| Category | Package | Started | Completed | Duration | Options | Log | MalScore |
|---|---|---|---|---|---|---|---|
| FILE | xls | 2026-04-14 09:23:04 | 2026-04-14 09:25:06 | 122 seconds | Show Options | Show Log | 3.0 |
procdump=1
amsidump=1
2025-12-02 01:32:06,437 [root] INFO: Date set to: 20260414T02:22:59, timeout set to: 150 2026-04-14 03:22:59,015 [root] DEBUG: Starting analyzer from: C:\tmpvt__1blj 2026-04-14 03:22:59,015 [root] DEBUG: Storing results at: C:\jhGMeTAzsx 2026-04-14 03:22:59,015 [root] DEBUG: Pipe server name: \\.\PIPE\ecaoacBu 2026-04-14 03:22:59,015 [root] DEBUG: Python path: C:\olddocs 2026-04-14 03:22:59,015 [root] INFO: Analysis package "xls" has been specified 2026-04-14 03:22:59,015 [root] DEBUG: Importing analysis package "xls"... 2026-04-14 03:22:59,031 [root] DEBUG: Initializing analysis package "xls"... 2026-04-14 03:22:59,031 [root] INFO: Analyzer: Package modules.packages.xls does not specify a DLL option 2026-04-14 03:22:59,031 [root] INFO: Analyzer: Package modules.packages.xls does not specify a DLL_64 option 2026-04-14 03:22:59,031 [root] INFO: Analyzer: Package modules.packages.xls does not specify a loader option 2026-04-14 03:22:59,031 [root] INFO: Analyzer: Package modules.packages.xls does not specify a loader_64 option 2026-04-14 03:22:59,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.browser"... 2026-04-14 03:22:59,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.curtain"... 2026-04-14 03:22:59,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.default_apps"... 2026-04-14 03:22:59,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.digisig"... 2026-04-14 03:22:59,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.disguise"... 2026-04-14 03:22:59,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.evtx"... 2026-04-14 03:22:59,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.fiddler"... 2026-04-14 03:22:59,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.human"... 2026-04-14 03:22:59,140 [root] DEBUG: Importing auxiliary module "modules.auxiliary.screenshots"... 2026-04-14 03:22:59,140 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2026-04-14 03:22:59,249 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2026-04-14 03:22:59,249 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2026-04-14 03:22:59,265 [root] DEBUG: Importing auxiliary module "modules.auxiliary.sysmon"... 2026-04-14 03:22:59,265 [root] DEBUG: Importing auxiliary module "modules.auxiliary.tlsdump"... 2026-04-14 03:22:59,265 [root] DEBUG: Importing auxiliary module "modules.auxiliary.usage"... 2026-04-14 03:22:59,265 [root] DEBUG: Initializing auxiliary module "Browser"... 2026-04-14 03:22:59,265 [root] DEBUG: Started auxiliary module Browser 2026-04-14 03:22:59,265 [root] DEBUG: Initializing auxiliary module "Curtain"... 2026-04-14 03:22:59,281 [root] DEBUG: Started auxiliary module Curtain 2026-04-14 03:22:59,281 [root] DEBUG: Initializing auxiliary module "DefaultApps"... 2026-04-14 03:22:59,343 [modules.auxiliary.default_apps] DEBUG: Getting current user SID using WinAPI 2026-04-14 03:22:59,343 [root] DEBUG: Started auxiliary module DefaultApps 2026-04-14 03:22:59,343 [root] DEBUG: Initializing auxiliary module "DigiSig"... 2026-04-14 03:22:59,343 [modules.auxiliary.digisig] INFO: signtool.exe was not found in bin/ 2026-04-14 03:22:59,343 [modules.auxiliary.digisig] INFO: xls 2026-04-14 03:22:59,343 [modules.auxiliary.digisig] INFO: Skipping authenticode validation, unsupported analyzer package 2026-04-14 03:22:59,343 [root] DEBUG: Started auxiliary module DigiSig 2026-04-14 03:22:59,343 [root] DEBUG: Initializing auxiliary module "Disguise"... 2026-04-14 03:22:59,671 [modules.auxiliary.disguise] INFO: Setting NoRecentDocsHistory 2026-04-14 03:22:59,671 [root] WARNING: Cannot execute auxiliary module Disguise: [WinError 2] The system cannot find the file specified 2026-04-14 03:22:59,671 [root] DEBUG: Initializing auxiliary module "Evtx"... 2026-04-14 03:22:59,671 [modules.auxiliary.evtx] INFO: Loading audit policy C:\tmpvt__1blj\bin\auditpol.csv 2026-04-14 03:22:59,921 [modules.auxiliary.evtx] INFO: Wiping logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:23:00,656 [root] DEBUG: Started auxiliary module Evtx 2026-04-14 03:23:00,656 [root] DEBUG: Initializing auxiliary module "Fiddler"... 2026-04-14 03:23:00,671 [modules.auxiliary.fiddler] INFO: fiddler package: xls 2026-04-14 03:23:00,671 [root] DEBUG: Started auxiliary module Fiddler 2026-04-14 03:23:00,671 [root] DEBUG: Initializing auxiliary module "Human"... 2026-04-14 03:23:00,671 [root] DEBUG: Started auxiliary module Human 2026-04-14 03:23:00,671 [root] DEBUG: Initializing auxiliary module "Screenshots"... 2026-04-14 03:23:00,671 [root] DEBUG: Started auxiliary module Screenshots 2026-04-14 03:23:00,671 [root] DEBUG: Initializing auxiliary module "Sysmon"... 2026-04-14 03:23:00,687 [modules.auxiliary.sysmon] INFO: Seeing if we need to update sysmon config 2026-04-14 03:23:00,687 [modules.auxiliary.sysmon] INFO: Found Sysmon Executable 2026-04-14 03:23:00,687 [modules.auxiliary.sysmon] INFO: Found Sysmon config 2026-04-14 03:23:00,687 [root] DEBUG: Started auxiliary module Sysmon 2026-04-14 03:23:00,687 [root] DEBUG: Initializing auxiliary module "TLSDumpMasterSecrets"... 2026-04-14 03:23:00,687 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 556 2026-04-14 03:23:00,687 [lib.api.process] INFO: Monitor config for process 556: C:\tmpvt__1blj\dll\556.ini 2026-04-14 03:23:00,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-14 03:23:00,703 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-14 03:23:00,703 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-14 03:23:00,703 [lib.api.process] INFO: Option 'office' with value '1' sent to monitor 2026-04-14 03:23:00,703 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor 2026-04-14 03:23:00,703 [lib.api.process] INFO: Option 'no-iat' with value '1' sent to monitor 2026-04-14 03:23:00,703 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2026-04-14 03:23:00,703 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpvt__1blj\dll\xogkBsc.dll, loader C:\tmpvt__1blj\bin\eImVRvze.exe 2026-04-14 03:23:00,718 [root] DEBUG: Loader: IAT patching disabled. 2026-04-14 03:23:00,734 [root] DEBUG: Loader: Injecting process 556 with C:\tmpvt__1blj\dll\xogkBsc.dll. 2026-04-14 03:23:00,765 [root] DEBUG: 556: Python path set to 'C:\olddocs'. 2026-04-14 03:23:00,765 [root] DEBUG: 556: Disabling sleep skipping. 2026-04-14 03:23:00,765 [root] DEBUG: 556: Process dumps enabled. 2026-04-14 03:23:00,765 [root] DEBUG: 556: AMSI dumping enabled. 2026-04-14 03:23:00,765 [root] DEBUG: 556: Monitor config - unrecognised key office. 2026-04-14 03:23:00,781 [root] DEBUG: 556: In-monitor YARA scans disabled. 2026-04-14 03:23:00,781 [root] DEBUG: 556: TLS secret dump mode enabled. 2026-04-14 03:23:00,781 [root] DEBUG: 556: Monitor initialised: 64-bit capemon loaded in process 556 at 0x000007FEF6170000, thread 2228, image base 0x00000000FF1A0000, stack from 0x0000000001BF3000-0x0000000001C00000 2026-04-14 03:23:00,781 [root] DEBUG: 556: Commandline: C:\Windows\system32\lsass.exe 2026-04-14 03:23:00,796 [root] DEBUG: 556: Hooked 5 out of 5 functions 2026-04-14 03:23:00,796 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2026-04-14 03:23:00,796 [root] DEBUG: Successfully injected DLL C:\tmpvt__1blj\dll\xogkBsc.dll. 2026-04-14 03:23:00,796 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 556 2026-04-14 03:23:00,796 [root] DEBUG: Started auxiliary module TLSDumpMasterSecrets 2026-04-14 03:23:00,796 [root] DEBUG: Initializing auxiliary module "Usage"... 2026-04-14 03:23:00,796 [root] DEBUG: Started auxiliary module Usage 2026-04-14 03:23:02,859 [modules.auxiliary.sysmon] INFO: Clearing existing sysmon logs 2026-04-14 03:23:03,515 [root] INFO: Restarting WMI Service 2026-04-14 03:23:10,593 [lib.api.process] INFO: Successfully executed process from path "C:\Program Files (x86)\Microsoft Office\Office15\EXCEL.EXE" with arguments ""C:\Users\pgabriel\AppData\Local\Temp\Table 6 - Rothmans .xlsm" /dde" with pid 1120 2026-04-14 03:23:10,593 [lib.api.process] INFO: Monitor config for process 1120: C:\tmpvt__1blj\dll\1120.ini 2026-04-14 03:23:10,593 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-14 03:23:10,593 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-14 03:23:10,593 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-14 03:23:10,593 [lib.api.process] INFO: Option 'office' with value '1' sent to monitor 2026-04-14 03:23:10,593 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor 2026-04-14 03:23:10,593 [lib.api.process] INFO: Option 'no-iat' with value '1' sent to monitor 2026-04-14 03:23:10,593 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpvt__1blj\dll\ZmoOFN.dll, loader C:\tmpvt__1blj\bin\YDfudIi.exe 2026-04-14 03:23:10,625 [root] DEBUG: Loader: IAT patching disabled. 2026-04-14 03:23:10,625 [root] DEBUG: Loader: Injecting process 1120 (thread 1480) with C:\tmpvt__1blj\dll\ZmoOFN.dll. 2026-04-14 03:23:10,625 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued. 2026-04-14 03:23:10,640 [root] DEBUG: Successfully injected DLL C:\tmpvt__1blj\dll\ZmoOFN.dll. 2026-04-14 03:23:10,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1120 2026-04-14 03:23:12,640 [lib.api.process] INFO: Successfully resumed process with pid 1120 2026-04-14 03:23:12,875 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-14 03:23:12,984 [root] DEBUG: 1120: Python path set to 'C:\olddocs'. 2026-04-14 03:23:12,984 [root] DEBUG: 1120: Disabling sleep skipping. 2026-04-14 03:23:12,984 [root] DEBUG: 1120: Process dumps enabled. 2026-04-14 03:23:12,984 [root] DEBUG: 1120: AMSI dumping enabled. 2026-04-14 03:23:12,984 [root] DEBUG: 1120: Monitor config - unrecognised key office. 2026-04-14 03:23:12,984 [root] DEBUG: 1120: In-monitor YARA scans disabled. 2026-04-14 03:23:12,984 [root] DEBUG: 1120: Dropped file limit defaulting to 100. 2026-04-14 03:23:13,125 [root] DEBUG: 1120: Microsoft Office settings enabled. 2026-04-14 03:23:13,125 [root] DEBUG: 1120: Monitor initialised: 32-bit capemon loaded in process 1120 at 0x72b60000, thread 1480, image base 0xfe0000, stack from 0x413000-0x420000 2026-04-14 03:23:13,125 [root] DEBUG: 1120: Commandline: "C:\Program Files (x86)\Microsoft Office\Office15\EXCEL.EXE" "C:\Users\pgabriel\AppData\Local\Temp\Table 6 - Rothmans .xlsm" /dde 2026-04-14 03:23:13,125 [root] DEBUG: 1120: add_all_dlls_to_dll_ranges: skipping C:\Program Files (x86)\Microsoft Office\Office15\oart.dll 2026-04-14 03:23:13,156 [root] DEBUG: 1120: Hooked 456 out of 456 functions 2026-04-14 03:23:13,265 [root] INFO: Loaded monitor into process with pid 1120 2026-04-14 03:23:13,578 [root] DEBUG: 1120: DLL loaded at 0x6F9D0000: C:\Program Files (x86)\Common Files\Microsoft Shared\Office15\mso (0x18e4000 bytes). 2026-04-14 03:23:13,578 [root] DEBUG: 1120: DLL loaded at 0x73960000: C:\Windows\system32\MSIMG32 (0x5000 bytes). 2026-04-14 03:23:13,593 [root] DEBUG: 1120: DLL loaded at 0x739E0000: C:\Windows\system32\uxtheme (0x80000 bytes). 2026-04-14 03:23:13,609 [root] DEBUG: 1120: DLL loaded at 0x73970000: C:\Windows\system32\WTSAPI32 (0xd000 bytes). 2026-04-14 03:23:13,609 [root] DEBUG: 1120: DLL loaded at 0x74B80000: C:\Windows\system32\WINSTA (0x29000 bytes). 2026-04-14 03:23:13,625 [root] DEBUG: 1120: DLL loaded at 0x74230000: C:\Windows\system32\dxgi (0x4c000 bytes). 2026-04-14 03:23:13,625 [root] DEBUG: 1120: DLL loaded at 0x737E0000: C:\Windows\system32\VERSION (0x9000 bytes). 2026-04-14 03:23:13,625 [root] DEBUG: 1120: DLL loaded at 0x74C20000: C:\Windows\system32\dwmapi (0x13000 bytes). 2026-04-14 03:23:13,640 [root] DEBUG: 1120: DLL loaded at 0x75920000: C:\Windows\syswow64\setupapi (0x19d000 bytes). 2026-04-14 03:23:13,640 [root] DEBUG: 1120: DLL loaded at 0x75AC0000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes). 2026-04-14 03:23:13,640 [root] DEBUG: 1120: DLL loaded at 0x761F0000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes). 2026-04-14 03:23:13,640 [root] DEBUG: 1120: DLL loaded at 0x76130000: C:\Windows\syswow64\WINTRUST (0x2f000 bytes). 2026-04-14 03:23:13,656 [root] DEBUG: 1120: DLL loaded at 0x75920000: C:\Windows\syswow64\setupapi (0x19d000 bytes). 2026-04-14 03:23:13,656 [root] DEBUG: 1120: DLL loaded at 0x75AC0000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes). 2026-04-14 03:23:13,656 [root] DEBUG: 1120: DLL loaded at 0x761F0000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes). 2026-04-14 03:23:13,671 [root] DEBUG: 1120: DLL loaded at 0x72920000: C:\Windows\system32\msi (0x240000 bytes). 2026-04-14 03:23:13,812 [root] DEBUG: 1120: DLL loaded at 0x73A60000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\Comctl32 (0x19e000 bytes). 2026-04-14 03:23:13,890 [root] DEBUG: 1120: DLL loaded at 0x74200000: C:\Windows\system32\d3d10_1 (0x2c000 bytes). 2026-04-14 03:23:13,906 [root] DEBUG: 1120: DLL loaded at 0x741B0000: C:\Windows\system32\d3d10_1core (0x41000 bytes). 2026-04-14 03:23:13,921 [root] DEBUG: 1120: DLL loaded at 0x722A0000: C:\Windows\system32\d3d11 (0x175000 bytes). 2026-04-14 03:23:13,953 [root] DEBUG: 1120: DLL loaded at 0x720B0000: C:\Windows\system32\D3D10Warp (0x1e9000 bytes). 2026-04-14 03:23:13,953 [root] DEBUG: 1120: DLL loaded at 0x75920000: C:\Windows\syswow64\setupapi (0x19d000 bytes). 2026-04-14 03:23:13,953 [root] DEBUG: 1120: DLL loaded at 0x75AC0000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes). 2026-04-14 03:23:13,968 [root] DEBUG: 1120: DLL loaded at 0x761F0000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes). 2026-04-14 03:23:13,984 [root] DEBUG: 1120: DLL loaded at 0x75920000: C:\Windows\syswow64\setupapi (0x19d000 bytes). 2026-04-14 03:23:13,984 [root] DEBUG: 1120: DLL loaded at 0x75AC0000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes). 2026-04-14 03:23:13,984 [root] DEBUG: 1120: DLL loaded at 0x761F0000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes). 2026-04-14 03:23:14,000 [root] DEBUG: 1120: DLL loaded at 0x75920000: C:\Windows\syswow64\setupapi (0x19d000 bytes). 2026-04-14 03:23:14,000 [root] DEBUG: 1120: DLL loaded at 0x75AC0000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes). 2026-04-14 03:23:14,000 [root] DEBUG: 1120: DLL loaded at 0x761F0000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes). 2026-04-14 03:23:14,281 [root] DEBUG: 1120: DLL loaded at 0x6F600000: C:\Windows\system32\mscoree (0x4a000 bytes). 2026-04-14 03:23:14,296 [root] DEBUG: 1120: DLL loaded at 0x6F570000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei (0x8d000 bytes). 2026-04-14 03:23:14,390 [root] DEBUG: 1120: DLL loaded at 0x6F4B0000: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE15\adal (0xb5000 bytes). 2026-04-14 03:23:14,406 [root] DEBUG: 1120: DLL loaded at 0x6F450000: C:\Windows\system32\WINHTTP (0x58000 bytes). 2026-04-14 03:23:14,406 [root] DEBUG: 1120: DLL loaded at 0x6F400000: C:\Windows\system32\webio (0x50000 bytes). 2026-04-14 03:23:14,437 [root] DEBUG: 1120: DLL loaded at 0x75C80000: C:\Windows\syswow64\WININET (0x1e4000 bytes). 2026-04-14 03:23:14,437 [root] DEBUG: 1120: DLL loaded at 0x760C0000: C:\Windows\syswow64\api-ms-win-downlevel-user32-l1-1-0 (0x4000 bytes). 2026-04-14 03:23:14,437 [root] DEBUG: 1120: DLL loaded at 0x760E0000: C:\Windows\syswow64\api-ms-win-downlevel-shlwapi-l1-1-0 (0x4000 bytes). 2026-04-14 03:23:14,437 [root] DEBUG: 1120: DLL loaded at 0x777B0000: C:\Windows\syswow64\api-ms-win-downlevel-version-l1-1-0 (0x4000 bytes). 2026-04-14 03:23:14,437 [root] DEBUG: 1120: DLL loaded at 0x760D0000: C:\Windows\syswow64\api-ms-win-downlevel-normaliz-l1-1-0 (0x3000 bytes). 2026-04-14 03:23:14,453 [root] DEBUG: 1120: DLL loaded at 0x75B60000: C:\Windows\syswow64\normaliz (0x3000 bytes). 2026-04-14 03:23:14,468 [root] DEBUG: 1120: DLL loaded at 0x75630000: C:\Windows\syswow64\iertutil (0x232000 bytes). 2026-04-14 03:23:14,484 [root] DEBUG: 1120: DLL loaded at 0x76430000: C:\Windows\syswow64\api-ms-win-downlevel-advapi32-l1-1-0 (0x5000 bytes). 2026-04-14 03:23:14,484 [root] DEBUG: 1120: DLL loaded at 0x775F0000: C:\Windows\syswow64\USERENV (0x17000 bytes). 2026-04-14 03:23:14,484 [root] DEBUG: 1120: DLL loaded at 0x774D0000: C:\Windows\syswow64\profapi (0xb000 bytes). 2026-04-14 03:23:14,484 [root] DEBUG: 1120: DLL loaded at 0x74CF0000: C:\Windows\system32\Secur32 (0x8000 bytes). 2026-04-14 03:23:14,578 [root] DEBUG: 1120: DLL loaded at 0x76160000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes). 2026-04-14 03:23:14,593 [root] DEBUG: 1120: DLL loaded at 0x6F3A0000: C:\Windows\System32\netprofm (0x5a000 bytes). 2026-04-14 03:23:14,593 [root] DEBUG: 1120: DLL loaded at 0x74B60000: C:\Windows\System32\nlaapi (0x10000 bytes). 2026-04-14 03:23:14,609 [root] DEBUG: 1120: DLL loaded at 0x73170000: C:\Windows\system32\CRYPTSP (0x17000 bytes). 2026-04-14 03:23:14,609 [root] DEBUG: 1120: DLL loaded at 0x73130000: C:\Windows\system32\rsaenh (0x3b000 bytes). 2026-04-14 03:23:14,625 [root] DEBUG: 1120: DLL loaded at 0x740B0000: C:\Windows\system32\RpcRtRemote (0xe000 bytes). 2026-04-14 03:23:14,625 [root] DEBUG: 1120: DLL loaded at 0x74A10000: C:\Windows\System32\npmproxy (0x8000 bytes). 2026-04-14 03:23:14,828 [root] DEBUG: 1120: DLL loaded at 0x6F210000: C:\Program Files (x86)\Common Files\Microsoft Shared\Office15\riched20 (0x18e000 bytes). 2026-04-14 03:23:15,656 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:23:15,796 [root] DEBUG: 1120: DLL loaded at 0x72080000: C:\Program Files (x86)\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppc (0x2d000 bytes). 2026-04-14 03:23:15,828 [root] DEBUG: 1120: DLL loaded at 0x6A3E0000: C:\Windows\system32\DWrite (0x135000 bytes). 2026-04-14 03:23:15,828 [root] DEBUG: 1120: DLL loaded at 0x740E0000: C:\Windows\system32\IPHLPAPI (0x1c000 bytes). 2026-04-14 03:23:15,843 [root] DEBUG: 1120: DLL loaded at 0x740D0000: C:\Windows\system32\WINNSI (0x7000 bytes). 2026-04-14 03:23:15,843 [root] DEBUG: 1120: DLL loaded at 0x74820000: C:\Windows\system32\dhcpcsvc6 (0xd000 bytes). 2026-04-14 03:23:15,843 [root] DEBUG: 1120: DLL loaded at 0x6A3C0000: C:\Windows\system32\dhcpcsvc (0x12000 bytes). 2026-04-14 03:23:15,937 [lib.common.results] INFO: File 1776162195875000000.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-14 03:23:15,953 [lib.common.results] INFO: File 1776162195859375000.Application.evtx.gz size is 6954, Max size: 100000000 2026-04-14 03:23:15,953 [root] DEBUG: 1120: DLL loaded at 0x731F0000: C:\Windows\system32\credssp (0x8000 bytes). 2026-04-14 03:23:15,953 [root] DEBUG: 1120: DLL loaded at 0x74070000: C:\Windows\system32\mswsock (0x3c000 bytes). 2026-04-14 03:23:15,953 [lib.common.results] INFO: File 1776162195890625000.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-14 03:23:15,953 [root] DEBUG: 1120: DLL loaded at 0x74060000: C:\Windows\System32\wshtcpip (0x5000 bytes). 2026-04-14 03:23:15,968 [root] DEBUG: 1120: DLL loaded at 0x74050000: C:\Windows\System32\wship6 (0x6000 bytes). 2026-04-14 03:23:15,968 [root] DEBUG: 1120: DLL loaded at 0x6A2F0000: C:\Windows\system32\DNSAPI (0x44000 bytes). 2026-04-14 03:23:15,984 [lib.common.results] INFO: File 1776162195906250000.KeyManagementService.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:23:16,000 [lib.common.results] INFO: File 1776162195937500000.OAlerts.evtx.gz size is 249, Max size: 100000000 2026-04-14 03:23:16,031 [lib.common.results] INFO: File 1776162195953125000.Setup.evtx.gz size is 248, Max size: 100000000 2026-04-14 03:23:16,031 [root] DEBUG: 1120: DLL loaded at 0x6A2A0000: C:\Windows\SysWOW64\schannel (0x41000 bytes). 2026-04-14 03:23:16,031 [lib.common.results] INFO: File 1776162195953125000.Security.evtx.gz size is 15826, Max size: 100000000 2026-04-14 03:23:16,046 [lib.common.results] INFO: File 1776162195984375000.System.evtx.gz size is 8863, Max size: 100000000 2026-04-14 03:23:16,062 [lib.common.results] INFO: File 1776162196000000000.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:23:16,109 [root] DEBUG: 556: DLL loaded at 0x000007FEF1B30000: C:\Windows\system32\dssenh (0x32000 bytes). 2026-04-14 03:23:16,234 [root] DEBUG: 1120: DLL loaded at 0x76630000: C:\Windows\syswow64\SHELL32 (0xc4a000 bytes). 2026-04-14 03:23:16,281 [root] DEBUG: 556: DLL loaded at 0x000007FEF9380000: C:\Windows\system32\keyiso (0xb000 bytes). 2026-04-14 03:23:16,296 [root] DEBUG: 1120: DLL loaded at 0x6A390000: C:\Windows\system32\XmlLite (0x2f000 bytes). 2026-04-14 03:23:16,484 [root] DEBUG: 1120: DLL loaded at 0x75920000: C:\Windows\syswow64\SETUPAPI (0x19d000 bytes). 2026-04-14 03:23:16,484 [root] DEBUG: 1120: DLL loaded at 0x75AC0000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes). 2026-04-14 03:23:16,484 [root] DEBUG: 1120: DLL loaded at 0x761F0000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes). 2026-04-14 03:23:16,500 [root] DEBUG: 1120: DLL loaded at 0x6A1A0000: C:\Windows\system32\propsys (0xf5000 bytes). 2026-04-14 03:23:16,515 [root] DEBUG: 1120: DLL loaded at 0x739A0000: C:\Windows\system32\ntmarta (0x21000 bytes). 2026-04-14 03:23:16,515 [root] DEBUG: 1120: DLL loaded at 0x75870000: C:\Windows\syswow64\WLDAP32 (0x45000 bytes). 2026-04-14 03:23:16,562 [root] DEBUG: 1120: DLL loaded at 0x75F70000: C:\Windows\SysWOW64\urlmon (0x14a000 bytes). 2026-04-14 03:23:16,562 [root] DEBUG: 1120: DLL loaded at 0x763A0000: C:\Windows\syswow64\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes). 2026-04-14 03:23:16,578 [root] DEBUG: 1120: DLL loaded at 0x72070000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes). 2026-04-14 03:23:16,625 [root] DEBUG: 1120: DLL loaded at 0x6A370000: C:\Windows\system32\MPR (0x12000 bytes). 2026-04-14 03:23:16,750 [root] DEBUG: 1120: DLL loaded at 0x6A040000: C:\Windows\System32\msxml6 (0x158000 bytes). 2026-04-14 03:23:16,921 [root] DEBUG: 556: TLS 1.2 secrets logged to: C:\jhGMeTAzsx\tlsdump\tlsdump.log 2026-04-14 03:23:16,984 [root] DEBUG: 556: DLL loaded at 0x000007FEFAA70000: C:\Windows\system32\cryptnet (0x27000 bytes). 2026-04-14 03:23:16,984 [root] DEBUG: 556: DLL loaded at 0x000007FEFE8D0000: C:\Windows\system32\WLDAP32 (0x52000 bytes). 2026-04-14 03:23:17,046 [root] DEBUG: 1120: DLL loaded at 0x6A000000: C:\Windows\system32\ncrypt (0x39000 bytes). 2026-04-14 03:23:17,046 [root] DEBUG: 1120: DLL loaded at 0x69FC0000: C:\Windows\SysWOW64\bcryptprimitives (0x3d000 bytes). 2026-04-14 03:23:17,171 [root] DEBUG: 1120: DLL loaded at 0x6A350000: C:\Windows\system32\GPAPI (0x16000 bytes). 2026-04-14 03:23:17,421 [root] DEBUG: 1120: DLL loaded at 0x69E90000: C:\Windows\system32\WindowsCodecs (0x130000 bytes). 2026-04-14 03:23:17,453 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\office15client.microsoft.com\config15--lcid=1033&syslcid=1033&uilcid=1033&build=15.0.4569&crev=10 2026-04-14 03:23:17,453 [root] DEBUG: 1120: DLL loaded at 0x69E50000: C:\Windows\system32\WINMM (0x32000 bytes). 2026-04-14 03:23:17,468 [root] DEBUG: 1120: DLL loaded at 0x69D80000: C:\Windows\system32\webservices (0xc2000 bytes). 2026-04-14 03:23:17,500 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma00546271.png0 size is 119666, Max size: 100000000 2026-04-14 03:23:17,500 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma02786999.png0 size is 8127, Max size: 100000000 2026-04-14 03:23:17,515 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900771.png0 size is 10213, Max size: 100000000 2026-04-14 03:23:17,546 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16382936.png0 size is 37573, Max size: 100000000 2026-04-14 03:23:17,578 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16382941.png0 size is 96333, Max size: 100000000 2026-04-14 03:23:17,593 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma02835058.png0 size is 186365, Max size: 100000000 2026-04-14 03:23:17,609 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma03978815.png0 size is 711398, Max size: 100000000 2026-04-14 03:23:17,640 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt78018332.png0 size is 26105, Max size: 100000000 2026-04-14 03:23:17,656 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16392850.png0 size is 280509, Max size: 100000000 2026-04-14 03:23:17,671 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt45325165.png0 size is 9149, Max size: 100000000 2026-04-14 03:23:17,687 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma03982351.png0 size is 12860, Max size: 100000000 2026-04-14 03:23:17,703 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16392877.png0 size is 86215, Max size: 100000000 2026-04-14 03:23:17,718 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16402488.png0 size is 114584, Max size: 100000000 2026-04-14 03:23:17,718 [root] DEBUG: 1120: DLL loaded at 0x69D60000: C:\Windows\system32\cryptnet (0x1d000 bytes). 2026-04-14 03:23:17,750 [root] DEBUG: 1120: DLL loaded at 0x69D50000: C:\Windows\system32\SensApi (0x6000 bytes). 2026-04-14 03:23:17,750 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16412178.png0 size is 283253, Max size: 100000000 2026-04-14 03:23:17,781 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma56348247.png0 size is 55049, Max size: 100000000 2026-04-14 03:23:17,796 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900720.png0 size is 22877, Max size: 100000000 2026-04-14 03:23:17,828 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma88924273.png0 size is 103770, Max size: 100000000 2026-04-14 03:23:17,875 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02836342.png0 size is 26220, Max size: 100000000 2026-04-14 03:23:17,875 [root] DEBUG: 1120: DLL loaded at 0x69D40000: C:\Windows\system32\msimtf (0xb000 bytes). 2026-04-14 03:23:17,890 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02892315.png0 size is 20776, Max size: 100000000 2026-04-14 03:23:17,890 [root] DEBUG: 1120: set_hooks_by_export_directory: Hooked 0 out of 456 functions 2026-04-14 03:23:17,890 [root] DEBUG: 1120: DLL loaded at 0x69D30000: C:\Program Files (x86)\Microsoft Office\Office15\MSOSTYLE (0xa000 bytes). 2026-04-14 03:23:17,906 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt10002124.png0 size is 11329, Max size: 100000000 2026-04-14 03:23:17,939 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt78500733.png0 size is 10169, Max size: 100000000 2026-04-14 03:23:17,939 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776162197.9394531.sysmon.evtx.gz to host 2026-04-14 03:23:17,939 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 9113, Max size: 100000000 2026-04-14 03:23:17,986 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02911863.png0 size is 41743, Max size: 100000000 2026-04-14 03:23:18,017 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900688.png0 size is 8561, Max size: 100000000 2026-04-14 03:23:18,033 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900722.png0 size is 19188, Max size: 100000000 2026-04-14 03:23:18,048 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900743.png0 size is 33070, Max size: 100000000 2026-04-14 03:23:18,095 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02923944.png0 size is 4886, Max size: 100000000 2026-04-14 03:23:18,162 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt10002117.png0 size is 4962, Max size: 100000000 2026-04-14 03:23:18,165 [modules.auxiliary.human] INFO: Found button "&Continue", clicking it 2026-04-14 03:23:18,213 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt16402400.png0 size is 33856, Max size: 100000000 2026-04-14 03:23:18,237 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt22746018.png0 size is 18469, Max size: 100000000 2026-04-14 03:23:18,252 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt45088960.png0 size is 40992, Max size: 100000000 2026-04-14 03:23:18,284 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt45420242.png0 size is 13339, Max size: 100000000 2026-04-14 03:23:19,760 [root] DEBUG: 1120: DLL loaded at 0x69D00000: C:\Windows\system32\POWRPROF (0x25000 bytes). 2026-04-14 03:23:21,229 [root] DEBUG: 1120: DLL loaded at 0x69CD0000: C:\Windows\system32\SXS (0x5f000 bytes). 2026-04-14 03:23:23,776 [lib.common.results] INFO: File c:\olddocs\1776162198776.saz size is 25291, Max size: 100000000 2026-04-14 03:23:23,791 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-14 03:23:31,104 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:23:31,338 [lib.common.results] INFO: File 1776162211291992100.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-14 03:23:31,338 [lib.common.results] INFO: File 1776162211291992100.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-14 03:23:31,354 [lib.common.results] INFO: File 1776162211291992100.KeyManagementService.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:23:31,354 [lib.common.results] INFO: File 1776162211291992100.Application.evtx.gz size is 6874, Max size: 100000000 2026-04-14 03:23:31,385 [lib.common.results] INFO: File 1776162211338867100.OAlerts.evtx.gz size is 1251, Max size: 100000000 2026-04-14 03:23:31,385 [lib.common.results] INFO: File 1776162211338867100.Setup.evtx.gz size is 248, Max size: 100000000 2026-04-14 03:23:31,401 [lib.common.results] INFO: File 1776162211338867100.Security.evtx.gz size is 7579, Max size: 100000000 2026-04-14 03:23:31,416 [lib.common.results] INFO: File 1776162211354492100.System.evtx.gz size is 8612, Max size: 100000000 2026-04-14 03:23:31,432 [lib.common.results] INFO: File 1776162211385742100.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:23:32,948 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-14 03:23:38,104 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776162218.104492.sysmon.evtx.gz to host 2026-04-14 03:23:38,104 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 100359, Max size: 100000000 2026-04-14 03:23:43,870 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-14 03:23:46,463 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:23:46,713 [lib.common.results] INFO: File 1776162226651367100.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-14 03:23:46,729 [lib.common.results] INFO: File 1776162226651367100.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-14 03:23:46,729 [lib.common.results] INFO: File 1776162226651367100.KeyManagementService.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:23:46,729 [lib.common.results] INFO: File 1776162226651367100.Application.evtx.gz size is 6821, Max size: 100000000 2026-04-14 03:23:46,760 [lib.common.results] INFO: File 1776162226713867100.OAlerts.evtx.gz size is 1192, Max size: 100000000 2026-04-14 03:23:46,776 [lib.common.results] INFO: File 1776162226713867100.Setup.evtx.gz size is 248, Max size: 100000000 2026-04-14 03:23:46,776 [lib.common.results] INFO: File 1776162226713867100.System.evtx.gz size is 8245, Max size: 100000000 2026-04-14 03:23:46,776 [lib.common.results] INFO: File 1776162226713867100.Security.evtx.gz size is 7426, Max size: 100000000 2026-04-14 03:23:46,807 [lib.common.results] INFO: File 1776162226760742100.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:23:53,120 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-14 03:23:58,182 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776162238.1826172.sysmon.evtx.gz to host 2026-04-14 03:23:58,182 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 6893, Max size: 100000000 2026-04-14 03:24:01,823 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:24:02,057 [lib.common.results] INFO: File 1776162241995117100.KeyManagementService.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:02,057 [lib.common.results] INFO: File 1776162241995117100.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-14 03:24:02,057 [lib.common.results] INFO: File 1776162241995117100.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-14 03:24:02,057 [lib.common.results] INFO: File 1776162241995117100.Application.evtx.gz size is 6821, Max size: 100000000 2026-04-14 03:24:02,104 [lib.common.results] INFO: File 1776162242057617100.Setup.evtx.gz size is 248, Max size: 100000000 2026-04-14 03:24:02,120 [lib.common.results] INFO: File 1776162242057617100.OAlerts.evtx.gz size is 1192, Max size: 100000000 2026-04-14 03:24:02,120 [lib.common.results] INFO: File 1776162242057617100.Security.evtx.gz size is 7489, Max size: 100000000 2026-04-14 03:24:02,120 [lib.common.results] INFO: File 1776162242057617100.System.evtx.gz size is 8241, Max size: 100000000 2026-04-14 03:24:02,151 [lib.common.results] INFO: File 1776162242104492100.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:03,948 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-14 03:24:05,354 [modules.auxiliary.human] INFO: Doing office click around. 2026-04-14 03:24:13,198 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-14 03:24:17,182 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:24:17,401 [lib.common.results] INFO: File 1776162257354492100.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-14 03:24:17,401 [lib.common.results] INFO: File 1776162257354492100.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-14 03:24:17,401 [lib.common.results] INFO: File 1776162257354492100.KeyManagementService.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:17,416 [lib.common.results] INFO: File 1776162257354492100.Application.evtx.gz size is 6958, Max size: 100000000 2026-04-14 03:24:17,448 [lib.common.results] INFO: File 1776162257401367100.Setup.evtx.gz size is 248, Max size: 100000000 2026-04-14 03:24:17,463 [lib.common.results] INFO: File 1776162257401367100.Security.evtx.gz size is 7594, Max size: 100000000 2026-04-14 03:24:17,463 [lib.common.results] INFO: File 1776162257401367100.OAlerts.evtx.gz size is 1192, Max size: 100000000 2026-04-14 03:24:17,479 [lib.common.results] INFO: File 1776162257416992100.System.evtx.gz size is 8229, Max size: 100000000 2026-04-14 03:24:17,495 [lib.common.results] INFO: File 1776162257448242100.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:18,291 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776162258.291992.sysmon.evtx.gz to host 2026-04-14 03:24:18,291 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 28365, Max size: 100000000 2026-04-14 03:24:24,041 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-14 03:24:32,526 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:24:32,541 [modules.auxiliary.human] INFO: Closing Office window 2026-04-14 03:24:32,604 [modules.auxiliary.human] INFO: Issuing keypress on Office dialog 2026-04-14 03:24:32,858 [lib.common.results] INFO: File 1776162272729492100.Application.evtx.gz size is 6892, Max size: 100000000 2026-04-14 03:24:32,908 [lib.common.results] INFO: File 1776162272776367100.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-14 03:24:32,916 [lib.common.results] INFO: File 1776162272776367100.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-14 03:24:32,923 [lib.common.results] INFO: File 1776162272855468700.OAlerts.evtx.gz size is 1248, Max size: 100000000 2026-04-14 03:24:32,931 [lib.common.results] INFO: File 1776162272838867100.KeyManagementService.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:32,947 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Local\Temp\Table 6 - Rothmans .xlsm 2026-04-14 03:24:32,947 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Local\Temp\E1E41000 2026-04-14 03:24:32,970 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Temp\14138C61.tmp size is 985492, Max size: 100000000 2026-04-14 03:24:32,978 [lib.common.results] INFO: File 1776162272908203100.System.evtx.gz size is 8266, Max size: 100000000 2026-04-14 03:24:32,978 [lib.common.results] INFO: File 1776162272908203100.Setup.evtx.gz size is 248, Max size: 100000000 2026-04-14 03:24:32,978 [lib.common.results] INFO: File 1776162272908203100.Security.evtx.gz size is 7577, Max size: 100000000 2026-04-14 03:24:33,001 [lib.common.results] INFO: File 1776162272931640600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:33,259 [root] DEBUG: 1120: DLL loaded at 0x69B60000: C:\Windows\system32\POWRPROF (0x25000 bytes). 2026-04-14 03:24:33,314 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-14 03:24:33,501 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Temp\CVRAD2B.tmp.cvr size is 0, Max size: 100000000 2026-04-14 03:24:33,556 [root] DEBUG: 1120: NtTerminateProcess hook: Attempting to dump process 1120 2026-04-14 03:24:33,587 [root] DEBUG: 1120: VerifyCodeSection: Executable code does not match, 0xa86f8 of 0x130f9ab matching 2026-04-14 03:24:33,595 [root] DEBUG: 1120: DoProcessDump: Code modification detected, dumping Imagebase at 0x00FE0000. 2026-04-14 03:24:33,595 [root] DEBUG: 1120: DumpImageInCurrentProcess: Attempting to dump virtual PE image. 2026-04-14 03:24:33,595 [root] DEBUG: 1120: DumpProcess: Instantiating PeParser with address: 0x00FE0000. 2026-04-14 03:24:33,595 [root] DEBUG: 1120: DumpProcess: Module entry point VA is 0x00003550. 2026-04-14 03:24:33,837 [lib.common.results] INFO: File C:\jhGMeTAzsx\CAPE\1120_57525033241014242026 size is 25695232, Max size: 100000000 2026-04-14 03:24:33,994 [root] DEBUG: 1120: DumpProcess: Module image dump success - dump size 0x1881400. 2026-04-14 03:24:34,025 [root] INFO: Process with pid 1120 has terminated 2026-04-14 03:24:38,400 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776162278.4003906.sysmon.evtx.gz to host 2026-04-14 03:24:38,400 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 16553, Max size: 100000000 2026-04-14 03:24:39,697 [root] INFO: Process list is empty, terminating analysis 2026-04-14 03:24:40,697 [root] INFO: Created shutdown mutex 2026-04-14 03:24:41,697 [root] INFO: Shutting down package 2026-04-14 03:24:41,697 [root] INFO: Stopping auxiliary modules 2026-04-14 03:24:41,697 [modules.auxiliary.curtain] ERROR: Curtain - Error collecting PowerShell events - [WinError 6] The handle is invalid 2026-04-14 03:24:41,697 [lib.common.results] INFO: File C:\curtain.log size is 0, Max size: 100000000 2026-04-14 03:24:41,697 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:24:41,978 [lib.common.results] INFO: File 1776162281900390600.KeyManagementService.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:41,994 [lib.common.results] INFO: File 1776162281900390600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-14 03:24:41,994 [lib.common.results] INFO: File 1776162281900390600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-14 03:24:41,994 [lib.common.results] INFO: File 1776162281900390600.Application.evtx.gz size is 6892, Max size: 100000000 2026-04-14 03:24:42,041 [lib.common.results] INFO: File 1776162281978515600.Security.evtx.gz size is 7629, Max size: 100000000 2026-04-14 03:24:42,056 [lib.common.results] INFO: File 1776162281978515600.System.evtx.gz size is 8259, Max size: 100000000 2026-04-14 03:24:42,056 [lib.common.results] INFO: File 1776162281978515600.Setup.evtx.gz size is 248, Max size: 100000000 2026-04-14 03:24:42,056 [lib.common.results] INFO: File 1776162281962890600.OAlerts.evtx.gz size is 1188, Max size: 100000000 2026-04-14 03:24:42,087 [lib.common.results] INFO: File 1776162282041015600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:44,119 [lib.common.results] INFO: File c:\olddocs\1776162279103.saz size is 2839, Max size: 100000000 2026-04-14 03:24:44,134 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-14 03:24:47,150 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-14 03:24:47,150 [modules.auxiliary.sysmon] INFO: Doing final sysmon log dump 2026-04-14 03:24:48,025 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-14 03:24:48,244 [lib.common.results] INFO: File 1776162288212890600.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-14 03:24:48,275 [lib.common.results] INFO: File 1776162288197265600.Application.evtx.gz size is 6892, Max size: 100000000 2026-04-14 03:24:48,291 [lib.common.results] INFO: File 1776162288212890600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-14 03:24:48,306 [lib.common.results] INFO: File 1776162288244140600.OAlerts.evtx.gz size is 1188, Max size: 100000000 2026-04-14 03:24:48,322 [lib.common.results] INFO: File 1776162288244140600.KeyManagementService.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:48,337 [lib.common.results] INFO: File 1776162288259765600.Security.evtx.gz size is 7444, Max size: 100000000 2026-04-14 03:24:48,353 [lib.common.results] INFO: File 1776162288291015600.Setup.evtx.gz size is 248, Max size: 100000000 2026-04-14 03:24:48,369 [lib.common.results] INFO: File 1776162288306640600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-14 03:24:48,369 [lib.common.results] INFO: File 1776162288306640600.System.evtx.gz size is 8271, Max size: 100000000 2026-04-14 03:24:52,228 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776162292.2285156.sysmon.evtx.gz to host 2026-04-14 03:24:52,228 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 23072, Max size: 100000000 2026-04-14 03:24:52,244 [root] INFO: Finishing auxiliary modules 2026-04-14 03:24:52,244 [root] INFO: Shutting down pipe server and dumping dropped files 2026-04-14 03:24:52,244 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\office15client.microsoft.com\config15--lcid=1033&syslcid=1033&uilcid=1033&build=15.0.4569&crev=10 size is 23349, Max size: 100000000 2026-04-14 03:24:52,259 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Temp\Table 6 - Rothmans .xlsm size is 984734, Max size: 100000000 2026-04-14 03:24:52,259 [root] WARNING: Folder at path "C:\jhGMeTAzsx\debugger" does not exist, skipping 2026-04-14 03:24:52,275 [root] INFO: Uploading files at path "C:\jhGMeTAzsx\tlsdump" 2026-04-14 03:24:52,275 [lib.common.results] INFO: File C:\jhGMeTAzsx\tlsdump\tlsdump.log size is 2466, Max size: 100000000 2026-04-14 03:24:52,275 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| win7office2k3flash2800137TWN3H106 | win7office2k3flash2800137TWN3H106 | KVM | 2026-04-14 09:23:04 | 2026-04-14 09:25:06 | internet |
| File Name | Table 6 - Rothmans .xlsm |
|---|---|
| File Size | 985492 bytes |
| File Type | Microsoft Excel 2007+ |
| MD5 | d80b41710da0bd47dc7899febad37fd4 |
| SHA1 | 0faaa32074ea9508953f47cbf777c169e91a5b97 |
| SHA256 | 295ffa7016a5e2883bbafcf31d8da78abedb1493133e2dca051a0244819feb28 |
| SHA512 | 91b1060c36226960ba69daa0f0abb77e066d947ea6c25fdb5a136fd122490461cbee934cc598495a75ef07acc2077d01182853d631f7f5f7aed83fabf3798ef3 |
| SHA3-384 | 1413ab15ec84b86111c2c7b382b97f857e57eeb4d9bd7a3432cce4e28119bc2de4cc854772cf02fd7d79b0cdc1ac5aad |
| CRC32 | BE48D6A3 |
| TLSH | T1DF25122CE512A7ECC2C4687FCA1855E805D4B18FC2B6E40F6AA0BB5518DB0EBE74DDD1 |
| Ssdeep | 12288:5vEHFqZS7Dfo7lumTptiNFZZwkoexa9Q+YhcErCt6JGfjDVH6qsVplYxqi9SbGZG:5YqZQyT63NUt/jDd6qsVpW9QC3E |
File
|
| Initial Access | Defense Evasion | Privilege Escalation |
|
|
|
|---|
| Direct | IP | Country Name |
|---|---|---|
| Y | 8.8.8.8 [VT] | United States |
| Name | Response | Post-Analysis Lookup |
|---|---|---|
| roaming.svc.cloud.microsoft [VT] |
A 52.110.10.2
[VT]
A 52.110.10.22 [VT] CNAME prod.roaming1.live.com.akadns.net [VT] CNAME atm.office.mira.tm.svc.cloud.microsoft [VT] A 52.110.10.3 [VT] A 52.110.10.50 [VT] CNAME roaming-prod-weightedww.trafficmanager.net [VT] CNAME eur.roaming1.live.com.akadns.net [VT] |
52.110.10.12 [VT] |
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP