| Category | Package | Started | Completed | Duration | Log(s) |
|---|---|---|---|---|---|
| FILE | exe | 2025-11-19 23:15:50 | 2025-11-19 23:19:32 | 222 seconds | Show Analysis Log |
2025-11-20 02:01:42,499 [root] INFO: Date set to: 20251119T23:15:50, timeout set to: 200 2025-11-19 23:15:50,006 [root] DEBUG: Starting analyzer from: C:\igh9o5mq 2025-11-19 23:15:50,006 [root] DEBUG: Storing results at: C:\xvddfc 2025-11-19 23:15:50,007 [root] DEBUG: Pipe server name: \\.\PIPE\OYsBcWRtj 2025-11-19 23:15:50,007 [root] DEBUG: Python path: C:\Users\Admin\AppData\Local\Programs\Python\Python313-32 2025-11-19 23:15:50,007 [root] INFO: analysis running as an admin 2025-11-19 23:15:50,008 [root] INFO: analysis package specified: "exe" 2025-11-19 23:15:50,008 [root] DEBUG: importing analysis package module: "modules.packages.exe"... 2025-11-19 23:15:50,014 [root] DEBUG: imported analysis package "exe" 2025-11-19 23:15:50,015 [root] DEBUG: initializing analysis package "exe"... 2025-11-19 23:15:50,015 [lib.common.common] INFO: wrapping 2025-11-19 23:15:50,016 [lib.core.compound] INFO: C:\Temp already exists, skipping creation 2025-11-19 23:15:50,016 [root] DEBUG: New location of moved file: C:\Temp\PoliceAssist.exe 2025-11-19 23:15:50,017 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option 2025-11-19 23:15:50,017 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option 2025-11-19 23:15:50,017 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader option 2025-11-19 23:15:50,017 [root] INFO: Analyzer: Package modules.packages.exe does not specify a loader_64 option 2025-11-19 23:15:50,036 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser" 2025-11-19 23:15:50,044 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig" 2025-11-19 23:15:50,066 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise" 2025-11-19 23:15:50,089 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human" 2025-11-19 23:15:50,095 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2025-11-19 23:15:50,141 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2025-11-19 23:15:50,143 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2025-11-19 23:15:50,169 [lib.api.screenshot] INFO: Please upgrade Pillow to >= 5.4.1 for best performance 2025-11-19 23:15:50,170 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots" 2025-11-19 23:15:50,174 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump" 2025-11-19 23:15:50,175 [root] DEBUG: Initialized auxiliary module "Browser" 2025-11-19 23:15:50,175 [root] DEBUG: attempting to configure 'Browser' from data 2025-11-19 23:15:50,177 [root] DEBUG: module Browser does not support data configuration, ignoring 2025-11-19 23:15:50,177 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"... 2025-11-19 23:15:50,178 [root] DEBUG: Started auxiliary module modules.auxiliary.browser 2025-11-19 23:15:50,179 [root] DEBUG: Initialized auxiliary module "DigiSig" 2025-11-19 23:15:50,179 [root] DEBUG: attempting to configure 'DigiSig' from data 2025-11-19 23:15:50,179 [root] DEBUG: module DigiSig does not support data configuration, ignoring 2025-11-19 23:15:50,180 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.digisig"... 2025-11-19 23:15:50,180 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature 2025-11-19 23:15:50,461 [modules.auxiliary.digisig] DEBUG: File is not signed 2025-11-19 23:15:50,461 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json 2025-11-19 23:15:50,475 [root] DEBUG: Started auxiliary module modules.auxiliary.digisig 2025-11-19 23:15:50,475 [root] DEBUG: Initialized auxiliary module "Disguise" 2025-11-19 23:15:50,475 [root] DEBUG: attempting to configure 'Disguise' from data 2025-11-19 23:15:50,476 [root] DEBUG: module Disguise does not support data configuration, ignoring 2025-11-19 23:15:50,476 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"... 2025-11-19 23:15:50,477 [modules.auxiliary.disguise] INFO: Disguising GUID to f2df9704-87c5-4edb-8c28-df2bf714378e 2025-11-19 23:15:50,477 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise 2025-11-19 23:15:50,477 [root] DEBUG: Initialized auxiliary module "Human" 2025-11-19 23:15:50,477 [root] DEBUG: attempting to configure 'Human' from data 2025-11-19 23:15:50,478 [root] DEBUG: module Human does not support data configuration, ignoring 2025-11-19 23:15:50,478 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"... 2025-11-19 23:15:50,479 [root] DEBUG: Started auxiliary module modules.auxiliary.human 2025-11-19 23:15:50,479 [root] DEBUG: Initialized auxiliary module "Screenshots" 2025-11-19 23:15:50,480 [root] DEBUG: attempting to configure 'Screenshots' from data 2025-11-19 23:15:50,481 [root] DEBUG: module Screenshots does not support data configuration, ignoring 2025-11-19 23:15:50,481 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"... 2025-11-19 23:15:50,482 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots 2025-11-19 23:15:50,482 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets" 2025-11-19 23:15:50,482 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data 2025-11-19 23:15:50,483 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring 2025-11-19 23:15:50,483 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"... 2025-11-19 23:15:50,484 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 608 2025-11-19 23:15:50,779 [lib.api.process] INFO: Monitor config for <Process 608 lsass.exe>: C:\igh9o5mq\dll\608.ini 2025-11-19 23:15:50,781 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2025-11-19 23:15:50,789 [lib.api.process] INFO: 64-bit DLL to inject is C:\igh9o5mq\dll\xaPJiQM.dll, loader C:\igh9o5mq\bin\opBnJdIX.exe 2025-11-19 23:15:50,811 [root] DEBUG: Loader: Injecting process 608 with C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:15:50,830 [root] DEBUG: 608: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-19 23:15:50,831 [root] DEBUG: 608: Disabling sleep skipping. 2025-11-19 23:15:50,832 [root] DEBUG: 608: TLS secret dump mode enabled. 2025-11-19 23:15:50,865 [root] DEBUG: 608: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0 2025-11-19 23:15:50,866 [root] DEBUG: 608: Monitor initialised: 64-bit capemon loaded in process 608 at 0x00007FFEC4670000, thread 3340, image base 0x00007FF60EE30000, stack from 0x000000A5F48F2000-0x000000A5F4900000 2025-11-19 23:15:50,867 [root] DEBUG: 608: Commandline: C:\Windows\system32\lsass.exe 2025-11-19 23:15:50,876 [root] DEBUG: 608: Hooked 5 out of 5 functions 2025-11-19 23:15:50,878 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-11-19 23:15:50,879 [root] DEBUG: Successfully injected DLL C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:15:50,883 [lib.api.process] INFO: Injected into 64-bit <Process 608 lsass.exe> 2025-11-19 23:15:50,883 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump 2025-11-19 23:15:53,916 [root] INFO: Restarting WMI Service 2025-11-19 23:15:56,075 [root] DEBUG: package modules.packages.exe does not support configure, ignoring 2025-11-19 23:15:56,076 [root] WARNING: configuration error for package modules.packages.exe: error importing data.packages.exe: No module named 'data.packages' 2025-11-19 23:15:56,076 [lib.core.compound] INFO: C:\Temp already exists, skipping creation 2025-11-19 23:15:56,104 [lib.api.process] INFO: Successfully executed process from path "C:\Temp\PoliceAssist.exe" with arguments "" with pid 252 2025-11-19 23:15:56,105 [lib.api.process] INFO: Monitor config for <Process 252 PoliceAssist.exe>: C:\igh9o5mq\dll\252.ini 2025-11-19 23:15:56,110 [lib.api.process] INFO: 64-bit DLL to inject is C:\igh9o5mq\dll\xaPJiQM.dll, loader C:\igh9o5mq\bin\opBnJdIX.exe 2025-11-19 23:15:56,121 [root] DEBUG: Loader: Injecting process 252 (thread 1136) with C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:15:56,122 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-11-19 23:15:56,123 [root] DEBUG: Successfully injected DLL C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:15:56,126 [lib.api.process] INFO: Injected into 64-bit <Process 252 PoliceAssist.exe> 2025-11-19 23:15:58,129 [lib.api.process] INFO: Successfully resumed <Process 252 PoliceAssist.exe> 2025-11-19 23:15:58,154 [root] DEBUG: 252: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-19 23:15:58,155 [root] DEBUG: 252: Disabling sleep skipping. 2025-11-19 23:15:58,156 [root] DEBUG: 252: Dropped file limit defaulting to 100. 2025-11-19 23:15:58,173 [root] DEBUG: 252: YaraInit: Compiled 43 rule files 2025-11-19 23:15:58,180 [root] DEBUG: 252: YaraInit: Compiled rules saved to file C:\igh9o5mq\data\yara\capemon.yac 2025-11-19 23:15:58,283 [root] DEBUG: 252: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0 2025-11-19 23:15:58,284 [root] DEBUG: 252: YaraScan: Scanning 0x0000000140000000, size 0x126a57 2025-11-19 23:15:58,315 [root] DEBUG: 252: Monitor initialised: 64-bit capemon loaded in process 252 at 0x00007FFEC4670000, thread 1136, image base 0x0000000140000000, stack from 0x00000000007F2000-0x0000000000800000 2025-11-19 23:15:58,318 [root] DEBUG: 252: Commandline: "C:\Temp\PoliceAssist.exe" 2025-11-19 23:15:58,328 [root] DEBUG: 252: hook_api: LdrpCallInitRoutine export address 0x00007FFEE34899BC obtained via GetFunctionAddress 2025-11-19 23:15:58,377 [root] WARNING: b'Unable to place hook on LockResource' 2025-11-19 23:15:58,378 [root] DEBUG: 252: set_hooks: Unable to hook LockResource 2025-11-19 23:15:58,394 [root] DEBUG: 252: Hooked 619 out of 620 functions 2025-11-19 23:15:58,414 [root] DEBUG: 252: Syscall hook installed, syscall logging level 1 2025-11-19 23:15:58,428 [root] DEBUG: 252: RestoreHeaders: Restored original import table. 2025-11-19 23:15:58,429 [root] INFO: Loaded monitor into process with pid 252 2025-11-19 23:15:58,446 [root] DEBUG: 252: caller_dispatch: Added region at 0x0000000140000000 to tracked regions list (kernel32::GetSystemTimeAsFileTime returns to 0x00000001400D415D, thread 1136). 2025-11-19 23:15:58,447 [root] DEBUG: 252: YaraScan: Scanning 0x0000000140000000, size 0x126a57 2025-11-19 23:15:58,465 [root] DEBUG: 252: ProcessImageBase: Main module image at 0x0000000140000000 unmodified (entropy change 0.000000e+00) 2025-11-19 23:15:58,473 [root] DEBUG: 252: set_hooks_by_export_directory: Hooked 0 out of 620 functions 2025-11-19 23:15:58,474 [root] DEBUG: 252: DLL loaded at 0x00007FFEDEA70000: C:\Windows\SYSTEM32\kernel.appcore (0x12000 bytes). 2025-11-19 23:15:58,476 [root] DEBUG: 252: DLL loaded at 0x00007FFEE1390000: C:\Windows\System32\bcryptPrimitives (0x82000 bytes). 2025-11-19 23:15:58,481 [root] DEBUG: 252: DLL loaded at 0x00007FFEDE5B0000: C:\Windows\system32\uxtheme (0x9e000 bytes). 2025-11-19 23:15:58,501 [root] DEBUG: 252: DLL loaded at 0x00007FFEE21A0000: C:\Windows\System32\MSCTF (0x114000 bytes). 2025-11-19 23:15:58,541 [root] DEBUG: 252: DLL loaded at 0x00007FFED6980000: C:\Windows\SYSTEM32\TextShaping (0xac000 bytes). 2025-11-19 23:15:58,586 [root] DEBUG: 252: DLL loaded at 0x00007FFEE0500000: C:\Windows\SYSTEM32\Wldp (0x2d000 bytes). 2025-11-19 23:15:58,587 [root] DEBUG: 252: DLL loaded at 0x00007FFEDEC70000: C:\Windows\SYSTEM32\windows.storage (0x79b000 bytes). 2025-11-19 23:15:58,704 [lib.api.process] INFO: Monitor config for <Process 740 svchost.exe>: C:\igh9o5mq\dll\740.ini 2025-11-19 23:15:58,708 [lib.api.process] INFO: 64-bit DLL to inject is C:\igh9o5mq\dll\xaPJiQM.dll, loader C:\igh9o5mq\bin\opBnJdIX.exe 2025-11-19 23:15:58,720 [root] DEBUG: Loader: Injecting process 740 with C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:15:58,725 [root] DEBUG: 740: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-19 23:15:58,727 [root] DEBUG: 740: Disabling sleep skipping. 2025-11-19 23:15:58,728 [root] DEBUG: 740: Dropped file limit defaulting to 100. 2025-11-19 23:15:58,730 [root] DEBUG: 740: Services hook set enabled 2025-11-19 23:15:58,733 [root] DEBUG: 740: YaraInit: Compiled rules loaded from existing file C:\igh9o5mq\data\yara\capemon.yac 2025-11-19 23:15:58,762 [root] DEBUG: 740: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0 2025-11-19 23:15:58,763 [root] DEBUG: 740: Monitor initialised: 64-bit capemon loaded in process 740 at 0x00007FFEC4670000, thread 1788, image base 0x00007FF630560000, stack from 0x000000A00AB75000-0x000000A00AB80000 2025-11-19 23:15:58,764 [root] DEBUG: 740: Commandline: C:\Windows\system32\svchost.exe -k DcomLaunch -p 2025-11-19 23:15:58,780 [root] DEBUG: 740: Hooked 69 out of 69 functions 2025-11-19 23:15:58,783 [root] INFO: Loaded monitor into process with pid 740 2025-11-19 23:15:58,784 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-11-19 23:15:58,785 [root] DEBUG: Successfully injected DLL C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:15:58,788 [lib.api.process] INFO: Injected into 64-bit <Process 740 svchost.exe> 2025-11-19 23:16:01,805 [root] DEBUG: 252: DLL loaded at 0x00007FFEE2C20000: C:\Windows\System32\clbcatq (0xa9000 bytes). 2025-11-19 23:16:01,815 [root] DEBUG: 252: DLL loaded at 0x00007FFED95E0000: C:\Windows\SYSTEM32\wbemcomn (0x90000 bytes). 2025-11-19 23:16:01,816 [root] DEBUG: 252: DLL loaded at 0x00007FFED9590000: C:\Windows\system32\wbem\wbemdisp (0x4e000 bytes). 2025-11-19 23:16:01,830 [root] DEBUG: 252: DLL loaded at 0x00007FFEDC220000: C:\Windows\system32\wbem\wbemprox (0x11000 bytes). 2025-11-19 23:16:01,838 [root] DEBUG: 252: DLL loaded at 0x00007FFED9560000: C:\Windows\system32\wbem\wmiutils (0x28000 bytes). 2025-11-19 23:16:01,883 [root] DEBUG: 252: DLL loaded at 0x00007FFEDB270000: C:\Windows\system32\wbem\wbemsvc (0x14000 bytes). 2025-11-19 23:16:01,971 [root] DEBUG: 252: hook_api: WMI_ExecQuery export address 0x00007FFED3FCD630 obtained via GetFunctionAddress 2025-11-19 23:16:01,996 [root] DEBUG: 252: hook_api: WMI_ExecMethod export address 0x00007FFED40630C0 obtained via GetFunctionAddress 2025-11-19 23:16:02,071 [root] DEBUG: 252: DLL loaded at 0x00007FFED3FC0000: C:\Windows\system32\wbem\fastprox (0x10b000 bytes). 2025-11-19 23:16:02,074 [root] DEBUG: 252: DLL loaded at 0x00007FFEDE1C0000: C:\Windows\SYSTEM32\amsi (0x1f000 bytes). 2025-11-19 23:16:02,086 [root] DEBUG: 252: DLL loaded at 0x00007FFEE08C0000: C:\Windows\SYSTEM32\sxs (0xa2000 bytes). 2025-11-19 23:16:02,154 [root] DEBUG: 740: CreateProcessHandler: Injection info set for new process 2784: C:\Windows\system32\wbem\wmiprvse.exe, ImageBase: 0x00007FF7CC530000 2025-11-19 23:16:02,155 [root] INFO: Announced 64-bit process name: WmiPrvSE.exe pid: 2784 2025-11-19 23:16:02,156 [lib.api.process] INFO: Monitor config for <Process 2784 WmiPrvSE.exe>: C:\igh9o5mq\dll\2784.ini 2025-11-19 23:16:03,183 [lib.api.process] INFO: 64-bit DLL to inject is C:\igh9o5mq\dll\xaPJiQM.dll, loader C:\igh9o5mq\bin\opBnJdIX.exe 2025-11-19 23:16:03,195 [root] DEBUG: Loader: Injecting process 2784 (thread 1928) with C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:16:03,197 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-11-19 23:16:03,197 [root] DEBUG: Successfully injected DLL C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:16:03,200 [lib.api.process] INFO: Injected into 64-bit <Process 2784 WmiPrvSE.exe> 2025-11-19 23:16:03,202 [root] INFO: Announced 64-bit process name: WmiPrvSE.exe pid: 2784 2025-11-19 23:16:03,203 [lib.api.process] INFO: Monitor config for <Process 2784 WmiPrvSE.exe>: C:\igh9o5mq\dll\2784.ini 2025-11-19 23:16:03,808 [lib.api.process] INFO: 64-bit DLL to inject is C:\igh9o5mq\dll\xaPJiQM.dll, loader C:\igh9o5mq\bin\opBnJdIX.exe 2025-11-19 23:16:03,822 [root] DEBUG: Loader: Injecting process 2784 (thread 1928) with C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:16:03,823 [root] DEBUG: InjectDllViaIAT: This image has already been patched. 2025-11-19 23:16:03,824 [root] DEBUG: Successfully injected DLL C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:16:03,827 [lib.api.process] INFO: Injected into 64-bit <Process 2784 WmiPrvSE.exe> 2025-11-19 23:16:03,840 [root] DEBUG: 2784: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-19 23:16:03,841 [root] DEBUG: 2784: Dropped file limit defaulting to 100. 2025-11-19 23:16:03,844 [root] DEBUG: 2784: Disabling sleep skipping. 2025-11-19 23:16:03,845 [root] DEBUG: 2784: Services hook set enabled 2025-11-19 23:16:03,850 [root] DEBUG: 2784: YaraInit: Compiled rules loaded from existing file C:\igh9o5mq\data\yara\capemon.yac 2025-11-19 23:16:03,874 [root] DEBUG: 2784: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0 2025-11-19 23:16:03,875 [root] DEBUG: 2784: Monitor initialised: 64-bit capemon loaded in process 2784 at 0x00007FFEC4670000, thread 1928, image base 0x00007FF7CC530000, stack from 0x00000057E0870000-0x00000057E0880000 2025-11-19 23:16:03,876 [root] DEBUG: 2784: Commandline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding 2025-11-19 23:16:03,890 [root] DEBUG: 2784: Hooked 69 out of 69 functions 2025-11-19 23:16:03,897 [root] DEBUG: 2784: RestoreHeaders: Restored original import table. 2025-11-19 23:16:03,899 [root] INFO: Loaded monitor into process with pid 2784 2025-11-19 23:16:03,910 [root] DEBUG: 2784: set_hooks_by_export_directory: Hooked 0 out of 69 functions 2025-11-19 23:16:03,911 [root] DEBUG: 2784: DLL loaded at 0x00007FFEDEA70000: C:\Windows\SYSTEM32\kernel.appcore (0x12000 bytes). 2025-11-19 23:16:03,912 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE1390000: C:\Windows\System32\bcryptPrimitives (0x82000 bytes). 2025-11-19 23:16:03,917 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE2C20000: C:\Windows\System32\clbcatq (0xa9000 bytes). 2025-11-19 23:16:03,923 [lib.api.process] INFO: Monitor config for <Process 736 svchost.exe>: C:\igh9o5mq\dll\736.ini 2025-11-19 23:16:03,927 [lib.api.process] INFO: 64-bit DLL to inject is C:\igh9o5mq\dll\xaPJiQM.dll, loader C:\igh9o5mq\bin\opBnJdIX.exe 2025-11-19 23:16:03,938 [root] DEBUG: Loader: Injecting process 736 with C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:16:03,944 [root] DEBUG: 736: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-19 23:16:03,945 [root] DEBUG: 736: Disabling sleep skipping. 2025-11-19 23:16:03,946 [root] DEBUG: 736: Dropped file limit defaulting to 100. 2025-11-19 23:16:03,947 [root] DEBUG: 736: Services hook set enabled 2025-11-19 23:16:03,952 [root] DEBUG: 736: YaraInit: Compiled rules loaded from existing file C:\igh9o5mq\data\yara\capemon.yac 2025-11-19 23:16:03,975 [root] DEBUG: 736: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0 2025-11-19 23:16:03,976 [root] DEBUG: 736: Monitor initialised: 64-bit capemon loaded in process 736 at 0x00007FFEC4670000, thread 3416, image base 0x00007FF630560000, stack from 0x000000408F876000-0x000000408F880000 2025-11-19 23:16:03,977 [root] DEBUG: 736: Commandline: C:\Windows\system32\svchost.exe -k netsvcs -p 2025-11-19 23:16:03,991 [root] DEBUG: 736: Hooked 69 out of 69 functions 2025-11-19 23:16:03,993 [root] INFO: Loaded monitor into process with pid 736 2025-11-19 23:16:03,994 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-11-19 23:16:03,995 [root] DEBUG: Successfully injected DLL C:\igh9o5mq\dll\xaPJiQM.dll. 2025-11-19 23:16:03,998 [lib.api.process] INFO: Injected into 64-bit <Process 736 svchost.exe> 2025-11-19 23:16:06,010 [root] DEBUG: 2784: DLL loaded at 0x00007FFEDC220000: C:\Windows\system32\wbem\wbemprox (0x11000 bytes). 2025-11-19 23:16:06,019 [root] DEBUG: 2784: DLL loaded at 0x00007FFEDB270000: C:\Windows\system32\wbem\wbemsvc (0x14000 bytes). 2025-11-19 23:16:06,041 [root] DEBUG: 2784: DLL loaded at 0x00007FFED9560000: C:\Windows\system32\wbem\wmiutils (0x28000 bytes). 2025-11-19 23:16:06,057 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE09F0000: C:\Windows\SYSTEM32\powrprof (0x4b000 bytes). 2025-11-19 23:16:06,059 [root] DEBUG: 2784: DLL loaded at 0x00007FFECA3F0000: C:\Windows\SYSTEM32\framedynos (0x52000 bytes). 2025-11-19 23:16:06,061 [root] DEBUG: 2784: DLL loaded at 0x00007FFECA0F0000: C:\Windows\system32\wbem\cimwin32 (0x20c000 bytes). 2025-11-19 23:16:06,063 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE09D0000: C:\Windows\SYSTEM32\UMPDC (0x12000 bytes). 2025-11-19 23:16:06,082 [root] DEBUG: 2784: DLL loaded at 0x00007FFECBDA0000: C:\Windows\SYSTEM32\winbrand (0x35000 bytes). 2025-11-19 23:16:06,088 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE0500000: C:\Windows\SYSTEM32\wldp (0x2d000 bytes). 2025-11-19 23:16:06,094 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE0500000: C:\Windows\SYSTEM32\wldp (0x2d000 bytes). 2025-11-19 23:16:06,101 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE0500000: C:\Windows\SYSTEM32\wldp (0x2d000 bytes). 2025-11-19 23:16:06,106 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE0500000: C:\Windows\SYSTEM32\wldp (0x2d000 bytes). 2025-11-19 23:16:06,108 [root] DEBUG: 2784: DLL loaded at 0x0000024AF4D60000: C:\Windows\SYSTEM32\SECURITY (0x3000 bytes). 2025-11-19 23:16:06,110 [root] DEBUG: 2784: DLL loaded at 0x00007FFEDC850000: C:\Windows\SYSTEM32\SECUR32 (0xc000 bytes). 2025-11-19 23:16:06,113 [root] DEBUG: 2784: DLL loaded at 0x00007FFEDFAA0000: C:\Windows\system32\schannel (0x97000 bytes). 2025-11-19 23:16:06,168 [root] DEBUG: 2784: DLL loaded at 0x00007FFED6960000: C:\Windows\SYSTEM32\NETAPI32 (0x19000 bytes). 2025-11-19 23:16:06,171 [root] DEBUG: 2784: DLL loaded at 0x00007FFED5050000: C:\Windows\SYSTEM32\SAMCLI (0x19000 bytes). 2025-11-19 23:16:06,172 [root] DEBUG: 2784: DLL loaded at 0x00007FFED6E00000: C:\Windows\SYSTEM32\SRVCLI (0x28000 bytes). 2025-11-19 23:16:06,175 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE0060000: C:\Windows\SYSTEM32\NETUTILS (0xc000 bytes). 2025-11-19 23:16:06,177 [root] DEBUG: 2784: DLL loaded at 0x00007FFEE0070000: C:\Windows\SYSTEM32\LOGONCLI (0x43000 bytes). 2025-11-19 23:16:06,179 [root] DEBUG: 2784: DLL loaded at 0x00007FFEDC210000: C:\Windows\SYSTEM32\SCHEDCLI (0xc000 bytes). 2025-11-19 23:16:06,181 [root] DEBUG: 2784: DLL loaded at 0x00007FFEDFCF0000: C:\Windows\SYSTEM32\WKSCLI (0x19000 bytes). 2025-11-19 23:16:06,183 [root] DEBUG: 2784: DLL loaded at 0x00007FFEDC560000: C:\Windows\SYSTEM32\DSROLE (0xa000 bytes). 2025-11-19 23:16:06,187 [root] DEBUG: 2784: DLL loaded at 0x00007FFECE280000: C:\Windows\SYSTEM32\cscapi (0x12000 bytes). 2025-11-19 23:16:06,246 [root] DEBUG: 252: CAPEExceptionFilter: Exception 0xc0000005 accessing 0x0 caught at RVA 0xf0418 in capemon (expected in memory scans), passing to next handler. 2025-11-19 23:16:06,259 [root] DEBUG: 252: DLL loaded at 0x00007FFED5F30000: C:\Windows\system32\winhttpcom (0x1e000 bytes). 2025-11-19 23:16:06,267 [root] DEBUG: 252: DLL loaded at 0x00007FFED8A20000: C:\Windows\system32\WINHTTP (0x10a000 bytes). 2025-11-19 23:16:06,279 [root] DEBUG: 252: DLL loaded at 0x00007FFECB2E0000: C:\Windows\system32\OnDemandConnRouteHelper (0x17000 bytes). 2025-11-19 23:16:06,282 [root] DEBUG: 252: DLL loaded at 0x00007FFEC7790000: C:\Windows\system32\webio (0x98000 bytes). 2025-11-19 23:16:06,286 [root] DEBUG: 252: DLL loaded at 0x00007FFEE0260000: C:\Windows\system32\mswsock (0x6a000 bytes). 2025-11-19 23:16:06,290 [root] DEBUG: 252: DLL loaded at 0x00007FFEDFF50000: C:\Windows\system32\IPHLPAPI (0x3b000 bytes). 2025-11-19 23:16:06,293 [root] DEBUG: 252: DLL loaded at 0x00007FFEE2110000: C:\Windows\System32\NSI (0x8000 bytes). 2025-11-19 23:16:06,294 [root] DEBUG: 252: DLL loaded at 0x00007FFEDAE00000: C:\Windows\SYSTEM32\WINNSI (0xb000 bytes). 2025-11-19 23:16:06,310 [root] DEBUG: 252: DLL loaded at 0x00007FFEDFF90000: C:\Windows\SYSTEM32\DNSAPI (0xca000 bytes). 2025-11-19 23:16:06,316 [root] DEBUG: 252: DLL loaded at 0x00007FFED87C0000: C:\Windows\System32\rasadhlp (0xa000 bytes). 2025-11-19 23:16:06,354 [root] DEBUG: 252: DLL loaded at 0x00007FFED8CB0000: C:\Windows\System32\fwpuclnt (0x80000 bytes). 2025-11-19 23:16:06,415 [root] DEBUG: 252: DLL loaded at 0x00007FFEDFAA0000: C:\Windows\system32\schannel (0x97000 bytes). 2025-11-19 23:16:06,510 [root] DEBUG: 608: TLS 1.2 secrets logged to: C:\xvddfc\tlsdump\tlsdump.log 2025-11-19 23:16:06,556 [root] DEBUG: 252: DLL loaded at 0x00007FFECB060000: C:\Windows\SYSTEM32\mskeyprotect (0x15000 bytes). 2025-11-19 23:16:06,557 [root] DEBUG: 252: DLL loaded at 0x00007FFEE0530000: C:\Windows\SYSTEM32\NTASN1 (0x3b000 bytes). 2025-11-19 23:16:06,563 [root] DEBUG: 252: DLL loaded at 0x00007FFEE0570000: C:\Windows\SYSTEM32\ncrypt (0x27000 bytes). 2025-11-19 23:16:06,565 [root] DEBUG: 252: DLL loaded at 0x00007FFECB1A0000: C:\Windows\system32\ncryptsslp (0x26000 bytes). 2025-11-19 23:16:06,572 [root] DEBUG: 252: DLL loaded at 0x00007FFEE0690000: C:\Windows\SYSTEM32\MSASN1 (0x12000 bytes). 2025-11-19 23:16:06,802 [root] DEBUG: 252: DLL loaded at 0x00007FFEC5430000: C:\Windows\system32\mlang (0x42000 bytes). 2025-11-19 23:16:06,853 [root] DEBUG: 252: DLL loaded at 0x00007FFEDFCB0000: C:\Windows\SYSTEM32\ntmarta (0x33000 bytes). 2025-11-19 23:16:06,855 [root] DEBUG: 252: DLL loaded at 0x00007FFEDE0B0000: C:\Windows\System32\CoreMessaging (0xf2000 bytes). 2025-11-19 23:16:06,856 [root] DEBUG: 252: DLL loaded at 0x00007FFEDC8A0000: C:\Windows\SYSTEM32\wintypes (0x155000 bytes). 2025-11-19 23:16:06,857 [root] DEBUG: 252: DLL loaded at 0x00007FFEDDD50000: C:\Windows\System32\CoreUIComponents (0x35b000 bytes). 2025-11-19 23:16:06,857 [root] DEBUG: 252: DLL loaded at 0x00007FFED8F50000: C:\Windows\SYSTEM32\textinputframework (0xf9000 bytes). 2025-11-19 23:17:33,306 [root] DEBUG: 252: NtTerminateProcess hook: Attempting to dump process 252 2025-11-19 23:17:33,309 [root] DEBUG: 252: DoProcessDump: Skipping process dump as code is identical on disk. 2025-11-19 23:17:33,352 [root] INFO: Process with pid 252 has terminated 2025-11-19 23:18:33,294 [root] DEBUG: 2784: NtTerminateProcess hook: Attempting to dump process 2784 2025-11-19 23:18:33,296 [root] DEBUG: 2784: DoProcessDump: Skipping process dump as code is identical on disk. 2025-11-19 23:18:33,301 [root] INFO: Process with pid 2784 has terminated 2025-11-19 23:19:18,914 [root] INFO: Analysis timeout hit, terminating analysis 2025-11-19 23:19:18,915 [lib.api.process] INFO: Terminate event set for <Process 740 svchost.exe> 2025-11-19 23:19:18,917 [root] DEBUG: 740: Terminate Event: Attempting to dump process 740 2025-11-19 23:19:18,918 [root] DEBUG: 740: DoProcessDump: Skipping process dump as code is identical on disk. 2025-11-19 23:19:18,923 [lib.api.process] INFO: Termination confirmed for <Process 740 svchost.exe> 2025-11-19 23:19:18,923 [root] DEBUG: 740: Terminate Event: monitor shutdown complete for process 740 2025-11-19 23:19:18,924 [root] INFO: Terminate event set for process 740 2025-11-19 23:19:18,925 [lib.api.process] INFO: Terminate event set for <Process 736 svchost.exe> 2025-11-19 23:19:18,926 [root] DEBUG: 736: Terminate Event: Attempting to dump process 736 2025-11-19 23:19:18,927 [root] DEBUG: 736: DoProcessDump: Skipping process dump as code is identical on disk. 2025-11-19 23:19:18,931 [root] DEBUG: 736: Terminate Event: monitor shutdown complete for process 736 2025-11-19 23:19:18,931 [lib.api.process] INFO: Termination confirmed for <Process 736 svchost.exe> 2025-11-19 23:19:18,932 [root] INFO: Terminate event set for process 736 2025-11-19 23:19:18,932 [root] INFO: Created shutdown mutex 2025-11-19 23:19:19,945 [root] INFO: Shutting down package 2025-11-19 23:19:19,947 [root] INFO: Stopping auxiliary modules 2025-11-19 23:19:19,947 [root] INFO: Stopping auxiliary module: Browser 2025-11-19 23:19:19,948 [root] INFO: Stopping auxiliary module: Human 2025-11-19 23:19:20,196 [root] INFO: Stopping auxiliary module: Screenshots 2025-11-19 23:19:20,961 [root] INFO: Finishing auxiliary modules 2025-11-19 23:19:20,962 [root] INFO: Shutting down pipe server and dumping dropped files 2025-11-19 23:19:20,963 [root] WARNING: Folder at path "C:\xvddfc\debugger" does not exist, skipping 2025-11-19 23:19:20,964 [root] INFO: Uploading files at path "C:\xvddfc\tlsdump" 2025-11-19 23:19:20,966 [lib.common.results] INFO: Uploading file C:\xvddfc\tlsdump\tlsdump.log to tlsdump\tlsdump.log; Size is 274; Max size: 100000000 2025-11-19 23:19:20,986 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| MalwareGuest | MalwareGuest | Proxmox | 2025-11-19 23:15:50 | 2025-11-19 23:19:31 | internet |
| Direct | IP | Country Name | ASN |
|---|---|---|---|
| N | 172.66.171.73 [VT] | unknown |
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP