| Category | Package | Started | Completed | Duration | Options | Log | MalScore |
|---|---|---|---|---|---|---|---|
| FILE | bat | 2026-04-10 14:05:48 | 2026-04-10 14:08:53 | 185 seconds | Show Options | Show Log | 1.5 |
procdump=1
amsidump=1
2025-12-02 01:29:41,609 [root] INFO: Date set to: 20260410T07:05:48, timeout set to: 150 2026-04-10 08:05:48,015 [root] DEBUG: Starting analyzer from: C:\tmpvsvg3hfz 2026-04-10 08:05:48,031 [root] DEBUG: Storing results at: C:\qgcInklCsf 2026-04-10 08:05:48,031 [root] DEBUG: Pipe server name: \\.\PIPE\WLAPTPJhF 2026-04-10 08:05:48,031 [root] DEBUG: Python path: C:\olddocs 2026-04-10 08:05:48,031 [root] DEBUG: No analysis package specified, trying to detect it automagically 2026-04-10 08:05:48,031 [root] INFO: Automatically selected analysis package "bat" 2026-04-10 08:05:48,031 [root] DEBUG: Importing analysis package "bat"... 2026-04-10 08:05:48,031 [root] DEBUG: Initializing analysis package "bat"... 2026-04-10 08:05:48,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a DLL option 2026-04-10 08:05:48,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a DLL_64 option 2026-04-10 08:05:48,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a loader option 2026-04-10 08:05:48,046 [root] INFO: Analyzer: Package modules.packages.bat does not specify a loader_64 option 2026-04-10 08:05:48,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.browser"... 2026-04-10 08:05:48,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.curtain"... 2026-04-10 08:05:48,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.default_apps"... 2026-04-10 08:05:48,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.digisig"... 2026-04-10 08:05:48,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.disguise"... 2026-04-10 08:05:48,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.evtx"... 2026-04-10 08:05:48,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.fiddler"... 2026-04-10 08:05:48,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.human"... 2026-04-10 08:05:48,171 [root] DEBUG: Importing auxiliary module "modules.auxiliary.screenshots"... 2026-04-10 08:05:48,187 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2026-04-10 08:05:48,296 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2026-04-10 08:05:48,296 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2026-04-10 08:05:48,296 [root] DEBUG: Importing auxiliary module "modules.auxiliary.sysmon"... 2026-04-10 08:05:48,296 [root] DEBUG: Importing auxiliary module "modules.auxiliary.tlsdump"... 2026-04-10 08:05:48,296 [root] DEBUG: Importing auxiliary module "modules.auxiliary.usage"... 2026-04-10 08:05:48,312 [root] DEBUG: Initializing auxiliary module "Browser"... 2026-04-10 08:05:48,312 [root] DEBUG: Started auxiliary module Browser 2026-04-10 08:05:48,312 [root] DEBUG: Initializing auxiliary module "Curtain"... 2026-04-10 08:05:48,312 [root] DEBUG: Started auxiliary module Curtain 2026-04-10 08:05:48,312 [root] DEBUG: Initializing auxiliary module "DefaultApps"... 2026-04-10 08:05:48,375 [modules.auxiliary.default_apps] DEBUG: Getting current user SID using WinAPI 2026-04-10 08:05:48,375 [root] DEBUG: Started auxiliary module DefaultApps 2026-04-10 08:05:48,375 [root] DEBUG: Initializing auxiliary module "DigiSig"... 2026-04-10 08:05:48,375 [modules.auxiliary.digisig] INFO: signtool.exe was not found in bin/ 2026-04-10 08:05:48,375 [modules.auxiliary.digisig] INFO: dummy 2026-04-10 08:05:48,375 [modules.auxiliary.digisig] INFO: Skipping authenticode validation, unsupported analyzer package 2026-04-10 08:05:48,375 [root] DEBUG: Started auxiliary module DigiSig 2026-04-10 08:05:48,375 [root] DEBUG: Initializing auxiliary module "Disguise"... 2026-04-10 08:05:48,812 [modules.auxiliary.disguise] INFO: Setting NoRecentDocsHistory 2026-04-10 08:05:48,812 [root] WARNING: Cannot execute auxiliary module Disguise: [WinError 2] The system cannot find the file specified 2026-04-10 08:05:48,812 [root] DEBUG: Initializing auxiliary module "Evtx"... 2026-04-10 08:05:48,812 [modules.auxiliary.evtx] INFO: Loading audit policy C:\tmpvsvg3hfz\bin\auditpol.csv 2026-04-10 08:05:49,000 [modules.auxiliary.evtx] INFO: Wiping logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:05:49,687 [root] DEBUG: Started auxiliary module Evtx 2026-04-10 08:05:49,687 [root] DEBUG: Initializing auxiliary module "Fiddler"... 2026-04-10 08:05:49,687 [modules.auxiliary.fiddler] INFO: fiddler package: dummy 2026-04-10 08:05:49,687 [root] DEBUG: Started auxiliary module Fiddler 2026-04-10 08:05:49,687 [root] DEBUG: Initializing auxiliary module "Human"... 2026-04-10 08:05:49,687 [root] DEBUG: Started auxiliary module Human 2026-04-10 08:05:49,687 [root] DEBUG: Initializing auxiliary module "Screenshots"... 2026-04-10 08:05:49,687 [root] DEBUG: Started auxiliary module Screenshots 2026-04-10 08:05:49,687 [root] DEBUG: Initializing auxiliary module "Sysmon"... 2026-04-10 08:05:49,687 [modules.auxiliary.sysmon] INFO: Seeing if we need to update sysmon config 2026-04-10 08:05:49,687 [root] DEBUG: Started auxiliary module Sysmon 2026-04-10 08:05:49,687 [root] DEBUG: Initializing auxiliary module "TLSDumpMasterSecrets"... 2026-04-10 08:05:49,687 [modules.auxiliary.sysmon] INFO: Found Sysmon Executable 2026-04-10 08:05:49,687 [modules.auxiliary.sysmon] INFO: Found Sysmon config 2026-04-10 08:05:49,687 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 556 2026-04-10 08:05:49,703 [lib.api.process] INFO: Monitor config for process 556: C:\tmpvsvg3hfz\dll\556.ini 2026-04-10 08:05:51,812 [modules.auxiliary.sysmon] INFO: Clearing existing sysmon logs 2026-04-10 08:05:52,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-10 08:05:52,703 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-10 08:05:52,703 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-10 08:05:52,703 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2026-04-10 08:05:52,703 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpvsvg3hfz\dll\MXcjvt.dll, loader C:\tmpvsvg3hfz\bin\zlDdFcSh.exe 2026-04-10 08:05:52,734 [root] DEBUG: Loader: Injecting process 556 with C:\tmpvsvg3hfz\dll\MXcjvt.dll. 2026-04-10 08:05:52,812 [root] DEBUG: 556: Python path set to 'C:\olddocs'. 2026-04-10 08:05:52,812 [root] DEBUG: 556: Disabling sleep skipping. 2026-04-10 08:05:52,812 [root] DEBUG: 556: Process dumps enabled. 2026-04-10 08:05:52,812 [root] DEBUG: 556: AMSI dumping enabled. 2026-04-10 08:05:52,812 [root] DEBUG: 556: TLS secret dump mode enabled. 2026-04-10 08:05:52,828 [root] DEBUG: 556: Monitor initialised: 64-bit capemon loaded in process 556 at 0x000007FEED040000, thread 2576, image base 0x00000000FF650000, stack from 0x0000000002012000-0x0000000002020000 2026-04-10 08:05:52,828 [root] DEBUG: 556: Commandline: C:\Windows\system32\lsass.exe 2026-04-10 08:05:52,828 [root] DEBUG: 556: Hooked 5 out of 5 functions 2026-04-10 08:05:52,843 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2026-04-10 08:05:52,843 [root] DEBUG: Successfully injected DLL C:\tmpvsvg3hfz\dll\MXcjvt.dll. 2026-04-10 08:05:52,843 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 556 2026-04-10 08:05:52,843 [root] DEBUG: Started auxiliary module TLSDumpMasterSecrets 2026-04-10 08:05:52,843 [root] DEBUG: Initializing auxiliary module "Usage"... 2026-04-10 08:05:52,843 [root] DEBUG: Started auxiliary module Usage 2026-04-10 08:05:55,500 [root] INFO: Restarting WMI Service 2026-04-10 08:05:59,578 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\cmd.exe" with arguments "/c start /wait "" "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat"" with pid 3020 2026-04-10 08:05:59,578 [lib.api.process] INFO: Monitor config for process 3020: C:\tmpvsvg3hfz\dll\3020.ini 2026-04-10 08:05:59,593 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-10 08:05:59,593 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-10 08:05:59,593 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-10 08:05:59,593 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpvsvg3hfz\dll\EDAFoTB.dll, loader C:\tmpvsvg3hfz\bin\YsKCwMy.exe 2026-04-10 08:05:59,609 [root] DEBUG: Loader: Injecting process 3020 (thread 3044) with C:\tmpvsvg3hfz\dll\EDAFoTB.dll. 2026-04-10 08:05:59,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2026-04-10 08:05:59,625 [root] DEBUG: Successfully injected DLL C:\tmpvsvg3hfz\dll\EDAFoTB.dll. 2026-04-10 08:05:59,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3020 2026-04-10 08:06:01,625 [lib.api.process] INFO: Successfully resumed process with pid 3020 2026-04-10 08:06:01,687 [root] DEBUG: 3020: Python path set to 'C:\olddocs'. 2026-04-10 08:06:01,687 [root] DEBUG: 3020: Disabling sleep skipping. 2026-04-10 08:06:01,687 [root] DEBUG: 3020: Process dumps enabled. 2026-04-10 08:06:01,687 [root] DEBUG: 3020: AMSI dumping enabled. 2026-04-10 08:06:01,687 [root] DEBUG: 3020: Dropped file limit defaulting to 100. 2026-04-10 08:06:01,703 [root] DEBUG: 3020: YaraInit: Compiled 45 rule files 2026-04-10 08:06:01,703 [root] DEBUG: 3020: YaraInit: Compiled rules saved to file C:\tmpvsvg3hfz\data\yara\capemon.yac 2026-04-10 08:06:01,703 [root] DEBUG: 3020: YaraScan: Scanning 0x4AB60000, size 0x4bb2e 2026-04-10 08:06:01,718 [root] DEBUG: 3020: Monitor initialised: 32-bit capemon loaded in process 3020 at 0x73b20000, thread 3044, image base 0x4ab60000, stack from 0x63000-0x160000 2026-04-10 08:06:01,718 [root] DEBUG: 3020: Commandline: "C:\Windows\system32\cmd.exe" /c start /wait "" "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat" 2026-04-10 08:06:01,734 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2026-04-10 08:06:01,734 [root] DEBUG: 3020: set_hooks: Unable to hook GetCommandLineA 2026-04-10 08:06:01,734 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2026-04-10 08:06:01,734 [root] DEBUG: 3020: set_hooks: Unable to hook GetCommandLineW 2026-04-10 08:06:01,734 [root] DEBUG: 3020: Hooked 625 out of 627 functions 2026-04-10 08:06:01,750 [root] DEBUG: 3020: RestoreHeaders: Restored original import table. 2026-04-10 08:06:01,750 [root] INFO: Loaded monitor into process with pid 3020 2026-04-10 08:06:01,765 [root] DEBUG: 3020: caller_dispatch: Added region at 0x4AB60000 to tracked regions list (ntdll::NtOpenThread returns to 0x4AB6732B, thread 3044). 2026-04-10 08:06:01,765 [root] DEBUG: 3020: YaraScan: Scanning 0x4AB60000, size 0x4bb2e 2026-04-10 08:06:01,765 [root] DEBUG: 3020: ProcessImageBase: Main module image at 0x4AB60000 unmodified (entropy change 0.000000e+00) 2026-04-10 08:06:01,765 [root] DEBUG: 3020: CreateProcessHandler: Injection info set for new process 2280: C:\Windows\system32\cmd.exe, ImageBase: 0x4AB60000 2026-04-10 08:06:01,765 [root] INFO: Announced 32-bit process name: cmd.exe pid: 2280 2026-04-10 08:06:01,765 [lib.api.process] INFO: Monitor config for process 2280: C:\tmpvsvg3hfz\dll\2280.ini 2026-04-10 08:06:01,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-10 08:06:01,765 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-10 08:06:01,765 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-10 08:06:01,781 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpvsvg3hfz\dll\EDAFoTB.dll, loader C:\tmpvsvg3hfz\bin\YsKCwMy.exe 2026-04-10 08:06:01,796 [root] DEBUG: Loader: Injecting process 2280 (thread 1416) with C:\tmpvsvg3hfz\dll\EDAFoTB.dll. 2026-04-10 08:06:01,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2026-04-10 08:06:01,796 [root] DEBUG: Successfully injected DLL C:\tmpvsvg3hfz\dll\EDAFoTB.dll. 2026-04-10 08:06:01,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2280 2026-04-10 08:06:01,796 [root] DEBUG: 3020: DLL loaded at 0x72720000: C:\Windows\system32\apphelp (0x4c000 bytes). 2026-04-10 08:06:01,812 [root] WARNING: Received request to inject process with pid 2280, skipped alredy in inject list 2026-04-10 08:06:01,812 [root] WARNING: Received request to inject process with pid 2280, skipped alredy in inject list 2026-04-10 08:06:01,828 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:06:01,843 [root] DEBUG: 2280: Python path set to 'C:\olddocs'. 2026-04-10 08:06:01,843 [root] DEBUG: 2280: Disabling sleep skipping. 2026-04-10 08:06:01,843 [root] DEBUG: 2280: Process dumps enabled. 2026-04-10 08:06:01,843 [root] DEBUG: 2280: AMSI dumping enabled. 2026-04-10 08:06:01,843 [root] DEBUG: 2280: Dropped file limit defaulting to 100. 2026-04-10 08:06:01,859 [root] DEBUG: 2280: YaraInit: Compiled rules loaded from existing file C:\tmpvsvg3hfz\data\yara\capemon.yac 2026-04-10 08:06:01,859 [root] DEBUG: 2280: YaraScan: Scanning 0x4AB60000, size 0x4bb2e 2026-04-10 08:06:01,859 [root] DEBUG: 2280: Monitor initialised: 32-bit capemon loaded in process 2280 at 0x73b20000, thread 1416, image base 0x4ab60000, stack from 0x93000-0x190000 2026-04-10 08:06:01,859 [root] DEBUG: 2280: Commandline: C:\Windows\system32\cmd.exe /K "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat" 2026-04-10 08:06:01,875 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2026-04-10 08:06:01,875 [root] DEBUG: 2280: set_hooks: Unable to hook GetCommandLineA 2026-04-10 08:06:01,890 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2026-04-10 08:06:01,890 [root] DEBUG: 2280: set_hooks: Unable to hook GetCommandLineW 2026-04-10 08:06:01,890 [root] DEBUG: 2280: Hooked 625 out of 627 functions 2026-04-10 08:06:01,906 [root] DEBUG: 2280: RestoreHeaders: Restored original import table. 2026-04-10 08:06:01,906 [root] INFO: Loaded monitor into process with pid 2280 2026-04-10 08:06:01,906 [root] DEBUG: 2280: caller_dispatch: Added region at 0x4AB60000 to tracked regions list (ntdll::NtOpenThread returns to 0x4AB6732B, thread 1416). 2026-04-10 08:06:01,906 [root] DEBUG: 2280: YaraScan: Scanning 0x4AB60000, size 0x4bb2e 2026-04-10 08:06:01,906 [root] DEBUG: 2280: ProcessImageBase: Main module image at 0x4AB60000 unmodified (entropy change 0.000000e+00) 2026-04-10 08:06:01,968 [root] DEBUG: 2280: CreateProcessHandler: Injection info set for new process 360: C:\Windows\system32\calc.exe, ImageBase: 0x00240000 2026-04-10 08:06:01,984 [root] INFO: Announced 32-bit process name: calc.exe pid: 360 2026-04-10 08:06:01,984 [lib.api.process] INFO: Monitor config for process 360: C:\tmpvsvg3hfz\dll\360.ini 2026-04-10 08:06:01,984 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-10 08:06:01,984 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-10 08:06:01,984 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-10 08:06:01,984 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpvsvg3hfz\dll\EDAFoTB.dll, loader C:\tmpvsvg3hfz\bin\YsKCwMy.exe 2026-04-10 08:06:02,000 [root] DEBUG: Loader: Injecting process 360 (thread 2744) with C:\tmpvsvg3hfz\dll\EDAFoTB.dll. 2026-04-10 08:06:02,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2026-04-10 08:06:02,000 [root] DEBUG: Successfully injected DLL C:\tmpvsvg3hfz\dll\EDAFoTB.dll. 2026-04-10 08:06:02,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 360 2026-04-10 08:06:02,000 [root] DEBUG: 2280: DLL loaded at 0x72720000: C:\Windows\system32\apphelp (0x4c000 bytes). 2026-04-10 08:06:02,015 [root] WARNING: Received request to inject process with pid 360, skipped alredy in inject list 2026-04-10 08:06:02,046 [root] DEBUG: 360: Python path set to 'C:\olddocs'. 2026-04-10 08:06:02,046 [root] DEBUG: 360: Process dumps enabled. 2026-04-10 08:06:02,046 [root] DEBUG: 360: AMSI dumping enabled. 2026-04-10 08:06:02,046 [root] DEBUG: 360: Dropped file limit defaulting to 100. 2026-04-10 08:06:02,046 [root] DEBUG: 360: Disabling sleep skipping. 2026-04-10 08:06:02,046 [root] DEBUG: 360: YaraInit: Compiled rules loaded from existing file C:\tmpvsvg3hfz\data\yara\capemon.yac 2026-04-10 08:06:02,046 [root] DEBUG: 360: YaraScan: Scanning 0x00240000, size 0xbfb3a 2026-04-10 08:06:02,062 [root] DEBUG: 360: Monitor initialised: 32-bit capemon loaded in process 360 at 0x73b20000, thread 2744, image base 0x240000, stack from 0x126000-0x130000 2026-04-10 08:06:02,062 [root] DEBUG: 360: Commandline: calc.exe 2026-04-10 08:06:02,093 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2026-04-10 08:06:02,093 [root] DEBUG: 360: set_hooks: Unable to hook GetCommandLineA 2026-04-10 08:06:02,093 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2026-04-10 08:06:02,093 [root] DEBUG: 360: set_hooks: Unable to hook GetCommandLineW 2026-04-10 08:06:02,093 [root] DEBUG: 360: Hooked 625 out of 627 functions 2026-04-10 08:06:02,109 [root] DEBUG: 360: RestoreHeaders: Restored original import table. 2026-04-10 08:06:02,109 [root] INFO: Loaded monitor into process with pid 360 2026-04-10 08:06:02,109 [root] DEBUG: 360: caller_dispatch: Added region at 0x00240000 to tracked regions list (ntdll::NtClose returns to 0x00253433, thread 2744). 2026-04-10 08:06:02,109 [root] DEBUG: 360: YaraScan: Scanning 0x00240000, size 0xbfb3a 2026-04-10 08:06:02,125 [root] DEBUG: 360: ProcessImageBase: Main module image at 0x00240000 unmodified (entropy change 0.000000e+00) 2026-04-10 08:06:02,125 [root] DEBUG: 360: DLL loaded at 0x73860000: C:\Windows\SysWOW64\WindowsCodecs (0x130000 bytes). 2026-04-10 08:06:02,187 [root] DEBUG: 360: DLL loaded at 0x73EB0000: C:\Windows\SysWOW64\dwmapi (0x13000 bytes). 2026-04-10 08:06:02,265 [root] DEBUG: 360: DLL loaded at 0x75540000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes). 2026-04-10 08:06:02,447 [root] DEBUG: 360: DLL loaded at 0x73E70000: C:\Windows\SysWOW64\oleacc (0x3c000 bytes). 2026-04-10 08:06:04,697 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:06:04,994 [lib.common.results] INFO: File 1775833564931640600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:06:04,994 [lib.common.results] INFO: File 1775833564931640600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:06:05,009 [lib.common.results] INFO: File 1775833564931640600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:06:05,009 [lib.common.results] INFO: File 1775833564931640600.Application.evtx.gz size is 6907, Max size: 100000000 2026-04-10 08:06:05,056 [lib.common.results] INFO: File 1775833564994140600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:06:05,056 [lib.common.results] INFO: File 1775833564994140600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:06:05,072 [lib.common.results] INFO: File 1775833565009765600.System.evtx.gz size is 8918, Max size: 100000000 2026-04-10 08:06:05,087 [lib.common.results] INFO: File 1775833564994140600.Security.evtx.gz size is 15319, Max size: 100000000 2026-04-10 08:06:05,103 [lib.common.results] INFO: File 1775833565056640600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:06:06,900 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833566.9003906.sysmon.evtx.gz to host 2026-04-10 08:06:06,916 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 9422, Max size: 100000000 2026-04-10 08:06:12,806 [lib.common.results] INFO: File c:\olddocs\1775833567806.saz size is 4599, Max size: 100000000 2026-04-10 08:06:12,822 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:06:20,134 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:06:20,353 [lib.common.results] INFO: File 1775833580306640600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:06:20,369 [lib.common.results] INFO: File 1775833580306640600.Application.evtx.gz size is 6837, Max size: 100000000 2026-04-10 08:06:20,384 [lib.common.results] INFO: File 1775833580306640600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:06:20,384 [lib.common.results] INFO: File 1775833580306640600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:06:20,431 [lib.common.results] INFO: File 1775833580384765600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:06:20,447 [lib.common.results] INFO: File 1775833580369140600.Security.evtx.gz size is 7874, Max size: 100000000 2026-04-10 08:06:20,447 [lib.common.results] INFO: File 1775833580384765600.System.evtx.gz size is 8592, Max size: 100000000 2026-04-10 08:06:20,462 [lib.common.results] INFO: File 1775833580353515600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:06:20,478 [lib.common.results] INFO: File 1775833580431640600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:06:21,931 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:06:27,025 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833587.0253906.sysmon.evtx.gz to host 2026-04-10 08:06:27,025 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 18025, Max size: 100000000 2026-04-10 08:06:32,900 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:06:35,494 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:06:35,728 [lib.common.results] INFO: File 1775833595666015600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:06:35,728 [lib.common.results] INFO: File 1775833595666015600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:06:35,728 [lib.common.results] INFO: File 1775833595666015600.Application.evtx.gz size is 6837, Max size: 100000000 2026-04-10 08:06:35,744 [lib.common.results] INFO: File 1775833595666015600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:06:35,791 [lib.common.results] INFO: File 1775833595728515600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:06:35,791 [lib.common.results] INFO: File 1775833595728515600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:06:35,791 [lib.common.results] INFO: File 1775833595728515600.System.evtx.gz size is 8448, Max size: 100000000 2026-04-10 08:06:35,806 [lib.common.results] INFO: File 1775833595728515600.Security.evtx.gz size is 7663, Max size: 100000000 2026-04-10 08:06:35,837 [lib.common.results] INFO: File 1775833595775390600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:06:42,041 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:06:47,119 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833607.1191406.sysmon.evtx.gz to host 2026-04-10 08:06:47,119 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5688, Max size: 100000000 2026-04-10 08:06:50,869 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:06:51,072 [lib.common.results] INFO: File 1775833611041015600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:06:51,087 [lib.common.results] INFO: File 1775833611041015600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:06:51,087 [lib.common.results] INFO: File 1775833611025390600.Application.evtx.gz size is 6837, Max size: 100000000 2026-04-10 08:06:51,103 [lib.common.results] INFO: File 1775833611041015600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:06:51,134 [lib.common.results] INFO: File 1775833611072265600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:06:51,134 [lib.common.results] INFO: File 1775833611072265600.Security.evtx.gz size is 7021, Max size: 100000000 2026-04-10 08:06:51,134 [lib.common.results] INFO: File 1775833611087890600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:06:51,166 [lib.common.results] INFO: File 1775833611103515600.System.evtx.gz size is 8368, Max size: 100000000 2026-04-10 08:06:51,181 [lib.common.results] INFO: File 1775833611134765600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:06:52,978 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:07:02,150 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:07:06,197 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:07:06,416 [lib.common.results] INFO: File 1775833626369140600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:07:06,431 [lib.common.results] INFO: File 1775833626369140600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:07:06,431 [lib.common.results] INFO: File 1775833626369140600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:07:06,431 [lib.common.results] INFO: File 1775833626369140600.Application.evtx.gz size is 6913, Max size: 100000000 2026-04-10 08:07:06,462 [lib.common.results] INFO: File 1775833626416015600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:07:06,478 [lib.common.results] INFO: File 1775833626431640600.Security.evtx.gz size is 7269, Max size: 100000000 2026-04-10 08:07:06,478 [lib.common.results] INFO: File 1775833626431640600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:07:06,478 [lib.common.results] INFO: File 1775833626431640600.System.evtx.gz size is 8383, Max size: 100000000 2026-04-10 08:07:06,509 [lib.common.results] INFO: File 1775833626462890600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:07:07,228 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833627.2285156.sysmon.evtx.gz to host 2026-04-10 08:07:07,228 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5767, Max size: 100000000 2026-04-10 08:07:13,072 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:07:21,541 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:07:21,775 [lib.common.results] INFO: File 1775833641728515600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:07:21,791 [lib.common.results] INFO: File 1775833641728515600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:07:21,791 [lib.common.results] INFO: File 1775833641728515600.Application.evtx.gz size is 6843, Max size: 100000000 2026-04-10 08:07:21,806 [lib.common.results] INFO: File 1775833641728515600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:07:21,822 [lib.common.results] INFO: File 1775833641775390600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:07:21,837 [lib.common.results] INFO: File 1775833641791015600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:07:21,853 [lib.common.results] INFO: File 1775833641775390600.Security.evtx.gz size is 7109, Max size: 100000000 2026-04-10 08:07:21,853 [lib.common.results] INFO: File 1775833641791015600.System.evtx.gz size is 8380, Max size: 100000000 2026-04-10 08:07:21,869 [lib.common.results] INFO: File 1775833641822265600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:07:22,259 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:07:27,322 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833647.3222656.sysmon.evtx.gz to host 2026-04-10 08:07:27,322 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5634, Max size: 100000000 2026-04-10 08:07:33,150 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:07:36,916 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:07:37,119 [lib.common.results] INFO: File 1775833657072265600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:07:37,134 [lib.common.results] INFO: File 1775833657072265600.Application.evtx.gz size is 6843, Max size: 100000000 2026-04-10 08:07:37,134 [lib.common.results] INFO: File 1775833657087890600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:07:37,166 [lib.common.results] INFO: File 1775833657119140600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:07:37,181 [lib.common.results] INFO: File 1775833657119140600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:07:37,181 [lib.common.results] INFO: File 1775833657134765600.Security.evtx.gz size is 7045, Max size: 100000000 2026-04-10 08:07:37,197 [lib.common.results] INFO: File 1775833657134765600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:07:37,212 [lib.common.results] INFO: File 1775833657181640600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:07:37,228 [lib.common.results] INFO: File 1775833657166015600.System.evtx.gz size is 8401, Max size: 100000000 2026-04-10 08:07:42,337 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:07:47,400 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833667.4003906.sysmon.evtx.gz to host 2026-04-10 08:07:47,400 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5313, Max size: 100000000 2026-04-10 08:07:52,259 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:07:52,462 [lib.common.results] INFO: File 1775833672431640600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:07:52,478 [lib.common.results] INFO: File 1775833672416015600.Application.evtx.gz size is 6843, Max size: 100000000 2026-04-10 08:07:52,494 [lib.common.results] INFO: File 1775833672447265600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:07:52,494 [lib.common.results] INFO: File 1775833672447265600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:07:52,509 [lib.common.results] INFO: File 1775833672462890600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:07:52,541 [lib.common.results] INFO: File 1775833672494140600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:07:52,556 [lib.common.results] INFO: File 1775833672478515600.Security.evtx.gz size is 7167, Max size: 100000000 2026-04-10 08:07:52,572 [lib.common.results] INFO: File 1775833672509765600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:07:52,587 [lib.common.results] INFO: File 1775833672494140600.System.evtx.gz size is 8395, Max size: 100000000 2026-04-10 08:07:53,228 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:08:02,416 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:08:07,478 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833687.4785156.sysmon.evtx.gz to host 2026-04-10 08:08:07,478 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5636, Max size: 100000000 2026-04-10 08:08:07,634 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:08:07,869 [lib.common.results] INFO: File 1775833687822265600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:08:07,884 [lib.common.results] INFO: File 1775833687822265600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:08:07,884 [lib.common.results] INFO: File 1775833687822265600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:08:07,884 [lib.common.results] INFO: File 1775833687822265600.Application.evtx.gz size is 6843, Max size: 100000000 2026-04-10 08:08:07,931 [lib.common.results] INFO: File 1775833687869140600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:08:07,931 [lib.common.results] INFO: File 1775833687884765600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:08:07,947 [lib.common.results] INFO: File 1775833687884765600.Security.evtx.gz size is 7205, Max size: 100000000 2026-04-10 08:08:07,947 [lib.common.results] INFO: File 1775833687884765600.System.evtx.gz size is 8398, Max size: 100000000 2026-04-10 08:08:07,978 [lib.common.results] INFO: File 1775833687931640600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:08:13,322 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:08:22,494 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:08:23,009 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:08:23,228 [lib.common.results] INFO: File 1775833703181640600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:08:23,244 [lib.common.results] INFO: File 1775833703181640600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:08:23,259 [lib.common.results] INFO: File 1775833703181640600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:08:23,259 [lib.common.results] INFO: File 1775833703181640600.Application.evtx.gz size is 6843, Max size: 100000000 2026-04-10 08:08:23,291 [lib.common.results] INFO: File 1775833703228515600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:08:23,291 [lib.common.results] INFO: File 1775833703228515600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:08:23,291 [lib.common.results] INFO: File 1775833703228515600.Security.evtx.gz size is 7134, Max size: 100000000 2026-04-10 08:08:23,306 [lib.common.results] INFO: File 1775833703228515600.System.evtx.gz size is 8386, Max size: 100000000 2026-04-10 08:08:23,322 [lib.common.results] INFO: File 1775833703291015600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:08:27,587 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833707.5878906.sysmon.evtx.gz to host 2026-04-10 08:08:27,587 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5367, Max size: 100000000 2026-04-10 08:08:32,634 [root] INFO: Analysis timeout hit, terminating analysis 2026-04-10 08:08:32,634 [lib.api.process] INFO: Terminate event set for process 3020 2026-04-10 08:08:32,634 [root] DEBUG: 3020: Terminate Event: Attempting to dump process 3020 2026-04-10 08:08:32,634 [root] DEBUG: 3020: DoProcessDump: Skipping process dump as code is identical on disk. 2026-04-10 08:08:32,634 [lib.api.process] INFO: Termination confirmed for process 3020 2026-04-10 08:08:32,634 [root] DEBUG: 3020: Terminate Event: monitor shutdown complete for process 3020 2026-04-10 08:08:32,634 [root] INFO: Terminate event set for process 3020 2026-04-10 08:08:32,650 [lib.api.process] INFO: Terminate event set for process 2280 2026-04-10 08:08:32,650 [root] DEBUG: 2280: Terminate Event: Attempting to dump process 2280 2026-04-10 08:08:32,650 [root] DEBUG: 2280: DoProcessDump: Skipping process dump as code is identical on disk. 2026-04-10 08:08:32,650 [lib.api.process] INFO: Termination confirmed for process 2280 2026-04-10 08:08:32,650 [root] INFO: Terminate event set for process 2280 2026-04-10 08:08:32,650 [root] DEBUG: 2280: Terminate Event: monitor shutdown complete for process 2280 2026-04-10 08:08:32,650 [lib.api.process] INFO: Terminate event set for process 360 2026-04-10 08:08:32,650 [root] DEBUG: 360: Terminate Event: Attempting to dump process 360 2026-04-10 08:08:32,650 [root] DEBUG: 360: DoProcessDump: Skipping process dump as code is identical on disk. 2026-04-10 08:08:32,666 [lib.api.process] INFO: Termination confirmed for process 360 2026-04-10 08:08:32,666 [root] INFO: Terminate event set for process 360 2026-04-10 08:08:32,666 [root] DEBUG: 360: Terminate Event: monitor shutdown complete for process 360 2026-04-10 08:08:32,666 [root] INFO: Created shutdown mutex 2026-04-10 08:08:33,400 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:08:33,666 [root] INFO: Shutting down package 2026-04-10 08:08:33,666 [root] INFO: Stopping auxiliary modules 2026-04-10 08:08:33,666 [modules.auxiliary.curtain] ERROR: Curtain - Error collecting PowerShell events - [WinError 6] The handle is invalid 2026-04-10 08:08:33,666 [lib.common.results] INFO: File C:\curtain.log size is 0, Max size: 100000000 2026-04-10 08:08:33,681 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:08:33,884 [lib.common.results] INFO: File 1775833713837890600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:08:33,884 [lib.common.results] INFO: File 1775833713837890600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:08:33,884 [lib.common.results] INFO: File 1775833713837890600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:08:33,884 [lib.common.results] INFO: File 1775833713837890600.Application.evtx.gz size is 6843, Max size: 100000000 2026-04-10 08:08:33,947 [lib.common.results] INFO: File 1775833713884765600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:08:33,947 [lib.common.results] INFO: File 1775833713884765600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:08:33,947 [lib.common.results] INFO: File 1775833713884765600.Security.evtx.gz size is 7132, Max size: 100000000 2026-04-10 08:08:33,947 [lib.common.results] INFO: File 1775833713884765600.System.evtx.gz size is 8356, Max size: 100000000 2026-04-10 08:08:33,978 [lib.common.results] INFO: File 1775833713947265600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:08:38,353 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 08:08:38,572 [lib.common.results] INFO: File 1775833718525390600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 08:08:38,572 [lib.common.results] INFO: File 1775833718525390600.Application.evtx.gz size is 6843, Max size: 100000000 2026-04-10 08:08:38,603 [lib.common.results] INFO: File 1775833718541015600.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 08:08:38,619 [lib.common.results] INFO: File 1775833718556640600.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 08:08:38,619 [lib.common.results] INFO: File 1775833718572265600.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 08:08:38,619 [lib.common.results] INFO: File 1775833718572265600.Security.evtx.gz size is 7088, Max size: 100000000 2026-04-10 08:08:38,650 [lib.common.results] INFO: File 1775833718587890600.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 08:08:38,650 [lib.common.results] INFO: File 1775833718619140600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 08:08:38,666 [lib.common.results] INFO: File 1775833718603515600.System.evtx.gz size is 8381, Max size: 100000000 2026-04-10 08:08:39,072 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 08:08:39,072 [modules.auxiliary.sysmon] INFO: Doing final sysmon log dump 2026-04-10 08:08:42,603 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 08:08:44,150 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775833724.1503906.sysmon.evtx.gz to host 2026-04-10 08:08:44,150 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 10650, Max size: 100000000 2026-04-10 08:08:44,166 [root] INFO: Finishing auxiliary modules 2026-04-10 08:08:44,166 [root] INFO: Shutting down pipe server and dumping dropped files 2026-04-10 08:08:44,166 [root] WARNING: Folder at path "C:\qgcInklCsf\debugger" does not exist, skipping 2026-04-10 08:08:44,166 [root] WARNING: Folder at path "C:\qgcInklCsf\tlsdump" does not exist, skipping 2026-04-10 08:08:44,166 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| win7office2k3flash2800137TWN3H103 | win7office2k3flash2800137TWN3H103 | KVM | 2026-04-10 14:05:48 | 2026-04-10 14:08:53 | internet |
| File Name | opencalc.bat |
|---|---|
| File Size | 9 bytes |
| File Type | ASCII text |
| MD5 | c61463921d79e07e461fd0e731f72619 |
| SHA1 | 4c70ac1680d2c4bdb145d5be5dad5230b20805f2 |
| SHA256 | 7fdf626e0603f5bc2375a7bbc92c94a21088841c0a03cf3c5f12aa9c680ce4e6 |
| SHA512 | 1a0ada808250064beaafad6095f6d12b0a26ddeb0aff616205986dc4db7c4e72686701945bfb948a141a5f6db0d0e6cec29cd2fddc59ba07a9279a93a7e3541e |
| SHA3-384 | b61a7654e9f55c8d3f21ad0e18325fb9d987f7baece23caa7b5803b1ed18cc0603d1cc5a57f344355e3e08a0950fcd36 |
| CRC32 | 8D648BCF |
| Ssdeep | 3:FGLAdK:FbK |
File
|
|
calc.exe |
|
| Defense Evasion | Privilege Escalation |
|
|
|---|
| Direct | IP | Country Name |
|---|---|---|
| Y | 8.8.8.8 [VT] | United States |
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP