Category | Package | Started | Completed | Duration | Options | Log |
---|---|---|---|---|---|---|
FILE | js | 2025-07-14 10:34:04 | 2025-07-14 10:39:18 | 314 seconds | Show Options | Show Log |
procdump=1
amsidump=1
2024-04-29 04:32:59,031 [root] INFO: Date set to: 20250714T03:34:03, timeout set to: 280 2025-07-14 03:34:03,015 [root] DEBUG: Starting analyzer from: C:\tmpd65zellw 2025-07-14 03:34:03,015 [root] DEBUG: Storing results at: C:\AJTYXNpIQ 2025-07-14 03:34:03,015 [root] DEBUG: Pipe server name: \\.\PIPE\vFLFqRLBVT 2025-07-14 03:34:03,015 [root] DEBUG: Python path: C:\olddocs 2025-07-14 03:34:03,015 [root] DEBUG: No analysis package specified, trying to detect it automagically 2025-07-14 03:34:03,015 [root] INFO: Automatically selected analysis package "js" 2025-07-14 03:34:03,015 [root] DEBUG: Importing analysis package "js"... 2025-07-14 03:34:03,015 [root] DEBUG: Initializing analysis package "js"... 2025-07-14 03:34:03,015 [root] INFO: Analyzer: Package modules.packages.js does not specify a DLL option 2025-07-14 03:34:03,015 [root] INFO: Analyzer: Package modules.packages.js does not specify a DLL_64 option 2025-07-14 03:34:03,015 [root] INFO: Analyzer: Package modules.packages.js does not specify a loader option 2025-07-14 03:34:03,015 [root] INFO: Analyzer: Package modules.packages.js does not specify a loader_64 option 2025-07-14 03:34:03,031 [root] DEBUG: Importing auxiliary module "modules.auxiliary.browser"... 2025-07-14 03:34:03,046 [root] DEBUG: Importing auxiliary module "modules.auxiliary.curtain"... 2025-07-14 03:34:03,046 [root] DEBUG: Importing auxiliary module "modules.auxiliary.default_apps"... 2025-07-14 03:34:03,046 [root] DEBUG: Importing auxiliary module "modules.auxiliary.digisig"... 2025-07-14 03:34:03,062 [root] DEBUG: Importing auxiliary module "modules.auxiliary.disguise"... 2025-07-14 03:34:03,062 [root] DEBUG: Importing auxiliary module "modules.auxiliary.evtx"... 2025-07-14 03:34:03,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.fiddler"... 2025-07-14 03:34:03,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.human"... 2025-07-14 03:34:03,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.screenshots"... 2025-07-14 03:34:03,093 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2025-07-14 03:34:03,140 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2025-07-14 03:34:03,156 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2025-07-14 03:34:03,156 [root] DEBUG: Importing auxiliary module "modules.auxiliary.sysmon"... 2025-07-14 03:34:03,156 [root] DEBUG: Importing auxiliary module "modules.auxiliary.tlsdump"... 2025-07-14 03:34:03,156 [root] DEBUG: Importing auxiliary module "modules.auxiliary.usage"... 2025-07-14 03:34:03,156 [root] DEBUG: Initializing auxiliary module "Browser"... 2025-07-14 03:34:03,156 [root] DEBUG: Started auxiliary module Browser 2025-07-14 03:34:03,156 [root] DEBUG: Initializing auxiliary module "Curtain"... 2025-07-14 03:34:03,171 [root] DEBUG: Started auxiliary module Curtain 2025-07-14 03:34:03,171 [root] DEBUG: Initializing auxiliary module "DefaultApps"... 2025-07-14 03:34:03,203 [modules.auxiliary.default_apps] DEBUG: Getting current user SID using WinAPI 2025-07-14 03:34:03,203 [root] DEBUG: Started auxiliary module DefaultApps 2025-07-14 03:34:03,203 [root] DEBUG: Initializing auxiliary module "DigiSig"... 2025-07-14 03:34:03,203 [modules.auxiliary.digisig] INFO: signtool.exe was not found in bin/ 2025-07-14 03:34:03,203 [modules.auxiliary.digisig] INFO: dummy 2025-07-14 03:34:03,203 [modules.auxiliary.digisig] INFO: Skipping authenticode validation, unsupported analyzer package 2025-07-14 03:34:03,203 [root] DEBUG: Started auxiliary module DigiSig 2025-07-14 03:34:03,203 [root] DEBUG: Initializing auxiliary module "Disguise"... 2025-07-14 03:34:03,531 [modules.auxiliary.disguise] INFO: Setting NoRecentDocsHistory 2025-07-14 03:34:03,531 [root] WARNING: Cannot execute auxiliary module Disguise: [WinError 2] The system cannot find the file specified 2025-07-14 03:34:03,531 [root] DEBUG: Initializing auxiliary module "Evtx"... 2025-07-14 03:34:03,546 [modules.auxiliary.evtx] INFO: Loading audit policy C:\tmpd65zellw\bin\auditpol.csv 2025-07-14 03:34:03,781 [modules.auxiliary.evtx] INFO: Wiping logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:34:04,453 [root] DEBUG: Started auxiliary module Evtx 2025-07-14 03:34:04,453 [root] DEBUG: Initializing auxiliary module "Fiddler"... 2025-07-14 03:34:04,453 [modules.auxiliary.fiddler] INFO: fiddler package: dummy 2025-07-14 03:34:04,468 [root] DEBUG: Started auxiliary module Fiddler 2025-07-14 03:34:04,468 [root] DEBUG: Initializing auxiliary module "Human"... 2025-07-14 03:34:04,468 [root] DEBUG: Started auxiliary module Human 2025-07-14 03:34:04,468 [root] DEBUG: Initializing auxiliary module "Screenshots"... 2025-07-14 03:34:04,468 [root] DEBUG: Started auxiliary module Screenshots 2025-07-14 03:34:04,468 [root] DEBUG: Initializing auxiliary module "Sysmon"... 2025-07-14 03:34:04,468 [modules.auxiliary.sysmon] INFO: Seeing if we need to update sysmon config 2025-07-14 03:34:04,468 [root] DEBUG: Started auxiliary module Sysmon 2025-07-14 03:34:04,468 [root] DEBUG: Initializing auxiliary module "TLSDumpMasterSecrets"... 2025-07-14 03:34:04,468 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 556 2025-07-14 03:34:04,468 [lib.api.process] INFO: Monitor config for process 556: C:\tmpd65zellw\dll\556.ini 2025-07-14 03:34:04,468 [modules.auxiliary.sysmon] INFO: Found Sysmon Executable 2025-07-14 03:34:04,468 [modules.auxiliary.sysmon] INFO: Found Sysmon config 2025-07-14 03:34:06,562 [modules.auxiliary.sysmon] INFO: Clearing existing sysmon logs 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'disable_hook_content' with value '3' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'injection' with value '0' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'caller_dump' with value '0' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'ntdll_protoect' with value '0' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'compression' with value '0' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2025-07-14 03:34:07,484 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpd65zellw\dll\AQErat.dll, loader C:\tmpd65zellw\bin\OQUAtNTA.exe 2025-07-14 03:34:07,515 [root] DEBUG: Loader: Injecting process 556 with C:\tmpd65zellw\dll\AQErat.dll. 2025-07-14 03:34:07,562 [root] DEBUG: 556: Python path set to 'C:\olddocs'. 2025-07-14 03:34:07,562 [root] DEBUG: 556: Disabling sleep skipping. 2025-07-14 03:34:07,562 [root] DEBUG: 556: Process dumps enabled. 2025-07-14 03:34:07,562 [root] DEBUG: 556: AMSI dumping enabled. 2025-07-14 03:34:07,562 [root] DEBUG: 556: In-monitor YARA scans disabled. 2025-07-14 03:34:07,562 [root] DEBUG: 556: Monitor config - unrecognised key caller_dump. 2025-07-14 03:34:07,562 [root] DEBUG: 556: Monitor config - unrecognised key ntdll_protoect. 2025-07-14 03:34:07,562 [root] DEBUG: 556: Monitor config - unrecognised key compression. 2025-07-14 03:34:07,562 [root] DEBUG: 556: TLS secret dump mode enabled. 2025-07-14 03:34:07,578 [root] DEBUG: 556: Monitor initialised: 64-bit capemon loaded in process 556 at 0x000007FEED310000, thread 2488, image base 0x00000000FFF80000, stack from 0x0000000002372000-0x0000000002380000 2025-07-14 03:34:07,578 [root] DEBUG: 556: Commandline: C:\Windows\system32\lsass.exe 2025-07-14 03:34:07,578 [root] DEBUG: 556: Hooked 5 out of 5 functions 2025-07-14 03:34:07,578 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-07-14 03:34:07,578 [root] DEBUG: Successfully injected DLL C:\tmpd65zellw\dll\AQErat.dll. 2025-07-14 03:34:07,593 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 556 2025-07-14 03:34:07,593 [root] DEBUG: Started auxiliary module TLSDumpMasterSecrets 2025-07-14 03:34:07,593 [root] DEBUG: Initializing auxiliary module "Usage"... 2025-07-14 03:34:07,593 [root] DEBUG: Started auxiliary module Usage 2025-07-14 03:34:10,203 [root] INFO: Restarting WMI Service 2025-07-14 03:34:14,296 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\wscript.exe" with arguments ""C:\Users\pgabriel\AppData\Local\Temp\PointDragControls.js"" with pid 700 2025-07-14 03:34:14,296 [lib.api.process] INFO: Monitor config for process 700: C:\tmpd65zellw\dll\700.ini 2025-07-14 03:34:14,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 03:34:14,312 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 03:34:14,312 [lib.api.process] INFO: Option 'disable_hook_content' with value '3' sent to monitor 2025-07-14 03:34:14,312 [lib.api.process] INFO: Option 'injection' with value '0' sent to monitor 2025-07-14 03:34:14,312 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor 2025-07-14 03:34:14,312 [lib.api.process] INFO: Option 'caller_dump' with value '0' sent to monitor 2025-07-14 03:34:14,312 [lib.api.process] INFO: Option 'ntdll_protoect' with value '0' sent to monitor 2025-07-14 03:34:14,312 [lib.api.process] INFO: Option 'compression' with value '0' sent to monitor 2025-07-14 03:34:14,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpd65zellw\dll\JPjTMI.dll, loader C:\tmpd65zellw\bin\OFvnnpn.exe 2025-07-14 03:34:14,328 [root] DEBUG: Loader: Injecting process 700 (thread 352) with C:\tmpd65zellw\dll\JPjTMI.dll. 2025-07-14 03:34:14,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-07-14 03:34:14,328 [root] DEBUG: Successfully injected DLL C:\tmpd65zellw\dll\JPjTMI.dll. 2025-07-14 03:34:14,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 700 2025-07-14 03:34:16,328 [lib.api.process] INFO: Successfully resumed process with pid 700 2025-07-14 03:34:16,343 [root] DEBUG: 700: Python path set to 'C:\olddocs'. 2025-07-14 03:34:16,343 [root] DEBUG: 700: Disabling sleep skipping. 2025-07-14 03:34:16,343 [root] DEBUG: 700: Process dumps enabled. 2025-07-14 03:34:16,343 [root] DEBUG: 700: AMSI dumping enabled. 2025-07-14 03:34:16,343 [root] DEBUG: 700: In-monitor YARA scans disabled. 2025-07-14 03:34:16,343 [root] DEBUG: 700: Monitor config - unrecognised key caller_dump. 2025-07-14 03:34:16,343 [root] DEBUG: 700: Monitor config - unrecognised key ntdll_protoect. 2025-07-14 03:34:16,343 [root] DEBUG: 700: Monitor config - unrecognised key compression. 2025-07-14 03:34:16,343 [root] DEBUG: 700: Dropped file limit defaulting to 100. 2025-07-14 03:34:16,359 [root] DEBUG: 700: wscript hook set enabled 2025-07-14 03:34:16,359 [root] DEBUG: 700: Monitor initialised: 32-bit capemon loaded in process 700 at 0x74010000, thread 352, image base 0x30000, stack from 0x433000-0x440000 2025-07-14 03:34:16,359 [root] DEBUG: 700: Commandline: "C:\Windows\system32\wscript.exe" "C:\Users\pgabriel\AppData\Local\Temp\PointDragControls.js" 2025-07-14 03:34:16,375 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-07-14 03:34:16,375 [root] DEBUG: 700: set_hooks: Unable to hook GetCommandLineA 2025-07-14 03:34:16,375 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-07-14 03:34:16,375 [root] DEBUG: 700: set_hooks: Unable to hook GetCommandLineW 2025-07-14 03:34:16,375 [root] DEBUG: 700: Hooked 615 out of 617 functions 2025-07-14 03:34:16,390 [root] DEBUG: 700: WoW64 detected: 64-bit ntdll base: 0x773f0000, KiUserExceptionDispatcher: 0x0, NtSetContextThread: 0x7745b5f0, Wow64PrepareForException: 0x0 2025-07-14 03:34:16,390 [root] DEBUG: 700: WoW64 workaround: KiUserExceptionDispatcher hook installed at: 0x160000 2025-07-14 03:34:16,390 [root] INFO: Loaded monitor into process with pid 700 2025-07-14 03:34:16,390 [root] DEBUG: 700: DLL loaded at 0x733D0000: C:\Windows\system32\uxtheme (0x80000 bytes). 2025-07-14 03:34:16,437 [root] DEBUG: 700: DLL loaded at 0x74570000: C:\Windows\SysWOW64\SXS (0x5f000 bytes). 2025-07-14 03:34:16,437 [root] DEBUG: 700: DLL loaded at 0x74550000: C:\Windows\SysWOW64\dwmapi (0x13000 bytes). 2025-07-14 03:34:16,437 [root] DEBUG: 700: DLL loaded at 0x76610000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes). 2025-07-14 03:34:16,437 [root] DEBUG: 700: DLL loaded at 0x73F60000: C:\Windows\SysWOW64\jscript (0xa6000 bytes). 2025-07-14 03:34:16,437 [root] INFO: got call to handle interop inside dcom lock 2025-07-14 03:34:16,453 [root] INFO: \Device\HarddiskVolume2\Windows\System32\svchost.exe 2025-07-14 03:34:16,453 [lib.api.process] INFO: Monitor config for process 664: C:\tmpd65zellw\dll\664.ini 2025-07-14 03:34:16,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 03:34:16,453 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 03:34:16,453 [lib.api.process] INFO: Option 'disable_hook_content' with value '3' sent to monitor 2025-07-14 03:34:16,453 [lib.api.process] INFO: Option 'injection' with value '0' sent to monitor 2025-07-14 03:34:16,453 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor 2025-07-14 03:34:16,453 [lib.api.process] INFO: Option 'caller_dump' with value '0' sent to monitor 2025-07-14 03:34:16,453 [lib.api.process] INFO: Option 'ntdll_protoect' with value '0' sent to monitor 2025-07-14 03:34:16,453 [lib.api.process] INFO: Option 'compression' with value '0' sent to monitor 2025-07-14 03:34:16,453 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpd65zellw\dll\AQErat.dll, loader C:\tmpd65zellw\bin\OQUAtNTA.exe 2025-07-14 03:34:16,468 [root] DEBUG: Loader: Injecting process 664 with C:\tmpd65zellw\dll\AQErat.dll. 2025-07-14 03:34:16,468 [root] DEBUG: 664: Python path set to 'C:\olddocs'. 2025-07-14 03:34:16,468 [root] DEBUG: 664: Disabling sleep skipping. 2025-07-14 03:34:16,468 [root] DEBUG: 664: Process dumps enabled. 2025-07-14 03:34:16,468 [root] DEBUG: 664: AMSI dumping enabled. 2025-07-14 03:34:16,468 [root] DEBUG: 664: In-monitor YARA scans disabled. 2025-07-14 03:34:16,468 [root] DEBUG: 664: Monitor config - unrecognised key caller_dump. 2025-07-14 03:34:16,468 [root] DEBUG: 664: Monitor config - unrecognised key ntdll_protoect. 2025-07-14 03:34:16,468 [root] DEBUG: 664: Monitor config - unrecognised key compression. 2025-07-14 03:34:16,468 [root] DEBUG: 664: Dropped file limit defaulting to 100. 2025-07-14 03:34:16,468 [root] DEBUG: 664: parent_has_path: unable to get path for parent process 544 2025-07-14 03:34:16,484 [root] DEBUG: 664: Monitor initialised: 64-bit capemon loaded in process 664 at 0x000007FEED310000, thread 2512, image base 0x00000000FF290000, stack from 0x00000000011C3000-0x00000000011D0000 2025-07-14 03:34:16,484 [root] DEBUG: 664: Commandline: C:\Windows\system32\svchost.exe -k DcomLaunch 2025-07-14 03:34:16,515 [root] WARNING: b'Unable to place hook on LockResource' 2025-07-14 03:34:16,515 [root] DEBUG: 664: set_hooks: Unable to hook LockResource 2025-07-14 03:34:16,531 [root] DEBUG: 664: Hooked 609 out of 610 functions 2025-07-14 03:34:16,531 [root] INFO: Loaded monitor into process with pid 664 2025-07-14 03:34:16,546 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-07-14 03:34:16,546 [root] DEBUG: Successfully injected DLL C:\tmpd65zellw\dll\AQErat.dll. 2025-07-14 03:34:16,546 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 664 2025-07-14 03:34:16,562 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:34:18,546 [root] DEBUG: 700: DLL loaded at 0x767B0000: C:\Windows\syswow64\WINTRUST (0x2f000 bytes). 2025-07-14 03:34:18,562 [root] DEBUG: 700: DLL loaded at 0x732D0000: C:\Windows\SysWOW64\CRYPTSP (0x17000 bytes). 2025-07-14 03:34:18,562 [root] DEBUG: 700: DLL loaded at 0x73290000: C:\Windows\system32\rsaenh (0x3b000 bytes). 2025-07-14 03:34:18,562 [root] DEBUG: 700: DLL loaded at 0x74540000: C:\Windows\SysWOW64\MSISIP (0x8000 bytes). 2025-07-14 03:34:18,578 [root] DEBUG: 700: DLL loaded at 0x74520000: C:\Windows\SysWOW64\wshext (0x16000 bytes). 2025-07-14 03:34:18,578 [root] DEBUG: 700: DLL loaded at 0x73ED0000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\COMCTL32 (0x84000 bytes). 2025-07-14 03:34:18,578 [root] DEBUG: 700: DLL loaded at 0x75340000: C:\Windows\syswow64\SHELL32 (0xc4a000 bytes). 2025-07-14 03:34:18,578 [root] DEBUG: 700: DLL loaded at 0x73EA0000: C:\Windows\SysWOW64\scrobj (0x2d000 bytes). 2025-07-14 03:34:19,266 [modules.auxiliary.human] INFO: Found button "OK", clicking it 2025-07-14 03:34:19,454 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:34:19,696 [lib.common.results] INFO: File 1752489259649414000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:34:19,711 [lib.common.results] INFO: File 1752489259649414000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:34:19,727 [lib.common.results] INFO: File 1752489259649414000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:34:19,743 [lib.common.results] INFO: File 1752489259649414000.Application.evtx.gz size is 6787, Max size: 100000000 2025-07-14 03:34:19,758 [lib.common.results] INFO: File 1752489259696289000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:34:19,774 [lib.common.results] INFO: File 1752489259711914000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:34:19,774 [lib.common.results] INFO: File 1752489259711914000.Security.evtx.gz size is 7830, Max size: 100000000 2025-07-14 03:34:19,790 [lib.common.results] INFO: File 1752489259711914000.System.evtx.gz size is 8775, Max size: 100000000 2025-07-14 03:34:19,805 [lib.common.results] INFO: File 1752489259758789000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:34:20,290 [root] DEBUG: 700: NtTerminateProcess hook: Attempting to dump process 700 2025-07-14 03:34:20,290 [root] DEBUG: 700: DoProcessDump: Skipping process dump as code is identical on disk. 2025-07-14 03:34:20,290 [root] INFO: Process with pid 700 has terminated 2025-07-14 03:34:21,649 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489261.6494138.sysmon.evtx.gz to host 2025-07-14 03:34:21,665 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 8783, Max size: 100000000 2025-07-14 03:34:27,555 [lib.common.results] INFO: File c:\olddocs\1752489262555.saz size is 4599, Max size: 100000000 2025-07-14 03:34:27,571 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:34:34,836 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:34:35,102 [lib.common.results] INFO: File 1752489275055664000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:34:35,118 [lib.common.results] INFO: File 1752489275040039000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:34:35,118 [lib.common.results] INFO: File 1752489275040039000.Application.evtx.gz size is 6713, Max size: 100000000 2025-07-14 03:34:35,133 [lib.common.results] INFO: File 1752489275055664000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:34:35,165 [lib.common.results] INFO: File 1752489275102539000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:34:35,180 [lib.common.results] INFO: File 1752489275102539000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:34:35,196 [lib.common.results] INFO: File 1752489275102539000.Security.evtx.gz size is 7547, Max size: 100000000 2025-07-14 03:34:35,211 [lib.common.results] INFO: File 1752489275118164000.System.evtx.gz size is 8469, Max size: 100000000 2025-07-14 03:34:35,227 [lib.common.results] INFO: File 1752489275165039000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:34:36,665 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:34:41,758 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489281.758789.sysmon.evtx.gz to host 2025-07-14 03:34:41,758 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 12595, Max size: 100000000 2025-07-14 03:34:47,665 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:34:50,258 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:34:50,508 [lib.common.results] INFO: File 1752489290446289000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:34:50,508 [lib.common.results] INFO: File 1752489290446289000.Application.evtx.gz size is 6713, Max size: 100000000 2025-07-14 03:34:50,540 [lib.common.results] INFO: File 1752489290461914000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:34:50,540 [lib.common.results] INFO: File 1752489290477539000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:34:50,555 [lib.common.results] INFO: File 1752489290493164000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:34:50,571 [lib.common.results] INFO: File 1752489290508789000.Security.evtx.gz size is 7249, Max size: 100000000 2025-07-14 03:34:50,586 [lib.common.results] INFO: File 1752489290524414000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:34:50,602 [lib.common.results] INFO: File 1752489290555664000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:34:50,618 [lib.common.results] INFO: File 1752489290540039000.System.evtx.gz size is 8360, Max size: 100000000 2025-07-14 03:34:56,774 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:35:01,852 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489301.8525388.sysmon.evtx.gz to host 2025-07-14 03:35:01,852 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5891, Max size: 100000000 2025-07-14 03:35:05,665 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:35:05,946 [lib.common.results] INFO: File 1752489305868164000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:35:05,961 [lib.common.results] INFO: File 1752489305899414000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:35:05,977 [lib.common.results] INFO: File 1752489305868164000.Application.evtx.gz size is 6713, Max size: 100000000 2025-07-14 03:35:06,008 [lib.common.results] INFO: File 1752489305930664000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:35:06,008 [lib.common.results] INFO: File 1752489305946289000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:35:06,024 [lib.common.results] INFO: File 1752489305946289000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:35:06,024 [lib.common.results] INFO: File 1752489305946289000.Security.evtx.gz size is 7299, Max size: 100000000 2025-07-14 03:35:06,055 [lib.common.results] INFO: File 1752489306008789000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:35:06,055 [lib.common.results] INFO: File 1752489306008789000.System.evtx.gz size is 8351, Max size: 100000000 2025-07-14 03:35:07,758 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:35:16,868 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:35:21,086 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:35:21,336 [lib.common.results] INFO: File 1752489321290039000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:35:21,368 [lib.common.results] INFO: File 1752489321305664000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:35:21,383 [lib.common.results] INFO: File 1752489321290039000.Application.evtx.gz size is 6916, Max size: 100000000 2025-07-14 03:35:21,399 [lib.common.results] INFO: File 1752489321321289000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:35:21,415 [lib.common.results] INFO: File 1752489321336914000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:35:21,430 [lib.common.results] INFO: File 1752489321368164000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:35:21,430 [lib.common.results] INFO: File 1752489321352539000.Security.evtx.gz size is 7063, Max size: 100000000 2025-07-14 03:35:21,461 [lib.common.results] INFO: File 1752489321399414000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:35:21,461 [lib.common.results] INFO: File 1752489321399414000.System.evtx.gz size is 8355, Max size: 100000000 2025-07-14 03:35:21,930 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489321.9306638.sysmon.evtx.gz to host 2025-07-14 03:35:21,930 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 6196, Max size: 100000000 2025-07-14 03:35:27,821 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:35:36,493 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:35:36,790 [lib.common.results] INFO: File 1752489336727539000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:35:36,805 [lib.common.results] INFO: File 1752489336711914000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:35:36,805 [lib.common.results] INFO: File 1752489336743164000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:35:36,852 [lib.common.results] INFO: File 1752489336774414000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:35:36,868 [lib.common.results] INFO: File 1752489336790039000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:35:36,868 [lib.common.results] INFO: File 1752489336805664000.Security.evtx.gz size is 7284, Max size: 100000000 2025-07-14 03:35:36,883 [lib.common.results] INFO: File 1752489336805664000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:35:36,899 [lib.common.results] INFO: File 1752489336852539000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:35:36,915 [lib.common.results] INFO: File 1752489336852539000.System.evtx.gz size is 8343, Max size: 100000000 2025-07-14 03:35:36,946 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:35:42,024 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489342.024414.sysmon.evtx.gz to host 2025-07-14 03:35:42,024 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5930, Max size: 100000000 2025-07-14 03:35:47,899 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:35:51,961 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:35:52,211 [lib.common.results] INFO: File 1752489352149414000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:35:52,243 [lib.common.results] INFO: File 1752489352149414000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:35:52,243 [lib.common.results] INFO: File 1752489352180664000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:35:52,258 [lib.common.results] INFO: File 1752489352196289000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:35:52,274 [lib.common.results] INFO: File 1752489352211914000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:35:52,305 [lib.common.results] INFO: File 1752489352243164000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:35:52,305 [lib.common.results] INFO: File 1752489352243164000.Security.evtx.gz size is 7288, Max size: 100000000 2025-07-14 03:35:52,321 [lib.common.results] INFO: File 1752489352274414000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:35:52,321 [lib.common.results] INFO: File 1752489352258789000.System.evtx.gz size is 8357, Max size: 100000000 2025-07-14 03:35:57,024 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:36:02,086 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489362.086914.sysmon.evtx.gz to host 2025-07-14 03:36:02,086 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5479, Max size: 100000000 2025-07-14 03:36:07,383 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:36:07,665 [lib.common.results] INFO: File 1752489367602539000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:36:07,680 [lib.common.results] INFO: File 1752489367602539000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:36:07,696 [lib.common.results] INFO: File 1752489367602539000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:36:07,696 [lib.common.results] INFO: File 1752489367633789000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:36:07,743 [lib.common.results] INFO: File 1752489367665039000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:36:07,758 [lib.common.results] INFO: File 1752489367680664000.Security.evtx.gz size is 7255, Max size: 100000000 2025-07-14 03:36:07,774 [lib.common.results] INFO: File 1752489367696289000.System.evtx.gz size is 8367, Max size: 100000000 2025-07-14 03:36:07,805 [lib.common.results] INFO: File 1752489367680664000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:36:07,836 [lib.common.results] INFO: File 1752489367743164000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:36:07,977 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:36:17,086 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:36:22,180 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489382.180664.sysmon.evtx.gz to host 2025-07-14 03:36:22,180 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5781, Max size: 100000000 2025-07-14 03:36:22,883 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:36:23,180 [lib.common.results] INFO: File 1752489383102539000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:36:23,180 [lib.common.results] INFO: File 1752489383118164000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:36:23,196 [lib.common.results] INFO: File 1752489383118164000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:36:23,211 [lib.common.results] INFO: File 1752489383086914000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:36:23,243 [lib.common.results] INFO: File 1752489383165039000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:36:23,258 [lib.common.results] INFO: File 1752489383180664000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:36:23,274 [lib.common.results] INFO: File 1752489383180664000.Security.evtx.gz size is 7247, Max size: 100000000 2025-07-14 03:36:23,290 [lib.common.results] INFO: File 1752489383211914000.System.evtx.gz size is 8361, Max size: 100000000 2025-07-14 03:36:23,305 [lib.common.results] INFO: File 1752489383243164000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:36:28,243 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:36:37,196 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:36:38,336 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:36:38,602 [lib.common.results] INFO: File 1752489398524414000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:36:38,618 [lib.common.results] INFO: File 1752489398524414000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:36:38,618 [lib.common.results] INFO: File 1752489398555664000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:36:38,649 [lib.common.results] INFO: File 1752489398586914000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:36:38,665 [lib.common.results] INFO: File 1752489398586914000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:36:38,665 [lib.common.results] INFO: File 1752489398602539000.Security.evtx.gz size is 7300, Max size: 100000000 2025-07-14 03:36:38,680 [lib.common.results] INFO: File 1752489398618164000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:36:38,711 [lib.common.results] INFO: File 1752489398665039000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:36:38,727 [lib.common.results] INFO: File 1752489398649414000.System.evtx.gz size is 8379, Max size: 100000000 2025-07-14 03:36:42,290 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489402.290039.sysmon.evtx.gz to host 2025-07-14 03:36:42,290 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5613, Max size: 100000000 2025-07-14 03:36:48,321 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:36:53,758 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:36:53,993 [lib.common.results] INFO: File 1752489413946289000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:36:54,008 [lib.common.results] INFO: File 1752489413946289000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:36:54,024 [lib.common.results] INFO: File 1752489413946289000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:36:54,055 [lib.common.results] INFO: File 1752489413993164000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:36:54,071 [lib.common.results] INFO: File 1752489414008789000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:36:54,086 [lib.common.results] INFO: File 1752489413993164000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:36:54,086 [lib.common.results] INFO: File 1752489414008789000.Security.evtx.gz size is 7362, Max size: 100000000 2025-07-14 03:36:54,102 [lib.common.results] INFO: File 1752489414055664000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:36:54,102 [lib.common.results] INFO: File 1752489414055664000.System.evtx.gz size is 8326, Max size: 100000000 2025-07-14 03:36:57,305 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:37:02,383 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489422.383789.sysmon.evtx.gz to host 2025-07-14 03:37:02,383 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5445, Max size: 100000000 2025-07-14 03:37:08,399 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:37:09,133 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:37:09,618 [lib.common.results] INFO: File 1752489429430664000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:37:09,633 [lib.common.results] INFO: File 1752489429430664000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:37:09,665 [lib.common.results] INFO: File 1752489429524414000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:37:09,680 [lib.common.results] INFO: File 1752489429571289000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:37:09,727 [lib.common.results] INFO: File 1752489429602539000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:37:09,790 [lib.common.results] INFO: File 1752489429649414000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:37:09,805 [lib.common.results] INFO: File 1752489429649414000.Security.evtx.gz size is 6974, Max size: 100000000 2025-07-14 03:37:09,821 [lib.common.results] INFO: File 1752489429665039000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:37:09,836 [lib.common.results] INFO: File 1752489429649414000.System.evtx.gz size is 8351, Max size: 100000000 2025-07-14 03:37:17,399 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:37:22,493 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489442.493164.sysmon.evtx.gz to host 2025-07-14 03:37:22,508 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5537, Max size: 100000000 2025-07-14 03:37:24,883 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:37:25,149 [lib.common.results] INFO: File 1752489445071289000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:37:25,180 [lib.common.results] INFO: File 1752489445071289000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:37:25,211 [lib.common.results] INFO: File 1752489445102539000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:37:25,227 [lib.common.results] INFO: File 1752489445102539000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:37:25,243 [lib.common.results] INFO: File 1752489445149414000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:37:25,258 [lib.common.results] INFO: File 1752489445165039000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:37:25,274 [lib.common.results] INFO: File 1752489445149414000.Security.evtx.gz size is 7242, Max size: 100000000 2025-07-14 03:37:25,274 [lib.common.results] INFO: File 1752489445180664000.System.evtx.gz size is 8353, Max size: 100000000 2025-07-14 03:37:25,290 [lib.common.results] INFO: File 1752489445211914000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:37:28,508 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:37:37,524 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:37:40,336 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:37:40,602 [lib.common.results] INFO: File 1752489460524414000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:37:40,618 [lib.common.results] INFO: File 1752489460555664000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:37:40,633 [lib.common.results] INFO: File 1752489460524414000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:37:40,649 [lib.common.results] INFO: File 1752489460555664000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:37:40,665 [lib.common.results] INFO: File 1752489460586914000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:37:40,680 [lib.common.results] INFO: File 1752489460602539000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:37:40,696 [lib.common.results] INFO: File 1752489460602539000.Security.evtx.gz size is 7150, Max size: 100000000 2025-07-14 03:37:40,696 [lib.common.results] INFO: File 1752489460618164000.System.evtx.gz size is 8377, Max size: 100000000 2025-07-14 03:37:40,711 [lib.common.results] INFO: File 1752489460665039000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:37:42,618 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489462.618164.sysmon.evtx.gz to host 2025-07-14 03:37:42,618 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5542, Max size: 100000000 2025-07-14 03:37:48,586 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:37:55,790 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:37:56,055 [lib.common.results] INFO: File 1752489475993164000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:37:56,071 [lib.common.results] INFO: File 1752489476024414000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:37:56,086 [lib.common.results] INFO: File 1752489475977539000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:37:56,118 [lib.common.results] INFO: File 1752489476071289000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:37:56,133 [lib.common.results] INFO: File 1752489476040039000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:37:56,149 [lib.common.results] INFO: File 1752489476055664000.Security.evtx.gz size is 7117, Max size: 100000000 2025-07-14 03:37:56,149 [lib.common.results] INFO: File 1752489476055664000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:37:56,165 [lib.common.results] INFO: File 1752489476118164000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:37:56,165 [lib.common.results] INFO: File 1752489476118164000.System.evtx.gz size is 8352, Max size: 100000000 2025-07-14 03:37:57,633 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:38:02,680 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489482.680664.sysmon.evtx.gz to host 2025-07-14 03:38:02,696 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5480, Max size: 100000000 2025-07-14 03:38:08,665 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:38:10,383 [root] DEBUG: 664: CreateProcessHandler: Injection info set for new process 2392: C:\Windows\system32\wbem\wmiprvse.exe, ImageBase: 0x000000013F340000 2025-07-14 03:38:10,383 [root] INFO: Announced 64-bit process name: WmiPrvSE.exe pid: 2392 2025-07-14 03:38:10,383 [lib.api.process] INFO: Monitor config for process 2392: C:\tmpd65zellw\dll\2392.ini 2025-07-14 03:38:10,383 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 03:38:10,383 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 03:38:10,383 [lib.api.process] INFO: Option 'disable_hook_content' with value '3' sent to monitor 2025-07-14 03:38:10,383 [lib.api.process] INFO: Option 'injection' with value '0' sent to monitor 2025-07-14 03:38:10,383 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor 2025-07-14 03:38:10,383 [lib.api.process] INFO: Option 'caller_dump' with value '0' sent to monitor 2025-07-14 03:38:10,383 [lib.api.process] INFO: Option 'ntdll_protoect' with value '0' sent to monitor 2025-07-14 03:38:10,383 [lib.api.process] INFO: Option 'compression' with value '0' sent to monitor 2025-07-14 03:38:10,383 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpd65zellw\dll\AQErat.dll, loader C:\tmpd65zellw\bin\OQUAtNTA.exe 2025-07-14 03:38:10,399 [root] DEBUG: Loader: Injecting process 2392 (thread 3052) with C:\tmpd65zellw\dll\AQErat.dll. 2025-07-14 03:38:10,399 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-07-14 03:38:10,399 [root] DEBUG: Successfully injected DLL C:\tmpd65zellw\dll\AQErat.dll. 2025-07-14 03:38:10,399 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 2392 2025-07-14 03:38:10,399 [root] WARNING: Received request to inject process with pid 2392, skipped alredy in inject list 2025-07-14 03:38:10,415 [root] DEBUG: 2392: Python path set to 'C:\olddocs'. 2025-07-14 03:38:10,415 [root] DEBUG: 2392: Process dumps enabled. 2025-07-14 03:38:10,415 [root] DEBUG: 2392: AMSI dumping enabled. 2025-07-14 03:38:10,415 [root] DEBUG: 2392: In-monitor YARA scans disabled. 2025-07-14 03:38:10,415 [root] DEBUG: 2392: Monitor config - unrecognised key caller_dump. 2025-07-14 03:38:10,415 [root] DEBUG: 2392: Monitor config - unrecognised key ntdll_protoect. 2025-07-14 03:38:10,430 [root] DEBUG: 2392: Monitor config - unrecognised key compression. 2025-07-14 03:38:10,430 [root] DEBUG: 2392: Dropped file limit defaulting to 100. 2025-07-14 03:38:10,430 [root] DEBUG: 2392: Disabling sleep skipping. 2025-07-14 03:38:10,430 [root] DEBUG: 2392: Monitor initialised: 64-bit capemon loaded in process 2392 at 0x000007FEED310000, thread 3052, image base 0x000000013F340000, stack from 0x0000000000190000-0x00000000001A0000 2025-07-14 03:38:10,430 [root] DEBUG: 2392: Commandline: C:\Windows\system32\wbem\wmiprvse.exe -Embedding 2025-07-14 03:38:10,477 [root] WARNING: b'Unable to place hook on LockResource' 2025-07-14 03:38:10,477 [root] DEBUG: 2392: set_hooks: Unable to hook LockResource 2025-07-14 03:38:10,477 [root] DEBUG: 2392: Hooked 609 out of 610 functions 2025-07-14 03:38:10,493 [root] INFO: Loaded monitor into process with pid 2392 2025-07-14 03:38:10,493 [root] DEBUG: 2392: caller_dispatch: Added region at 0x000000013F340000 to tracked regions list (advapi32::RegOpenKeyExW returns to 0x000000013F348237, thread 3052). 2025-07-14 03:38:10,493 [root] DEBUG: 2392: ProcessImageBase: Main module image at 0x000000013F340000 unmodified (entropy change 0.000000e+00) 2025-07-14 03:38:10,508 [root] DEBUG: 2392: DLL loaded at 0x000007FEFCFE0000: C:\Windows\system32\CRYPTBASE (0xf000 bytes). 2025-07-14 03:38:10,508 [root] DEBUG: 2392: DLL loaded at 0x000007FEFBEC0000: C:\Windows\system32\ntmarta (0x2d000 bytes). 2025-07-14 03:38:10,508 [root] DEBUG: 2392: DLL loaded at 0x000007FEFEC30000: C:\Windows\system32\WLDAP32 (0x52000 bytes). 2025-07-14 03:38:10,524 [root] DEBUG: 2392: DLL loaded at 0x000007FEFD810000: C:\Windows\system32\CLBCatQ (0x99000 bytes). 2025-07-14 03:38:10,524 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:10,524 [lib.api.process] INFO: Monitor config for process 2456: C:\tmpd65zellw\dll\2456.ini 2025-07-14 03:38:10,524 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2025-07-14 03:38:10,524 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2025-07-14 03:38:10,524 [lib.api.process] INFO: Option 'disable_hook_content' with value '3' sent to monitor 2025-07-14 03:38:10,524 [lib.api.process] INFO: Option 'injection' with value '0' sent to monitor 2025-07-14 03:38:10,524 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor 2025-07-14 03:38:10,524 [lib.api.process] INFO: Option 'caller_dump' with value '0' sent to monitor 2025-07-14 03:38:10,524 [lib.api.process] INFO: Option 'ntdll_protoect' with value '0' sent to monitor 2025-07-14 03:38:10,524 [lib.api.process] INFO: Option 'compression' with value '0' sent to monitor 2025-07-14 03:38:10,540 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpd65zellw\dll\AQErat.dll, loader C:\tmpd65zellw\bin\OQUAtNTA.exe 2025-07-14 03:38:10,540 [root] DEBUG: Loader: Injecting process 2456 with C:\tmpd65zellw\dll\AQErat.dll. 2025-07-14 03:38:10,555 [root] DEBUG: 2456: Python path set to 'C:\olddocs'. 2025-07-14 03:38:10,555 [root] DEBUG: 2456: Disabling sleep skipping. 2025-07-14 03:38:10,571 [root] DEBUG: 2456: Process dumps enabled. 2025-07-14 03:38:10,571 [root] DEBUG: 2456: AMSI dumping enabled. 2025-07-14 03:38:10,571 [root] DEBUG: 2456: In-monitor YARA scans disabled. 2025-07-14 03:38:10,571 [root] DEBUG: 2456: Monitor config - unrecognised key caller_dump. 2025-07-14 03:38:10,571 [root] DEBUG: 2456: Monitor config - unrecognised key ntdll_protoect. 2025-07-14 03:38:10,571 [root] DEBUG: 2456: Monitor config - unrecognised key compression. 2025-07-14 03:38:10,571 [root] DEBUG: 2456: Dropped file limit defaulting to 100. 2025-07-14 03:38:10,571 [root] DEBUG: 2456: parent_has_path: unable to get path for parent process 544 2025-07-14 03:38:10,571 [root] DEBUG: 2456: Monitor initialised: 64-bit capemon loaded in process 2456 at 0x000007FEED310000, thread 2956, image base 0x00000000FF290000, stack from 0x0000000000342000-0x0000000000350000 2025-07-14 03:38:10,571 [root] DEBUG: 2456: Commandline: C:\Windows\system32\svchost.exe -k netsvcs 2025-07-14 03:38:10,618 [root] WARNING: b'Unable to place hook on LockResource' 2025-07-14 03:38:10,618 [root] DEBUG: 2456: set_hooks: Unable to hook LockResource 2025-07-14 03:38:10,618 [root] DEBUG: 2456: Hooked 609 out of 610 functions 2025-07-14 03:38:10,633 [root] INFO: Loaded monitor into process with pid 2456 2025-07-14 03:38:10,633 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-07-14 03:38:10,633 [root] DEBUG: Successfully injected DLL C:\tmpd65zellw\dll\AQErat.dll. 2025-07-14 03:38:10,633 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 2456 2025-07-14 03:38:11,196 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:38:11,461 [lib.common.results] INFO: File 1752489491399414000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:38:11,477 [lib.common.results] INFO: File 1752489491399414000.Application.evtx.gz size is 6848, Max size: 100000000 2025-07-14 03:38:11,493 [lib.common.results] INFO: File 1752489491430664000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:38:11,508 [lib.common.results] INFO: File 1752489491461914000.Security.evtx.gz size is 7182, Max size: 100000000 2025-07-14 03:38:11,524 [lib.common.results] INFO: File 1752489491446289000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:38:11,540 [lib.common.results] INFO: File 1752489491461914000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:38:11,555 [lib.common.results] INFO: File 1752489491493164000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:38:11,571 [lib.common.results] INFO: File 1752489491524414000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:38:11,586 [lib.common.results] INFO: File 1752489491508789000.System.evtx.gz size is 8374, Max size: 100000000 2025-07-14 03:38:12,633 [root] DEBUG: 2392: DLL loaded at 0x000007FEF9EB0000: C:\Windows\system32\wbem\wbemprox (0xe000 bytes). 2025-07-14 03:38:12,633 [root] DEBUG: 2392: DLL loaded at 0x000007FEFC930000: C:\Windows\system32\CRYPTSP (0x18000 bytes). 2025-07-14 03:38:12,633 [root] DEBUG: 2392: DLL loaded at 0x000007FEFC630000: C:\Windows\system32\rsaenh (0x47000 bytes). 2025-07-14 03:38:12,649 [root] DEBUG: 2392: DLL loaded at 0x000007FEFD090000: C:\Windows\system32\RpcRtRemote (0x14000 bytes). 2025-07-14 03:38:12,665 [root] DEBUG: 2392: DLL loaded at 0x000007FEF9420000: C:\Windows\system32\wbem\wbemsvc (0x13000 bytes). 2025-07-14 03:38:12,680 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,696 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,696 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,711 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,727 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,727 [root] DEBUG: 2392: DLL loaded at 0x000007FEF9350000: C:\Windows\system32\wbem\wmiutils (0x21000 bytes). 2025-07-14 03:38:12,727 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,743 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,743 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,743 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,743 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,758 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,758 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,758 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,758 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,774 [root] DEBUG: 2392: DLL loaded at 0x000007FEF6560000: C:\Windows\system32\wbem\wmiprov (0x3c000 bytes). 2025-07-14 03:38:12,774 [root] DEBUG: 2392: DLL loaded at 0x000007FEF64D0000: C:\Windows\system32\wbemcomn (0x86000 bytes). 2025-07-14 03:38:12,790 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,805 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,821 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,836 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,836 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,852 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,852 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,852 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,852 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,852 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,868 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,868 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,868 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,868 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,868 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,883 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,883 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,899 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,899 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,915 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,915 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,915 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,930 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,930 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,930 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,930 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:12,946 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:13,180 [root] DEBUG: 2456: api-rate-cap: NtSetInformationThread hook disabled due to rate 2025-07-14 03:38:13,196 [root] DEBUG: 2456: api-rate-cap: NtClose hook disabled due to rate 2025-07-14 03:38:13,290 [root] INFO: got call to handle wmi inside dcom lock 2025-07-14 03:38:17,711 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:38:22,790 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489502.790039.sysmon.evtx.gz to host 2025-07-14 03:38:22,790 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 17575, Max size: 100000000 2025-07-14 03:38:26,649 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:38:26,899 [lib.common.results] INFO: File 1752489506852539000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:38:26,915 [lib.common.results] INFO: File 1752489506821289000.Application.evtx.gz size is 7118, Max size: 100000000 2025-07-14 03:38:26,930 [lib.common.results] INFO: File 1752489506852539000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:38:26,961 [lib.common.results] INFO: File 1752489506883789000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:38:26,977 [lib.common.results] INFO: File 1752489506899414000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:38:26,993 [lib.common.results] INFO: File 1752489506915039000.Security.evtx.gz size is 7236, Max size: 100000000 2025-07-14 03:38:27,008 [lib.common.results] INFO: File 1752489506946289000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:38:27,024 [lib.common.results] INFO: File 1752489506961914000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:38:27,024 [lib.common.results] INFO: File 1752489506961914000.System.evtx.gz size is 8361, Max size: 100000000 2025-07-14 03:38:28,743 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:38:37,805 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:38:42,055 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:38:42,290 [lib.common.results] INFO: File 1752489522227539000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:38:42,305 [lib.common.results] INFO: File 1752489522227539000.Application.evtx.gz size is 7060, Max size: 100000000 2025-07-14 03:38:42,321 [lib.common.results] INFO: File 1752489522274414000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:38:42,352 [lib.common.results] INFO: File 1752489522290039000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:38:42,368 [lib.common.results] INFO: File 1752489522290039000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:38:42,368 [lib.common.results] INFO: File 1752489522321289000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:38:42,383 [lib.common.results] INFO: File 1752489522305664000.Security.evtx.gz size is 7162, Max size: 100000000 2025-07-14 03:38:42,415 [lib.common.results] INFO: File 1752489522352539000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:38:42,415 [lib.common.results] INFO: File 1752489522352539000.System.evtx.gz size is 8360, Max size: 100000000 2025-07-14 03:38:42,883 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489522.883789.sysmon.evtx.gz to host 2025-07-14 03:38:42,883 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 6736, Max size: 100000000 2025-07-14 03:38:48,805 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:38:56,493 [root] INFO: Analysis timeout hit, terminating analysis 2025-07-14 03:38:56,493 [lib.api.process] INFO: Terminate event set for process 664 2025-07-14 03:38:56,493 [root] DEBUG: 664: Terminate Event: Attempting to dump process 664 2025-07-14 03:38:56,493 [root] DEBUG: 664: DoProcessDump: Skipping process dump as code is identical on disk. 2025-07-14 03:38:56,508 [lib.api.process] INFO: Termination confirmed for process 664 2025-07-14 03:38:56,508 [root] DEBUG: 664: Terminate Event: monitor shutdown complete for process 664 2025-07-14 03:38:56,508 [root] INFO: Terminate event set for process 664 2025-07-14 03:38:56,508 [lib.api.process] INFO: Terminate event set for process 2392 2025-07-14 03:38:56,508 [root] DEBUG: 2392: Terminate Event: Attempting to dump process 2392 2025-07-14 03:38:56,508 [root] DEBUG: 2392: DoProcessDump: Skipping process dump as code is identical on disk. 2025-07-14 03:38:56,508 [lib.api.process] INFO: Termination confirmed for process 2392 2025-07-14 03:38:56,524 [root] INFO: Terminate event set for process 2392 2025-07-14 03:38:56,524 [root] DEBUG: 2392: Terminate Event: monitor shutdown complete for process 2392 2025-07-14 03:38:56,524 [lib.api.process] INFO: Terminate event set for process 2456 2025-07-14 03:38:56,524 [root] DEBUG: 2456: Terminate Event: Attempting to dump process 2456 2025-07-14 03:38:56,524 [root] DEBUG: 2456: DoProcessDump: Skipping process dump as code is identical on disk. 2025-07-14 03:38:56,524 [lib.api.process] INFO: Termination confirmed for process 2456 2025-07-14 03:38:56,540 [root] DEBUG: 2456: Terminate Event: monitor shutdown complete for process 2456 2025-07-14 03:38:56,540 [root] INFO: Terminate event set for process 2456 2025-07-14 03:38:56,540 [root] INFO: Created shutdown mutex 2025-07-14 03:38:57,446 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:38:57,586 [root] INFO: Shutting down package 2025-07-14 03:38:57,586 [root] INFO: Stopping auxiliary modules 2025-07-14 03:38:57,586 [modules.auxiliary.curtain] ERROR: Curtain - Error collecting PowerShell events - [WinError 6] The handle is invalid 2025-07-14 03:38:57,586 [lib.common.results] INFO: File C:\curtain.log size is 0, Max size: 100000000 2025-07-14 03:38:57,618 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2025-07-14 03:38:57,883 [lib.common.results] INFO: File 1752489537633789000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:38:57,899 [lib.common.results] INFO: File 1752489537633789000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:38:57,899 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2025-07-14 03:38:57,915 [lib.common.results] INFO: File 1752489537618164000.Application.evtx.gz size is 7060, Max size: 100000000 2025-07-14 03:38:57,930 [lib.common.results] INFO: File 1752489537680664000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:38:57,961 [lib.common.results] INFO: File 1752489537852539000.InternetExplorer.evtx.gz size is 251, Max size: 100000000 2025-07-14 03:38:57,977 [lib.common.results] INFO: File 1752489537821289000.Application.evtx.gz size is 7060, Max size: 100000000 2025-07-14 03:38:57,993 [lib.common.results] INFO: File 1752489537852539000.KeyManagementService.evtx.gz size is 4963, Max size: 100000000 2025-07-14 03:38:57,993 [lib.common.results] INFO: File 1752489537899414000.System.evtx.gz size is 8313, Max size: 100000000 2025-07-14 03:38:58,024 [lib.common.results] INFO: File 1752489537883789000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:38:58,024 [lib.common.results] INFO: File 1752489537852539000.HardwareEvents.evtx.gz size is 359, Max size: 100000000 2025-07-14 03:38:58,040 [lib.common.results] INFO: File 1752489537883789000.Security.evtx.gz size is 7209, Max size: 100000000 2025-07-14 03:38:58,055 [lib.common.results] INFO: File 1752489537883789000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:38:58,055 [lib.common.results] INFO: File 1752489537946289000.Security.evtx.gz size is 7195, Max size: 100000000 2025-07-14 03:38:58,071 [lib.common.results] INFO: File 1752489537946289000.OAlerts.evtx.gz size is 243, Max size: 100000000 2025-07-14 03:38:58,086 [lib.common.results] INFO: File 1752489537961914000.Setup.evtx.gz size is 240, Max size: 100000000 2025-07-14 03:38:58,102 [lib.common.results] INFO: File 1752489537993164000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:38:58,102 [lib.common.results] INFO: File 1752489538024414000.System.evtx.gz size is 8343, Max size: 100000000 2025-07-14 03:38:58,118 [lib.common.results] INFO: File 1752489538055664000.WindowsPowerShell.evtx.gz size is 3096, Max size: 100000000 2025-07-14 03:39:03,086 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489543.086914.sysmon.evtx.gz to host 2025-07-14 03:39:03,086 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 6283, Max size: 100000000 2025-07-14 03:39:03,211 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2025-07-14 03:39:03,211 [modules.auxiliary.sysmon] INFO: Doing final sysmon log dump 2025-07-14 03:39:08,274 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1752489548.274414.sysmon.evtx.gz to host 2025-07-14 03:39:08,290 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5553, Max size: 100000000 2025-07-14 03:39:08,305 [root] INFO: Finishing auxiliary modules 2025-07-14 03:39:08,305 [root] INFO: Shutting down pipe server and dumping dropped files 2025-07-14 03:39:08,305 [root] WARNING: Folder at path "C:\AJTYXNpIQ\debugger" does not exist, skipping 2025-07-14 03:39:08,305 [root] WARNING: Folder at path "C:\AJTYXNpIQ\tlsdump" does not exist, skipping 2025-07-14 03:39:08,305 [root] INFO: Analysis completed
Name | Label | Manager | Started On | Shutdown On | Route |
---|---|---|---|---|---|
win7office2k3flash2800137TWN3H104 | win7office2k3flash2800137TWN3H104 | KVM | 2025-07-14 10:34:04 | 2025-07-14 10:39:18 | internet |
File Name | PointDragControls.js |
---|---|
File Size | 25122 bytes |
File Type | ASCII text |
MD5 | f9ce25c8a6ae1309c62ee8225850af5a |
SHA1 | ed702e74337702868adf5dd5a823809f2d83cb21 |
SHA256 | 19d638c8730931e0a710007d3d1a0e2ae9336a5a98031ae041f6dee0d6e7c52b |
SHA512 | 426827e2aa93342be90191801d381b3d8c401613aee950d06df206f8f7c5371f780ef7b416306dcda0920bc55a699b2016ed969f1c4046b06cb6f8735ae90c29 |
SHA3-384 | 48f973e40dfd85a4032624ca7070b565cd7f701b41a658d13f35de7876fdb29d15a43df939099c0942cf3b0e3c14a8b6 |
CRC32 | 743090F2 |
TLSH | T13AB2514A58B738268853657D67DF9844B23A84030949EC947ECCD284CF85B3D8EFE7DA |
Ssdeep | 768:4on794PKH2LlHmsVoXVYytzLF2VxQGTKUFJ:4o5Iv |
File
|
|
/* point_drag_controls.js ** Tom Gracey August 2017 ** ** Controls for translating or rotating individual ** objects about specific points under three.js ** ** Version 0.2 ** December 2017 ** ** (c) Virtual Blue LTD. 2017 ** Released under the MIT license */ THREE.PointDragControls = function(){ this.globals = { // globals - i.e. scoped across whole of PointDragControls // They *can* be accessed externally via THREE.PointDragControls.globals // - but normally this should not be necessary. Use // an accessor function instead - e.g. .toggle_mode() raycaster: new THREE.Raycaster(), pointer: new THREE.Vector2(), // either the mouse position or the touch location rev_intercept_from: 99999999, // horrible! *'far' of infinity means nothing while this // number exists* because it effectively defines the far // position beyond which the controls will stop working. // See where this variable is used in calculation for more info // TODO: find a better way of doing this pointer: { current: undefined, // where the pointer is now last: undefined, // where it was before orig: undefined // where it was when the object was clicked }, intersect: { // world coord points where the mouse click intercepts forward: undefined, // (forward) the front of the object reverse: undefined, // (reverse) the back of the object offset: undefined // vector from the origin of the object to the intercept point }, active_axes: { r: undefined, // rotation axis label (world coords) x, y or z t: undefined, // translation axis (world coords) x, y or z }, origin_touch_id: undefined, // for remembering the id of the touch event occurring // on the object to be rotated (in the 2 touch event // situation, which is basically confined to z rotations // on touch devices) init_dt: { x: 0, y: 0 }, // for remembering total mouse movement before we decide // which is the active axis dt: { x: 0, y: 0 }, // size of mouse (or finger) movement during current cycle mode: undefined, // modes are 'rotate' or 'translate'. Initial mode is // defined in defaults click_timer: undefined, // for detecting double-click or double-tap double_click_timeout: 500, // max time diff between clicks (taps) to qualify as a // double click (in ms) object_id_index: [] // track object ids for fast lookups }; var g = this.globals; function set_mode(new_mode){ if (new_mode == 'rotate' || new_mode == 'translate'){ g.mode = new_mode; } else { throw "Invalid mode: "+new_mode+" not recognised"; } }; function toggle_mode(){ if (g.mode == 'translate'){ g.mode = 'rotate'; } else if (g.mode == 'rotate') { g.mode = 'translate'; } else { throw "invalid mode: "+g.mode+" not recognised"; } }; function include(objects){ for (var i = 0; i <= objects.length - 1; i++){ var already_included = false; for (var j = 0; j<= g.object_id_index.length - 1; j++){ if ( objects[i].uuid == object_id_index[j] ){ already_included= true; break; } if (! already_included ){ p.objects.push( objects[i] ); g.object_id_index.push( objects[i].uuid ); } } } } function exclude(objects){ for ( var i = 0; i <= objects.length - 1; i++ ){ for( var j = 0; j<= g.object_index.length; j++){ if ( g.object_id_index[j] == objects[i].uuid ){ p.objects.splice(j,1); g.object_id_index.splice(j,1); } } } } this.init = function(scene,camera,renderer,options){ var defaults = { objects: scene.children, // array of objects to apply controls to turning_circle: 90, // controls mouse rotation sensitivity during object rotation. // Number of pixels to move the mouse through for a full rotation // default = 1 pixel per 4 degrees near: g.raycaster.near, // nearest point to apply controls to far: g.raycaster.far, // furthest point to apply controls to snap_distance: 4, // only has effect when pointer axes are locked // this is the minimum cumulative difference between screen x and y // values (in pixels) before the active axis is chosen z_shift_distance: 10, // controls the sensitivity by which objects move towards/away from // the camera when performing translations parallel to the camera // normal vector. Bigger = less sensitive z_control_axis: 'y', mode_auto: true, // true = toggle mode by double-clicking (double-tapping) on empty // canvas area. false = don't auto change mode at all. Let the app // handle all mode changes via .toggle_mode() and set_mode(). Note // .toggle_mode() and .set_mode() still work if mode_auto = true init_mode: 'rotate', // the mode to initialise with lock_translation_axes: false, // if true, decide which pointer axis (ie x or y) is preferred early // in the pointer movement, then lock object translation to this axis lock_rotation_axes: true, // same as lock_translation_axis but for rotation. This is locked by <truncated> |
Direct | IP | Country Name |
---|---|---|
Y | 8.8.8.8 [VT] | United States |
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP