Category | Package | Started | Completed | Duration | Options | Log |
---|---|---|---|---|---|---|
FILE | bat | 2025-07-14 09:01:33 | 2025-07-14 09:04:39 | 186 seconds | Show Options | Show Log |
procdump=1
amsidump=1
2024-04-29 04:31:22,843 [root] INFO: Date set to: 20250714T02:01:32, timeout set to: 150 2025-07-14 02:01:32,015 [root] DEBUG: Starting analyzer from: C:\tmp9sa_k9cw 2025-07-14 02:01:32,015 [root] DEBUG: Storing results at: C:\MBqXUh 2025-07-14 02:01:32,015 [root] DEBUG: Pipe server name: \\.\PIPE\LLycEa 2025-07-14 02:01:32,015 [root] DEBUG: Python path: C:\olddocs 2025-07-14 02:01:32,015 [root] DEBUG: No analysis package specified, trying to detect it automagically 2025-07-14 02:01:32,015 [root] INFO: Automatically selected analysis package "bat" 2025-07-14 02:01:32,015 [root] DEBUG: Importing analysis package "bat"... 2025-07-14 02:01:32,031 [root] DEBUG: Initializing analysis package "bat"... 2025-07-14 02:01:32,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a DLL option 2025-07-14 02:01:32,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a DLL_64 option 2025-07-14 02:01:32,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a loader option 2025-07-14 02:01:32,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a loader_64 option 2025-07-14 02:01:32,062 [root] DEBUG: Importing auxiliary module "modules.auxiliary.browser"... 2025-07-14 02:01:32,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.curtain"... 2025-07-14 02:01:32,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.default_apps"... 2025-07-14 02:01:32,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.digisig"... 2025-07-14 02:01:32,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.disguise"... 2025-07-14 02:01:32,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.evtx"... 2025-07-14 02:01:32,156 [root] DEBUG: Importing auxiliary module "modules.auxiliary.fiddler"... 2025-07-14 02:01:32,156 [root] DEBUG: Importing auxiliary module "modules.auxiliary.human"... 2025-07-14 02:01:32,171 [root] DEBUG: Importing auxiliary module "modules.auxiliary.screenshots"... 2025-07-14 02:01:32,171 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2025-07-14 02:01:32,234 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2025-07-14 02:01:32,234 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2025-07-14 02:01:32,249 [root] DEBUG: Importing auxiliary module "modules.auxiliary.sysmon"... 2025-07-14 02:01:32,249 [root] DEBUG: Importing auxiliary module "modules.auxiliary.tlsdump"... 2025-07-14 02:01:32,249 [root] DEBUG: Importing auxiliary module "modules.auxiliary.usage"... 2025-07-14 02:01:32,249 [root] DEBUG: Initializing auxiliary module "Browser"... 2025-07-14 02:01:32,249 [root] DEBUG: Started auxiliary module Browser 2025-07-14 02:01:32,249 [root] DEBUG: Initializing auxiliary module "Curtain"... 2025-07-14 02:01:32,265 [root] DEBUG: Started auxiliary module Curtain 2025-07-14 02:01:32,265 [root] DEBUG: Initializing auxiliary module "DefaultApps"... 2025-07-14 02:01:32,296 [modules.auxiliary.default_apps] DEBUG: Getting current user SID using WinAPI 2025-07-14 02:01:32,296 [root] DEBUG: Started auxiliary module DefaultApps 2025-07-14 02:01:32,296 [root] DEBUG: Initializing auxiliary module "DigiSig"... 2025-07-14 02:01:32,296 [modules.auxiliary.digisig] INFO: signtool.exe was not found in bin/ 2025-07-14 02:01:32,296 [modules.auxiliary.digisig] INFO: dummy 2025-07-14 02:01:32,296 [modules.auxiliary.digisig] INFO: Skipping authenticode validation, unsupported analyzer package 2025-07-14 02:01:32,296 [root] DEBUG: Started auxiliary module DigiSig 2025-07-14 02:01:32,296 [root] DEBUG: Initializing auxiliary module "Disguise"... 2025-07-14 02:01:32,750 [modules.auxiliary.disguise] INFO: Setting NoRecentDocsHistory 2025-07-14 02:01:32,750 [root] WARNING: Cannot execute auxiliary module Disguise: [WinError 2] The system cannot find the file specified 2025-07-14 02:01:32,750 [root] DEBUG: Initializing auxiliary module "Evtx"... 2025-07-14 02:01:32,750 [modules.auxiliary.evtx] INFO: Loading audit policy C:\tmp9sa_k9cw\bin\auditpol.csv 2025-07-14 02:01:32,953 [modules.auxiliary.evtx] INFO: Wiping logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:01:33,750 [root] DEBUG: Started auxiliary module Evtx 2025-07-14 02:01:33,750 [root] DEBUG: Initializing auxiliary module "Fiddler"... 2025-07-14 02:01:33,750 [modules.auxiliary.fiddler] INFO: fiddler package: dummy 2025-07-14 02:01:33,750 [root] DEBUG: Started auxiliary module Fiddler 2025-07-14 02:01:33,750 [root] DEBUG: Initializing auxiliary module "Human"... 2025-07-14 02:01:33,750 [root] DEBUG: Started auxiliary module Human 2025-07-14 02:01:33,750 [root] DEBUG: Initializing auxiliary module "Screenshots"... 2025-07-14 02:01:33,750 [root] DEBUG: Started auxiliary module Screenshots 2025-07-14 02:01:33,750 [root] DEBUG: Initializing auxiliary module "Sysmon"... 2025-07-14 02:01:33,750 [modules.auxiliary.sysmon] INFO: Seeing if we need to update sysmon config 2025-07-14 02:01:33,750 [modules.auxiliary.sysmon] INFO: Found Sysmon Executable 2025-07-14 02:01:33,750 [modules.auxiliary.sysmon] INFO: Found Sysmon config 2025-07-14 02:01:33,750 [root] DEBUG: Started auxiliary module Sysmon 2025-07-14 02:01:33,750 [root] DEBUG: Initializing auxiliary module "TLSDumpMasterSecrets"... 2025-07-14 02:01:33,765 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 556 2025-07-14 02:01:33,765 [lib.api.process] INFO: Monitor config for process 556: C:\tmp9sa_k9cw\dll\556.ini 2025-07-14 02:01:35,859 [modules.auxiliary.sysmon] INFO: Clearing existing sysmon logs 2025-07-14 02:01:36,781 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 02:01:36,781 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 02:01:36,781 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2025-07-14 02:01:36,781 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2025-07-14 02:01:36,781 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmp9sa_k9cw\dll\wsIGEQCj.dll, loader C:\tmp9sa_k9cw\bin\MruuokHy.exe 2025-07-14 02:01:36,796 [root] DEBUG: Loader: Injecting process 556 with C:\tmp9sa_k9cw\dll\wsIGEQCj.dll. 2025-07-14 02:01:36,843 [root] DEBUG: 556: Python path set to 'C:\olddocs'. 2025-07-14 02:01:36,859 [root] DEBUG: 556: Disabling sleep skipping. 2025-07-14 02:01:36,859 [root] DEBUG: 556: Process dumps enabled. 2025-07-14 02:01:36,890 [root] DEBUG: 556: AMSI dumping enabled. 2025-07-14 02:01:36,890 [root] DEBUG: 556: TLS secret dump mode enabled. 2025-07-14 02:01:36,890 [root] DEBUG: 556: Monitor initialised: 64-bit capemon loaded in process 556 at 0x000007FEEC850000, thread 3060, image base 0x00000000FF8A0000, stack from 0x0000000000CF2000-0x0000000000D00000 2025-07-14 02:01:36,921 [root] DEBUG: 556: Commandline: C:\Windows\system32\lsass.exe 2025-07-14 02:01:36,953 [root] DEBUG: 556: Hooked 5 out of 5 functions 2025-07-14 02:01:36,953 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-07-14 02:01:36,953 [root] DEBUG: Successfully injected DLL C:\tmp9sa_k9cw\dll\wsIGEQCj.dll. 2025-07-14 02:01:36,953 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 556 2025-07-14 02:01:36,953 [root] DEBUG: Started auxiliary module TLSDumpMasterSecrets 2025-07-14 02:01:36,953 [root] DEBUG: Initializing auxiliary module "Usage"... 2025-07-14 02:01:36,953 [root] DEBUG: Started auxiliary module Usage 2025-07-14 02:01:39,609 [root] INFO: Restarting WMI Service 2025-07-14 02:01:43,718 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\cmd.exe" with arguments "/c start /wait "" "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat"" with pid 2712 2025-07-14 02:01:43,734 [lib.api.process] INFO: Monitor config for process 2712: C:\tmp9sa_k9cw\dll\2712.ini 2025-07-14 02:01:43,734 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 02:01:43,734 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 02:01:43,734 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2025-07-14 02:01:43,734 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp9sa_k9cw\dll\NMFaFh.dll, loader C:\tmp9sa_k9cw\bin\SNyPNPU.exe 2025-07-14 02:01:43,765 [root] DEBUG: Loader: Injecting process 2712 (thread 2856) with C:\tmp9sa_k9cw\dll\NMFaFh.dll. 2025-07-14 02:01:43,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-07-14 02:01:43,765 [root] DEBUG: Successfully injected DLL C:\tmp9sa_k9cw\dll\NMFaFh.dll. 2025-07-14 02:01:43,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2712 2025-07-14 02:01:45,765 [lib.api.process] INFO: Successfully resumed process with pid 2712 2025-07-14 02:01:45,812 [root] DEBUG: 2712: Python path set to 'C:\olddocs'. 2025-07-14 02:01:45,812 [root] DEBUG: 2712: Disabling sleep skipping. 2025-07-14 02:01:45,812 [root] DEBUG: 2712: Process dumps enabled. 2025-07-14 02:01:45,828 [root] DEBUG: 2712: AMSI dumping enabled. 2025-07-14 02:01:45,828 [root] DEBUG: 2712: Dropped file limit defaulting to 100. 2025-07-14 02:01:45,843 [root] DEBUG: 2712: YaraInit: Compiled 43 rule files 2025-07-14 02:01:45,843 [root] DEBUG: 2712: YaraInit: Compiled rules saved to file C:\tmp9sa_k9cw\data\yara\capemon.yac 2025-07-14 02:01:45,843 [root] DEBUG: 2712: YaraScan: Scanning 0x4A370000, size 0x4bb2e 2025-07-14 02:01:45,843 [root] DEBUG: 2712: Monitor initialised: 32-bit capemon loaded in process 2712 at 0x73a80000, thread 2856, image base 0x4a370000, stack from 0x1b3000-0x2b0000 2025-07-14 02:01:45,843 [root] DEBUG: 2712: Commandline: "C:\Windows\system32\cmd.exe" /c start /wait "" "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat" 2025-07-14 02:01:45,875 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-07-14 02:01:45,875 [root] DEBUG: 2712: set_hooks: Unable to hook GetCommandLineA 2025-07-14 02:01:45,875 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-07-14 02:01:45,875 [root] DEBUG: 2712: set_hooks: Unable to hook GetCommandLineW 2025-07-14 02:01:45,875 [root] DEBUG: 2712: Hooked 615 out of 617 functions 2025-07-14 02:01:45,875 [root] DEBUG: 2712: WoW64 detected: 64-bit ntdll base: 0x76e60000, KiUserExceptionDispatcher: 0x0, NtSetContextThread: 0x76ecb5f0, Wow64PrepareForException: 0x0 2025-07-14 02:01:45,875 [root] DEBUG: 2712: WoW64 workaround: KiUserExceptionDispatcher hook installed at: 0x190000 2025-07-14 02:01:45,890 [root] INFO: Loaded monitor into process with pid 2712 2025-07-14 02:01:45,890 [root] DEBUG: 2712: caller_dispatch: Added region at 0x4A370000 to tracked regions list (ntdll::NtOpenThread returns to 0x4A37732B, thread 2856). 2025-07-14 02:01:45,890 [root] DEBUG: 2712: YaraScan: Scanning 0x4A370000, size 0x4bb2e 2025-07-14 02:01:45,890 [root] DEBUG: 2712: ProcessImageBase: Main module image at 0x4A370000 unmodified (entropy change 0.000000e+00) 2025-07-14 02:01:45,906 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:01:45,906 [root] DEBUG: 2712: CreateProcessHandler: Injection info set for new process 736: C:\Windows\system32\cmd.exe, ImageBase: 0x4A370000 2025-07-14 02:01:45,906 [root] INFO: Announced 32-bit process name: cmd.exe pid: 736 2025-07-14 02:01:45,906 [lib.api.process] INFO: Monitor config for process 736: C:\tmp9sa_k9cw\dll\736.ini 2025-07-14 02:01:45,906 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 02:01:45,906 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 02:01:45,906 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2025-07-14 02:01:45,906 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp9sa_k9cw\dll\NMFaFh.dll, loader C:\tmp9sa_k9cw\bin\SNyPNPU.exe 2025-07-14 02:01:45,921 [root] DEBUG: Loader: Injecting process 736 (thread 1288) with C:\tmp9sa_k9cw\dll\NMFaFh.dll. 2025-07-14 02:01:45,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-07-14 02:01:45,921 [root] DEBUG: Successfully injected DLL C:\tmp9sa_k9cw\dll\NMFaFh.dll. 2025-07-14 02:01:45,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 736 2025-07-14 02:01:45,921 [root] DEBUG: 2712: DLL loaded at 0x72280000: C:\Windows\system32\apphelp (0x4c000 bytes). 2025-07-14 02:01:45,937 [root] WARNING: Received request to inject process with pid 736, skipped alredy in inject list 2025-07-14 02:01:45,953 [root] DEBUG: 736: Python path set to 'C:\olddocs'. 2025-07-14 02:01:45,953 [root] DEBUG: 736: Disabling sleep skipping. 2025-07-14 02:01:45,953 [root] DEBUG: 736: Process dumps enabled. 2025-07-14 02:01:45,953 [root] DEBUG: 736: AMSI dumping enabled. 2025-07-14 02:01:45,953 [root] DEBUG: 736: Dropped file limit defaulting to 100. 2025-07-14 02:01:45,968 [root] DEBUG: 736: YaraInit: Compiled rules loaded from existing file C:\tmp9sa_k9cw\data\yara\capemon.yac 2025-07-14 02:01:45,968 [root] DEBUG: 736: YaraScan: Scanning 0x4A370000, size 0x4bb2e 2025-07-14 02:01:45,968 [root] DEBUG: 736: Monitor initialised: 32-bit capemon loaded in process 736 at 0x73a80000, thread 1288, image base 0x4a370000, stack from 0x2c3000-0x3c0000 2025-07-14 02:01:45,968 [root] DEBUG: 736: Commandline: C:\Windows\system32\cmd.exe /K "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat" 2025-07-14 02:01:45,984 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-07-14 02:01:45,984 [root] DEBUG: 736: set_hooks: Unable to hook GetCommandLineA 2025-07-14 02:01:45,984 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-07-14 02:01:45,984 [root] DEBUG: 736: set_hooks: Unable to hook GetCommandLineW 2025-07-14 02:01:46,000 [root] DEBUG: 736: Hooked 615 out of 617 functions 2025-07-14 02:01:46,000 [root] DEBUG: 736: WoW64 detected: 64-bit ntdll base: 0x76e60000, KiUserExceptionDispatcher: 0x0, NtSetContextThread: 0x76ecb5f0, Wow64PrepareForException: 0x0 2025-07-14 02:01:46,000 [root] DEBUG: 736: WoW64 workaround: KiUserExceptionDispatcher hook installed at: 0x190000 2025-07-14 02:01:46,000 [root] INFO: Loaded monitor into process with pid 736 2025-07-14 02:01:46,000 [root] DEBUG: 736: caller_dispatch: Added region at 0x4A370000 to tracked regions list (ntdll::NtOpenThread returns to 0x4A37732B, thread 1288). 2025-07-14 02:01:46,000 [root] DEBUG: 736: YaraScan: Scanning 0x4A370000, size 0x4bb2e 2025-07-14 02:01:46,015 [root] DEBUG: 736: ProcessImageBase: Main module image at 0x4A370000 unmodified (entropy change 0.000000e+00) 2025-07-14 02:01:46,062 [root] DEBUG: 736: CreateProcessHandler: Injection info set for new process 2528: C:\Windows\system32\calc.exe, ImageBase: 0x00FF0000 2025-07-14 02:01:46,078 [root] INFO: Announced 32-bit process name: calc.exe pid: 2528 2025-07-14 02:01:46,078 [lib.api.process] INFO: Monitor config for process 2528: C:\tmp9sa_k9cw\dll\2528.ini 2025-07-14 02:01:46,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 02:01:46,078 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 02:01:46,078 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2025-07-14 02:01:46,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmp9sa_k9cw\dll\NMFaFh.dll, loader C:\tmp9sa_k9cw\bin\SNyPNPU.exe 2025-07-14 02:01:46,093 [root] DEBUG: Loader: Injecting process 2528 (thread 2388) with C:\tmp9sa_k9cw\dll\NMFaFh.dll. 2025-07-14 02:01:46,093 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-07-14 02:01:46,093 [root] DEBUG: Successfully injected DLL C:\tmp9sa_k9cw\dll\NMFaFh.dll. 2025-07-14 02:01:46,109 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2528 2025-07-14 02:01:46,109 [root] DEBUG: 736: DLL loaded at 0x72280000: C:\Windows\system32\apphelp (0x4c000 bytes). 2025-07-14 02:01:46,125 [root] WARNING: Received request to inject process with pid 2528, skipped alredy in inject list 2025-07-14 02:01:46,140 [root] DEBUG: 2528: Python path set to 'C:\olddocs'. 2025-07-14 02:01:46,140 [root] DEBUG: 2528: Process dumps enabled. 2025-07-14 02:01:46,140 [root] DEBUG: 2528: AMSI dumping enabled. 2025-07-14 02:01:46,140 [root] DEBUG: 2528: Dropped file limit defaulting to 100. 2025-07-14 02:01:46,140 [root] DEBUG: 2528: Disabling sleep skipping. 2025-07-14 02:01:46,140 [root] DEBUG: 2528: YaraInit: Compiled rules loaded from existing file C:\tmp9sa_k9cw\data\yara\capemon.yac 2025-07-14 02:01:46,156 [root] DEBUG: 2528: YaraScan: Scanning 0x00FF0000, size 0xbfb3a 2025-07-14 02:01:46,156 [root] DEBUG: 2528: Monitor initialised: 32-bit capemon loaded in process 2528 at 0x73a80000, thread 2388, image base 0xff0000, stack from 0x2e6000-0x2f0000 2025-07-14 02:01:46,156 [root] DEBUG: 2528: Commandline: calc.exe 2025-07-14 02:01:46,171 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-07-14 02:01:46,187 [root] DEBUG: 2528: set_hooks: Unable to hook GetCommandLineA 2025-07-14 02:01:46,187 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-07-14 02:01:46,187 [root] DEBUG: 2528: set_hooks: Unable to hook GetCommandLineW 2025-07-14 02:01:46,203 [root] DEBUG: 2528: Hooked 615 out of 617 functions 2025-07-14 02:01:46,218 [root] DEBUG: 2528: WoW64 detected: 64-bit ntdll base: 0x76e60000, KiUserExceptionDispatcher: 0x0, NtSetContextThread: 0x76ecb5f0, Wow64PrepareForException: 0x0 2025-07-14 02:01:46,218 [root] DEBUG: 2528: WoW64 workaround: KiUserExceptionDispatcher hook installed at: 0x130000 2025-07-14 02:01:46,234 [root] INFO: Loaded monitor into process with pid 2528 2025-07-14 02:01:46,249 [root] DEBUG: 2528: caller_dispatch: Added region at 0x00FF0000 to tracked regions list (ntdll::NtOpenKey returns to 0x01003433, thread 2388). 2025-07-14 02:01:46,249 [root] DEBUG: 2528: YaraScan: Scanning 0x00FF0000, size 0xbfb3a 2025-07-14 02:01:46,265 [root] DEBUG: 2528: ProcessImageBase: Main module image at 0x00FF0000 unmodified (entropy change 0.000000e+00) 2025-07-14 02:01:46,265 [root] DEBUG: 2528: DLL loaded at 0x737C0000: C:\Windows\SysWOW64\WindowsCodecs (0x130000 bytes). 2025-07-14 02:01:46,281 [root] DEBUG: 2528: DLL loaded at 0x73FE0000: C:\Windows\SysWOW64\dwmapi (0x13000 bytes). 2025-07-14 02:01:46,312 [root] DEBUG: 2528: DLL loaded at 0x74D90000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes). 2025-07-14 02:01:46,494 [root] DEBUG: 2528: DLL loaded at 0x73FA0000: C:\Windows\SysWOW64\oleacc (0x3c000 bytes). 2025-07-14 02:01:48,759 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:01:49,041 [lib.common.results] INFO: File 1752483708978515600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:01:49,056 [lib.common.results] INFO: File 1752483708978515600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:01:49,072 [lib.common.results] INFO: File 1752483708978515600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:01:49,087 [lib.common.results] INFO: File 1752483708978515600.Application.evtx.gz size is 6809, Max size: 100000000 2025-07-14 02:01:49,103 [lib.common.results] INFO: File 1752483709041015600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:01:49,119 [lib.common.results] INFO: File 1752483709056640600.System.evtx.gz size is 8803, Max size: 100000000 2025-07-14 02:01:49,134 [lib.common.results] INFO: File 1752483709041015600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:01:49,150 [lib.common.results] INFO: File 1752483709041015600.Security.evtx.gz size is 7832, Max size: 100000000 2025-07-14 02:01:49,166 [lib.common.results] INFO: File 1752483709103515600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:01:50,978 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483710.9785156.sysmon.evtx.gz to host 2025-07-14 02:01:50,978 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 9844, Max size: 100000000 2025-07-14 02:01:56,884 [lib.common.results] INFO: File c:\olddocs\1752483711884.saz size is 4605, Max size: 100000000 2025-07-14 02:01:56,900 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:02:04,197 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:02:04,447 [lib.common.results] INFO: File 1752483724400390600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:02:04,462 [lib.common.results] INFO: File 1752483724400390600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:02:04,478 [lib.common.results] INFO: File 1752483724400390600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:02:04,494 [lib.common.results] INFO: File 1752483724400390600.Application.evtx.gz size is 6738, Max size: 100000000 2025-07-14 02:02:04,509 [lib.common.results] INFO: File 1752483724462890600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:02:04,509 [lib.common.results] INFO: File 1752483724447265600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:02:04,509 [lib.common.results] INFO: File 1752483724447265600.Security.evtx.gz size is 7835, Max size: 100000000 2025-07-14 02:02:04,525 [lib.common.results] INFO: File 1752483724462890600.System.evtx.gz size is 8567, Max size: 100000000 2025-07-14 02:02:04,541 [lib.common.results] INFO: File 1752483724509765600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:02:05,994 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:02:11,087 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483731.0878906.sysmon.evtx.gz to host 2025-07-14 02:02:11,087 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 18035, Max size: 100000000 2025-07-14 02:02:16,994 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:02:19,572 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:02:19,806 [lib.common.results] INFO: File 1752483739744140600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:02:19,806 [lib.common.results] INFO: File 1752483739744140600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:02:19,822 [lib.common.results] INFO: File 1752483739744140600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:02:19,837 [lib.common.results] INFO: File 1752483739744140600.Application.evtx.gz size is 6738, Max size: 100000000 2025-07-14 02:02:19,853 [lib.common.results] INFO: File 1752483739806640600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:02:19,869 [lib.common.results] INFO: File 1752483739791015600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:02:19,884 [lib.common.results] INFO: File 1752483739806640600.Security.evtx.gz size is 7620, Max size: 100000000 2025-07-14 02:02:19,900 [lib.common.results] INFO: File 1752483739806640600.System.evtx.gz size is 8878, Max size: 100000000 2025-07-14 02:02:19,916 [lib.common.results] INFO: File 1752483739853515600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:02:26,103 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:02:31,166 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483751.1660154.sysmon.evtx.gz to host 2025-07-14 02:02:31,166 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5797, Max size: 100000000 2025-07-14 02:02:34,947 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:02:35,181 [lib.common.results] INFO: File 1752483755119140600.Application.evtx.gz size is 6738, Max size: 100000000 2025-07-14 02:02:35,197 [lib.common.results] INFO: File 1752483755134765600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:02:35,212 [lib.common.results] INFO: File 1752483755150390600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:02:35,228 [lib.common.results] INFO: File 1752483755150390600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:02:35,244 [lib.common.results] INFO: File 1752483755181640600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:02:35,244 [lib.common.results] INFO: File 1752483755181640600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:02:35,244 [lib.common.results] INFO: File 1752483755181640600.Security.evtx.gz size is 7665, Max size: 100000000 2025-07-14 02:02:35,259 [lib.common.results] INFO: File 1752483755197265600.System.evtx.gz size is 8630, Max size: 100000000 2025-07-14 02:02:35,275 [lib.common.results] INFO: File 1752483755228515600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:02:37,072 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:02:46,181 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:02:50,306 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:02:50,556 [lib.common.results] INFO: File 1752483770494140600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:02:50,572 [lib.common.results] INFO: File 1752483770494140600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:02:50,587 [lib.common.results] INFO: File 1752483770494140600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:02:50,603 [lib.common.results] INFO: File 1752483770494140600.Application.evtx.gz size is 6840, Max size: 100000000 2025-07-14 02:02:50,619 [lib.common.results] INFO: File 1752483770556640600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:02:50,634 [lib.common.results] INFO: File 1752483770541015600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:02:50,650 [lib.common.results] INFO: File 1752483770556640600.System.evtx.gz size is 8605, Max size: 100000000 2025-07-14 02:02:50,666 [lib.common.results] INFO: File 1752483770556640600.Security.evtx.gz size is 7115, Max size: 100000000 2025-07-14 02:02:50,681 [lib.common.results] INFO: File 1752483770603515600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:02:51,244 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483771.2441406.sysmon.evtx.gz to host 2025-07-14 02:02:51,244 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5803, Max size: 100000000 2025-07-14 02:02:57,150 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:03:05,712 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:03:05,947 [lib.common.results] INFO: File 1752483785900390600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:03:05,962 [lib.common.results] INFO: File 1752483785900390600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:03:05,978 [lib.common.results] INFO: File 1752483785900390600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:03:05,994 [lib.common.results] INFO: File 1752483785900390600.Application.evtx.gz size is 6770, Max size: 100000000 2025-07-14 02:03:05,994 [lib.common.results] INFO: File 1752483785947265600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:03:06,009 [lib.common.results] INFO: File 1752483785947265600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:03:06,025 [lib.common.results] INFO: File 1752483785947265600.Security.evtx.gz size is 7258, Max size: 100000000 2025-07-14 02:03:06,025 [lib.common.results] INFO: File 1752483785947265600.System.evtx.gz size is 8598, Max size: 100000000 2025-07-14 02:03:06,025 [lib.common.results] INFO: File 1752483785994140600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:03:06,259 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:03:11,322 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483791.3222656.sysmon.evtx.gz to host 2025-07-14 02:03:11,337 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5624, Max size: 100000000 2025-07-14 02:03:17,244 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:03:21,056 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:03:21,275 [lib.common.results] INFO: File 1752483801228515600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:03:21,291 [lib.common.results] INFO: File 1752483801228515600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:03:21,306 [lib.common.results] INFO: File 1752483801228515600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:03:21,322 [lib.common.results] INFO: File 1752483801228515600.Application.evtx.gz size is 6770, Max size: 100000000 2025-07-14 02:03:21,322 [lib.common.results] INFO: File 1752483801275390600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:03:21,337 [lib.common.results] INFO: File 1752483801291015600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:03:21,353 [lib.common.results] INFO: File 1752483801291015600.Security.evtx.gz size is 7256, Max size: 100000000 2025-07-14 02:03:21,369 [lib.common.results] INFO: File 1752483801291015600.System.evtx.gz size is 8626, Max size: 100000000 2025-07-14 02:03:21,384 [lib.common.results] INFO: File 1752483801322265600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:03:26,353 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:03:31,416 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483811.4160156.sysmon.evtx.gz to host 2025-07-14 02:03:31,416 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5509, Max size: 100000000 2025-07-14 02:03:36,416 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:03:36,619 [lib.common.results] INFO: File 1752483816572265600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:03:36,634 [lib.common.results] INFO: File 1752483816587890600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:03:36,650 [lib.common.results] INFO: File 1752483816572265600.Application.evtx.gz size is 6770, Max size: 100000000 2025-07-14 02:03:36,666 [lib.common.results] INFO: File 1752483816587890600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:03:36,681 [lib.common.results] INFO: File 1752483816619140600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:03:36,697 [lib.common.results] INFO: File 1752483816619140600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:03:36,697 [lib.common.results] INFO: File 1752483816619140600.Security.evtx.gz size is 7167, Max size: 100000000 2025-07-14 02:03:36,697 [lib.common.results] INFO: File 1752483816634765600.System.evtx.gz size is 8642, Max size: 100000000 2025-07-14 02:03:36,712 [lib.common.results] INFO: File 1752483816681640600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:03:37,322 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:03:46,431 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:03:51,509 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483831.5097656.sysmon.evtx.gz to host 2025-07-14 02:03:51,509 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5828, Max size: 100000000 2025-07-14 02:03:51,744 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:03:51,962 [lib.common.results] INFO: File 1752483831916015600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:03:51,978 [lib.common.results] INFO: File 1752483831916015600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:03:51,994 [lib.common.results] INFO: File 1752483831916015600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:03:52,009 [lib.common.results] INFO: File 1752483831916015600.Application.evtx.gz size is 6770, Max size: 100000000 2025-07-14 02:03:52,025 [lib.common.results] INFO: File 1752483831962890600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:03:52,041 [lib.common.results] INFO: File 1752483831962890600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:03:52,056 [lib.common.results] INFO: File 1752483831962890600.Security.evtx.gz size is 7344, Max size: 100000000 2025-07-14 02:03:52,072 [lib.common.results] INFO: File 1752483831978515600.System.evtx.gz size is 8607, Max size: 100000000 2025-07-14 02:03:52,087 [lib.common.results] INFO: File 1752483832009765600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:03:57,400 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:04:06,525 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:04:07,119 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:04:07,353 [lib.common.results] INFO: File 1752483847291015600.Application.evtx.gz size is 6770, Max size: 100000000 2025-07-14 02:04:07,369 [lib.common.results] INFO: File 1752483847306640600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:04:07,384 [lib.common.results] INFO: File 1752483847306640600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:04:07,400 [lib.common.results] INFO: File 1752483847306640600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:04:07,416 [lib.common.results] INFO: File 1752483847337890600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:04:07,431 [lib.common.results] INFO: File 1752483847353515600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:04:07,431 [lib.common.results] INFO: File 1752483847353515600.Security.evtx.gz size is 7228, Max size: 100000000 2025-07-14 02:04:07,447 [lib.common.results] INFO: File 1752483847353515600.System.evtx.gz size is 8630, Max size: 100000000 2025-07-14 02:04:07,462 [lib.common.results] INFO: File 1752483847400390600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:04:11,603 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483851.6035156.sysmon.evtx.gz to host 2025-07-14 02:04:11,603 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5634, Max size: 100000000 2025-07-14 02:04:16,775 [root] INFO: Analysis timeout hit, terminating analysis 2025-07-14 02:04:16,775 [lib.api.process] INFO: Terminate event set for process 2712 2025-07-14 02:04:16,775 [root] DEBUG: 2712: Terminate Event: Attempting to dump process 2712 2025-07-14 02:04:16,775 [root] DEBUG: 2712: DoProcessDump: Skipping process dump as code is identical on disk. 2025-07-14 02:04:16,775 [lib.api.process] INFO: Termination confirmed for process 2712 2025-07-14 02:04:16,775 [root] INFO: Terminate event set for process 2712 2025-07-14 02:04:16,775 [root] DEBUG: 2712: Terminate Event: monitor shutdown complete for process 2712 2025-07-14 02:04:16,791 [lib.api.process] INFO: Terminate event set for process 736 2025-07-14 02:04:16,791 [root] DEBUG: 736: Terminate Event: Attempting to dump process 736 2025-07-14 02:04:16,791 [root] DEBUG: 736: DoProcessDump: Skipping process dump as code is identical on disk. 2025-07-14 02:04:16,791 [lib.api.process] INFO: Termination confirmed for process 736 2025-07-14 02:04:16,791 [root] INFO: Terminate event set for process 736 2025-07-14 02:04:16,791 [root] DEBUG: 736: Terminate Event: monitor shutdown complete for process 736 2025-07-14 02:04:16,791 [lib.api.process] INFO: Terminate event set for process 2528 2025-07-14 02:04:16,791 [root] DEBUG: 2528: Terminate Event: Attempting to dump process 2528 2025-07-14 02:04:16,791 [root] DEBUG: 2528: DoProcessDump: Skipping process dump as code is identical on disk. 2025-07-14 02:04:16,806 [lib.api.process] INFO: Termination confirmed for process 2528 2025-07-14 02:04:16,806 [root] INFO: Terminate event set for process 2528 2025-07-14 02:04:16,806 [root] DEBUG: 2528: Terminate Event: monitor shutdown complete for process 2528 2025-07-14 02:04:16,806 [root] INFO: Created shutdown mutex 2025-07-14 02:04:17,494 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:04:17,806 [root] INFO: Shutting down package 2025-07-14 02:04:17,806 [root] INFO: Stopping auxiliary modules 2025-07-14 02:04:17,806 [modules.auxiliary.curtain] ERROR: Curtain - Error collecting PowerShell events - [WinError 6] The handle is invalid 2025-07-14 02:04:17,806 [lib.common.results] INFO: File C:\curtain.log size is 0, Max size: 100000000 2025-07-14 02:04:17,822 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:04:18,041 [lib.common.results] INFO: File 1752483857994140600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:04:18,056 [lib.common.results] INFO: File 1752483857994140600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:04:18,072 [lib.common.results] INFO: File 1752483857994140600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:04:18,087 [lib.common.results] INFO: File 1752483857994140600.Application.evtx.gz size is 6770, Max size: 100000000 2025-07-14 02:04:18,103 [lib.common.results] INFO: File 1752483858041015600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:04:18,119 [lib.common.results] INFO: File 1752483858041015600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:04:18,134 [lib.common.results] INFO: File 1752483858041015600.Security.evtx.gz size is 7279, Max size: 100000000 2025-07-14 02:04:18,150 [lib.common.results] INFO: File 1752483858041015600.System.evtx.gz size is 8594, Max size: 100000000 2025-07-14 02:04:18,166 [lib.common.results] INFO: File 1752483858072265600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:04:22,509 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 02:04:22,712 [lib.common.results] INFO: File 1752483862681640600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2025-07-14 02:04:22,728 [lib.common.results] INFO: File 1752483862681640600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2025-07-14 02:04:22,744 [lib.common.results] INFO: File 1752483862681640600.Application.evtx.gz size is 6770, Max size: 100000000 2025-07-14 02:04:22,759 [lib.common.results] INFO: File 1752483862712890600.KeyManagementService.evtx.gz size is 227, Max size: 100000000 2025-07-14 02:04:22,775 [lib.common.results] INFO: File 1752483862712890600.OAlerts.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:04:22,791 [lib.common.results] INFO: File 1752483862728515600.Setup.evtx.gz size is 247, Max size: 100000000 2025-07-14 02:04:22,806 [lib.common.results] INFO: File 1752483862712890600.Security.evtx.gz size is 7073, Max size: 100000000 2025-07-14 02:04:22,822 [lib.common.results] INFO: File 1752483862759765600.WindowsPowerShell.evtx.gz size is 256, Max size: 100000000 2025-07-14 02:04:22,837 [lib.common.results] INFO: File 1752483862759765600.System.evtx.gz size is 8620, Max size: 100000000 2025-07-14 02:04:23,275 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 02:04:23,275 [modules.auxiliary.sysmon] INFO: Doing final sysmon log dump 2025-07-14 02:04:26,619 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 02:04:28,337 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752483868.3378906.sysmon.evtx.gz to host 2025-07-14 02:04:28,337 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5215, Max size: 100000000 2025-07-14 02:04:28,353 [root] INFO: Finishing auxiliary modules 2025-07-14 02:04:28,353 [root] INFO: Shutting down pipe server and dumping dropped files 2025-07-14 02:04:28,353 [root] WARNING: Folder at path "C:\MBqXUh\debugger" does not exist, skipping 2025-07-14 02:04:28,353 [root] WARNING: Folder at path "C:\MBqXUh\tlsdump" does not exist, skipping 2025-07-14 02:04:28,353 [root] INFO: Analysis completed
Name | Label | Manager | Started On | Shutdown On | Route |
---|---|---|---|---|---|
win7office2k3flash2800137TWN3H102 | win7office2k3flash2800137TWN3H102 | KVM | 2025-07-14 09:01:33 | 2025-07-14 09:04:39 | internet |
File Name | opencalc.bat |
---|---|
File Size | 9 bytes |
File Type | ASCII text |
MD5 | c61463921d79e07e461fd0e731f72619 |
SHA1 | 4c70ac1680d2c4bdb145d5be5dad5230b20805f2 |
SHA256 | 7fdf626e0603f5bc2375a7bbc92c94a21088841c0a03cf3c5f12aa9c680ce4e6 |
SHA512 | 1a0ada808250064beaafad6095f6d12b0a26ddeb0aff616205986dc4db7c4e72686701945bfb948a141a5f6db0d0e6cec29cd2fddc59ba07a9279a93a7e3541e |
SHA3-384 | b61a7654e9f55c8d3f21ad0e18325fb9d987f7baece23caa7b5803b1ed18cc0603d1cc5a57f344355e3e08a0950fcd36 |
CRC32 | 8D648BCF |
Ssdeep | 3:FGLAdK:FbK |
File
|
|
calc.exe |
|
Direct | IP | Country Name |
---|---|---|
Y | 8.8.8.8 [VT] | United States |
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP