscall hook installed, syscall logging level 1
2025-11-20 10:17:12,592 [root] DEBUG: 4100: RestoreHeaders: Restored original import table.
2025-11-20 10:17:12,593 [root] INFO: Loaded monitor into process with pid 4100
2025-11-20 10:17:12,594 [root] DEBUG: 4100: caller_dispatch: Added region at 0x00007FF6C1D60000 to tracked regions list (kernel32::SetUnhandledExceptionFilter returns to 0x00007FF6C1D66D01, thread 4112).
2025-11-20 10:17:12,596 [root] DEBUG: 4100: YaraScan: Scanning 0x00007FF6C1D60000, size 0x16100
2025-11-20 10:17:12,600 [root] DEBUG: 4100: ProcessImageBase: Main module image at 0x00007FF6C1D60000 unmodified (entropy change 0.000000e+00)
2025-11-20 10:17:12,614 [root] DEBUG: 4100: Target DLL loaded at 0x00007FFED5DD0000: C:\vesktop.zip\vesktop\libEGL (0x86000 bytes).
2025-11-20 10:17:12,616 [root] DEBUG: 4100: YaraScan: Scanning 0x00007FFED5DD0000, size 0x85c4e
2025-11-20 10:17:12,628 [root] DEBUG: 4100: caller_dispatch: Added region at 0x00007FFED5DD0000 to tracked regions list (ntdll::LdrLoadDll returns to 0x00007FFED5E17337, thread 4112).
2025-11-20 10:17:12,630 [root] DEBUG: 4100: caller_dispatch: Scanning calling region at 0x00007FFED5DD0000...
2025-11-20 10:17:12,638 [root] DEBUG: 4100: DLL loaded at 0x00007FFEDE5B0000: C:\Windows\system32\uxtheme (0x9e000 bytes).
2025-11-20 10:17:12,642 [root] DEBUG: 4100: DLL loaded at 0x00007FFEE21A0000: C:\Windows\System32\MSCTF (0x114000 bytes).
2025-11-20 10:17:12,652 [root] DEBUG: 4100: DLL loaded at 0x00007FFEDF450000: C:\Windows\system32\dxgi (0xf3000 bytes).
2025-11-20 10:17:12,653 [root] DEBUG: 4100: DLL loaded at 0x00007FFEC3C70000: C:\vesktop.zip\vesktop\libGLESv2 (0x814000 bytes).
2025-11-20 10:17:12,664 [root] DEBUG: 4100: Target DLL unloading from 0x00007FFED5DD0000: code modification detected, dumping.
2025-11-20 10:17:12,665 [root] DEBUG: 4100: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2025-11-20 10:17:12,667 [root] DEBUG: 4100: DumpProcess: Instantiating PeParser with address: 0x00007FFED5DD0000.
2025-11-20 10:17:12,668 [root] DEBUG: 4100: DumpProcess: Module entry point VA is 0x0000000000020950.
2025-11-20 10:17:12,682 [lib.common.results] INFO: Uploading file C:\PrCQdMR\CAPE\4100_808744112177204112025 to procdump\e3059907218f7d6e631af937e371fd924e1457c13a27a25bc2bc16f12abddbb2; Size is 515584; Max size: 100000000
2025-11-20 10:17:12,691 [root] DEBUG: 4100: DumpProcess: Module image dump success - dump size 0x7de00.
2025-11-20 10:17:12,700 [root] INFO: Process with pid 4100 has terminated
2025-11-20 10:17:12,708 [root] DEBUG: 4716: NtTerminateProcess hook: Attempting to dump process 4716
2025-11-20 10:17:12,711 [root] DEBUG: 4716: DoProcessDump: Skipping process dump as code is identical on disk.
2025-11-20 10:17:12,722 [root] INFO: Process with pid 4716 has terminated
2025-11-20 10:17:14,101 [lib.api.process] INFO: Successfully resumed <Process 4972 rundll32.exe>
2025-11-20 10:17:14,104 [root] ERROR: You probably submitted the job with wrong package
Traceback (most recent call last):
  File "C:\k2ffbmig/analyzer.py", line 620, in run
    pids = self.package.start(self.target)
  File "C:\k2ffbmig\modules\packages\archive.py", line 148, in start
    ret_list.append(self.execute_interesting_file(root, interesting_file, file_path))
                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "C:\k2ffbmig\lib\common\abstracts.py", line 290, in execute_interesting_file
    edge = self.get_path("msedge.exe")
  File "C:\k2ffbmig\lib\common\abstracts.py", line 135, in get_path
    raise CuckooPackageError(f"Unable to find any {application} executable")
lib.common.exceptions.CuckooPackageError: Unable to find any msedge.exe executable

The above exception was the direct cause of the following exception:

Traceback (most recent call last):
  File "C:\k2ffbmig/analyzer.py", line 1521, in <module>
    success = analyzer.run()
  File "C:\k2ffbmig/analyzer.py", line 624, in run
    raise CuckooError(f'The package "{self.package_name}" start function raised an error: {e}') from e
lib.common.exceptions.CuckooError: The package "modules.packages.archive" start function raised an error: Unable to find any msedge.exe executable
2025-11-20 10:17:14,137 [root] DEBUG: 4972: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'.
2025-11-20 10:17:14,155 [root] DEBUG: 4972: Dropped file limit defaulting to 100.
2025-11-20 10:17:14,161 [root] WARNING: Folder at path "C:\PrCQdMR\debugger" does not exist, skipping
2025-11-20 10:17:14,163 [root] DEBUG: 4972: Disabling sleep skipping.
2025-11-20 10:17:14,163 [root] WARNING: Folder at path "C:\PrCQdMR\tlsdump" does not exist, skipping
2025-11-20 10:17:14,165 [root] DEBUG: 4972: YaraInit: Compiled rules loaded from existing file C:\k2ffbmig\data\yara\capemon.yac
2025-11-20 10:17:14,279 [root] INFO: Analysis completed

    

    

    

Machine

Name Label Manager Started On Shutdown On Route
MalwareGuest MalwareGuest Proxmox 2025-11-20 10:16:48 2025-11-20 10:17:47 none

File Details

File Name
vesktop.zip
File Type Zip archive data, at least v2.0 to extract, compression method=store
File Size 135061806 bytes
MD5 9a1d172568840dbe2f418d1c654e014f
SHA1 b6bcf497e0152a81569be8b80862a9b85c5c3f00
SHA256 7fbde6d9eeede9c499b47cdf6c5fe916cbfde7e768c354b902e821755875470e [VT] [MWDB] [Bazaar]
SHA3-384 f6783ae7900f46ddc678f1befda4483861be82a925fc1b9a8703284c406ab40a4ea9c7371a5b5557880be76c5124242b
CRC32 D66A2DD8
TLSH T1055833A3C47321CBA5652D3EBE82BCF7E6273D4321BACC0625655253378A2DA9337711
Ssdeep 3145728:VfWpuXy+rf8RAP9lX/K4/52IbJ/TvtjmYQtgLQYVDm1NVRuTGV:VfWpuXy+rfEAPPX/X2IhTVPQ2LLgNVRb
File Strings BinGraph Vba2Graph

Reports: JSON

Processing ( 157.04 seconds )

  • 156.799 CAPE
  • 0.22 BehaviorAnalysis
  • 0.014 AnalysisInfo
  • 0.002 Debug

Signatures ( 0.10 seconds )

  • 0.014 antiav_detectreg
  • 0.006 antiav_detectfile
  • 0.006 infostealer_ftp
  • 0.006 territorial_disputes_sigs
  • 0.006 uses_windows_utilities
  • 0.005 ransomware_files
  • 0.005 suspicious_command_tools
  • 0.004 infostealer_im
  • 0.004 masquerade_process_name
  • 0.003 antianalysis_detectfile
  • 0.003 antianalysis_detectreg
  • 0.003 infostealer_bitcoin
  • 0.003 ransomware_extensions
  • 0.002 antivm_vbox_files
  • 0.002 antivm_vbox_keys
  • 0.002 infostealer_mail
  • 0.001 antidebug_devices
  • 0.001 antivm_generic_diskreg
  • 0.001 antivm_parallels_keys
  • 0.001 antivm_vmware_files
  • 0.001 antivm_vmware_keys
  • 0.001 antivm_vpc_keys
  • 0.001 antivm_xen_keys
  • 0.001 ketrican_regkeys
  • 0.001 geodo_banking_trojan
  • 0.001 browser_security
  • 0.001 disables_backups
  • 0.001 disables_browser_warn
  • 0.001 disables_power_options
  • 0.001 azorult_mutexes
  • 0.001 echelon_files
  • 0.001 poullight_files
  • 0.001 qulab_files
  • 0.001 modify_uac_prompt
  • 0.001 revil_mutexes
  • 0.001 recon_fingerprint
  • 0.001 tampers_etw
  • 0.001 lokibot_mutexes
  • 0.001 ursnif_behavior

Reporting ( 0.19 seconds )

  • 0.192 JsonDump

Signatures

SetUnhandledExceptionFilter detected (possible anti-debug)
A file with an unusual extension was attempted to be loaded as a DLL.
Possible date expiration check, exits too soon after checking local time
process: rundll32.exe, PID 1368
Checks system language via registry key (possible geofencing)
regkey: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\ru-RU
regkey: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\ru-RU
Resumed a thread in another process
thread_resumed: Process rundll32.exe with process ID 1368 resumed a thread in another process with the process ID 1012
thread_resumed: Process rundll32.exe with process ID 2100 resumed a thread in another process with the process ID 1616
thread_resumed: Process rundll32.exe with process ID 2964 resumed a thread in another process with the process ID 1684
thread_resumed: Process rundll32.exe with process ID 3148 resumed a thread in another process with the process ID 4356
thread_resumed: Process rundll32.exe with process ID 4716 resumed a thread in another process with the process ID 4100
Writes to the memory another process
write_memory: Process rundll32.exe with process ID 1368 wrote to the memory of process handle 0x000002c8
write_memory: Process rundll32.exe with process ID 2100 wrote to the memory of process handle 0x000002d0
write_memory: Process rundll32.exe with process ID 2964 wrote to the memory of process handle 0x000002d4
write_memory: Process rundll32.exe with process ID 3148 wrote to the memory of process handle 0x000002c0
write_memory: Process rundll32.exe with process ID 4716 wrote to the memory of process handle 0x000002b8
Executes a DLL from within an archive file
command: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\d3dcompiler_47.dll",#1
command: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\dxcompiler.dll",#1
command: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\dxil.dll",#1
command: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\ffmpeg.dll",#1
command: "C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\libEGL.dll",#1
Exhibits possible ransomware or wiper file modification behavior: mass_drops_unknown_filetypes
file: ['cs.pak']
file: ['ro.pak']
file: ['th.pak']
file: ['bg.pak']
file: ['kn.pak']
file: ['ur.pak']
file: ['fil.pak']
file: ['ar.pak']
file: ['it.pak']
file: ['ja.pak']
file: ['hi.pak']
file: ['fa.pak']
file: ['lt.pak']
file: ['sv.pak']
file: ['en-US.pak']
file: ['chrome_100_percent.pak']
file: ['he.pak']
file: ['am.pak']
file: ['sw.pak']
file: ['sk.pak']
file: ['pt-PT.pak']
file: ['chrome_200_percent.pak']
file: ['en-GB.pak']
file: ['sl.pak']
file: ['zh-CN.pak']
file: ['el.pak']
file: ['snapshot_blob.bin']
file: ['v8_context_snapshot.bin']
file: ['af.pak']
file: ['ta.pak']
file: ['et.pak']
file: ['ru.pak']
file: ['ml.pak']
file: ['uk.pak']
file: ['pl.pak']
file: ['fr.pak']
file: ['vi.pak']
file: ['mr.pak']
file: ['nb.pak']
file: ['zh-TW.pak']
file: ['te.pak']
file: ['ko.pak']
file: ['pt-BR.pak']
file: ['id.pak']
file: ['tr.pak']
file: ['lv.pak']
file: ['icudtl.dat']
file: ['ms.pak']
file: ['fi.pak']
file: ['nl.pak']
file: ['ca.pak']
file: ['es-419.pak']
file: ['bn.pak']
file: ['es.pak']
file: ['de.pak']
file: ['gu.pak']
file: ['sr.pak']
file: ['resources.pak']
file: ['da.pak']
file: ['hu.pak']
file: ['hr.pak']

Screenshots

No playback available.

Hosts

No hosts contacted.

DNS

No domains contacted.

Summary

C:\vesktop.zip\vesktop\d3dcompiler_47.dll.manifest
C:\vesktop.zip\vesktop\d3dcompiler_47.dll
C:\vesktop.zip\vesktop\d3dcompiler_47.dll.123.Manifest
C:\vesktop.zip\vesktop\d3dcompiler_47.dll.124.Manifest
C:\vesktop.zip\vesktop\d3dcompiler_47.dll.2.Manifest
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\vesktop.zip\vesktop\dxcompiler.dll.manifest
C:\vesktop.zip\vesktop\dxcompiler.dll
C:\vesktop.zip\vesktop\dxcompiler.dll.123.Manifest
C:\vesktop.zip\vesktop\dxcompiler.dll.124.Manifest
C:\vesktop.zip\vesktop\dxcompiler.dll.2.Manifest
C:\vesktop.zip\vesktop\dxil.dll.manifest
C:\vesktop.zip\vesktop\dxil.dll
C:\vesktop.zip\vesktop\dxil.dll.123.Manifest
C:\vesktop.zip\vesktop\dxil.dll.124.Manifest
C:\vesktop.zip\vesktop\ffmpeg.dll.manifest
C:\vesktop.zip\vesktop\ffmpeg.dll
C:\vesktop.zip\vesktop\ffmpeg.dll.123.Manifest
C:\vesktop.zip\vesktop\ffmpeg.dll.124.Manifest
C:\vesktop.zip\vesktop\ffmpeg.dll.2.Manifest
C:\vesktop.zip\vesktop\icudtl.dat.manifest
C:\vesktop.zip\vesktop\icudtl.dat
C:\Windows\System32\ru-RU\KERNELBASE.dll.mui
C:\Windows\sysnative\ru-RU\KERNELBASE.dll.mui
C:\Windows\SysWOW64\ru-RU\rundll32.exe.mui
C:\Windows\sysnative\ru-RU\rundll32.exe.mui
C:\vesktop.zip\vesktop\libEGL.dll.manifest
C:\vesktop.zip\vesktop\libEGL.dll
C:\vesktop.zip\vesktop\libEGL.dll.123.Manifest
C:\vesktop.zip\vesktop\libEGL.dll.124.Manifest
C:\vesktop.zip\vesktop\libEGL.dll.2.Manifest
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\SideBySide
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Wow64\x86\xtajit
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\AppCertDlls
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\Option
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\safer\codeidentifiers\TransparentEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\safer\codeidentifiers\AuthenticodeEnabled
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableUmpdBufferSizeCheck
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_CURRENT_USER
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize\AppsUseLightTheme
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\CustomLocale
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\ru-RU
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\ExtendedLocale
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\ru-RU
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
HKEY_LOCAL_MACHINE\Software\Microsoft\LanguageOverlay\OverlayPackages\ru-RU
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\safer\codeidentifiers\TransparentEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\safer\codeidentifiers\AuthenticodeEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableUmpdBufferSizeCheck
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\PreferExternalManifest
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize\AppsUseLightTheme
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\ru-RU
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\ru-RU
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-US
"C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\d3dcompiler_47.dll",#1
"C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\dxcompiler.dll",#1
"C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\dxil.dll",#1
"C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\ffmpeg.dll",#1
"C:\Windows\system32\rundll32.exe" "C:\vesktop.zip\vesktop\libEGL.dll",#1
Local\SM0:1012:304:WilStaging_02
Local\SM0:1616:304:WilStaging_02
Local\SM0:1684:304:WilStaging_02
Local\SM0:4356:304:WilStaging_02
Local\SM0:4100:304:WilStaging_02
No results
Sorry! No behavior.
Sorry! No strace.
Sorry! No tracee.

No hosts contacted.

No TCP connections recorded.

No UDP connections recorded.

No domains contacted.

HTTP Requests

No HTTP(s) requests performed.

SMTP traffic

No SMTP traffic performed.

IRC traffic

No IRC requests performed.

No ICMP traffic performed.

CIF Results

No CIF Results

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Suricata HTTP

No Suricata HTTP

Sorry! No Suricata Extracted files.
Sorry! No dropped files.
Sorry! No CAPE files.
Sorry! No process dumps.