| Category | Package | Started | Completed | Duration | Options | Log | MalScore |
|---|---|---|---|---|---|---|---|
| FILE | bat | 2026-04-15 09:03:40 | 2026-04-15 09:06:44 | 184 seconds | Show Options | Show Log | 1.5 |
procdump=1
amsidump=1
2025-12-02 01:31:18,906 [root] INFO: Date set to: 20260415T02:03:39, timeout set to: 150 2026-04-15 03:03:39,015 [root] DEBUG: Starting analyzer from: C:\tmpn7j73yx1 2026-04-15 03:03:39,015 [root] DEBUG: Storing results at: C:\fZIYKyA 2026-04-15 03:03:39,015 [root] DEBUG: Pipe server name: \\.\PIPE\BnGnJKVVeJ 2026-04-15 03:03:39,015 [root] DEBUG: Python path: C:\olddocs 2026-04-15 03:03:39,015 [root] DEBUG: No analysis package specified, trying to detect it automagically 2026-04-15 03:03:39,015 [root] INFO: Automatically selected analysis package "bat" 2026-04-15 03:03:39,015 [root] DEBUG: Importing analysis package "bat"... 2026-04-15 03:03:39,031 [root] DEBUG: Initializing analysis package "bat"... 2026-04-15 03:03:39,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a DLL option 2026-04-15 03:03:39,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a DLL_64 option 2026-04-15 03:03:39,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a loader option 2026-04-15 03:03:39,031 [root] INFO: Analyzer: Package modules.packages.bat does not specify a loader_64 option 2026-04-15 03:03:39,062 [root] DEBUG: Importing auxiliary module "modules.auxiliary.browser"... 2026-04-15 03:03:39,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.curtain"... 2026-04-15 03:03:39,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.default_apps"... 2026-04-15 03:03:39,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.digisig"... 2026-04-15 03:03:39,093 [root] DEBUG: Importing auxiliary module "modules.auxiliary.disguise"... 2026-04-15 03:03:39,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.evtx"... 2026-04-15 03:03:39,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.fiddler"... 2026-04-15 03:03:39,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.human"... 2026-04-15 03:03:39,156 [root] DEBUG: Importing auxiliary module "modules.auxiliary.screenshots"... 2026-04-15 03:03:39,171 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2026-04-15 03:03:39,281 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2026-04-15 03:03:39,281 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2026-04-15 03:03:39,296 [root] DEBUG: Importing auxiliary module "modules.auxiliary.sysmon"... 2026-04-15 03:03:39,296 [root] DEBUG: Importing auxiliary module "modules.auxiliary.tlsdump"... 2026-04-15 03:03:39,296 [root] DEBUG: Importing auxiliary module "modules.auxiliary.usage"... 2026-04-15 03:03:39,296 [root] DEBUG: Initializing auxiliary module "Browser"... 2026-04-15 03:03:39,296 [root] DEBUG: Started auxiliary module Browser 2026-04-15 03:03:39,296 [root] DEBUG: Initializing auxiliary module "Curtain"... 2026-04-15 03:03:39,296 [root] DEBUG: Started auxiliary module Curtain 2026-04-15 03:03:39,296 [root] DEBUG: Initializing auxiliary module "DefaultApps"... 2026-04-15 03:03:39,375 [modules.auxiliary.default_apps] DEBUG: Getting current user SID using WinAPI 2026-04-15 03:03:39,375 [root] DEBUG: Started auxiliary module DefaultApps 2026-04-15 03:03:39,375 [root] DEBUG: Initializing auxiliary module "DigiSig"... 2026-04-15 03:03:39,375 [modules.auxiliary.digisig] INFO: signtool.exe was not found in bin/ 2026-04-15 03:03:39,375 [modules.auxiliary.digisig] INFO: dummy 2026-04-15 03:03:39,375 [modules.auxiliary.digisig] INFO: Skipping authenticode validation, unsupported analyzer package 2026-04-15 03:03:39,375 [root] DEBUG: Started auxiliary module DigiSig 2026-04-15 03:03:39,375 [root] DEBUG: Initializing auxiliary module "Disguise"... 2026-04-15 03:03:39,656 [modules.auxiliary.disguise] INFO: Setting NoRecentDocsHistory 2026-04-15 03:03:39,656 [root] WARNING: Cannot execute auxiliary module Disguise: [WinError 2] The system cannot find the file specified 2026-04-15 03:03:39,656 [root] DEBUG: Initializing auxiliary module "Evtx"... 2026-04-15 03:03:39,656 [modules.auxiliary.evtx] INFO: Loading audit policy C:\tmpn7j73yx1\bin\auditpol.csv 2026-04-15 03:03:39,875 [modules.auxiliary.evtx] INFO: Wiping logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:03:40,765 [root] DEBUG: Started auxiliary module Evtx 2026-04-15 03:03:40,765 [root] DEBUG: Initializing auxiliary module "Fiddler"... 2026-04-15 03:03:40,765 [modules.auxiliary.fiddler] INFO: fiddler package: dummy 2026-04-15 03:03:40,781 [root] DEBUG: Started auxiliary module Fiddler 2026-04-15 03:03:40,781 [root] DEBUG: Initializing auxiliary module "Human"... 2026-04-15 03:03:40,781 [root] DEBUG: Started auxiliary module Human 2026-04-15 03:03:40,781 [root] DEBUG: Initializing auxiliary module "Screenshots"... 2026-04-15 03:03:40,781 [root] DEBUG: Started auxiliary module Screenshots 2026-04-15 03:03:40,781 [root] DEBUG: Initializing auxiliary module "Sysmon"... 2026-04-15 03:03:40,781 [modules.auxiliary.sysmon] INFO: Seeing if we need to update sysmon config 2026-04-15 03:03:40,781 [root] DEBUG: Started auxiliary module Sysmon 2026-04-15 03:03:40,781 [root] DEBUG: Initializing auxiliary module "TLSDumpMasterSecrets"... 2026-04-15 03:03:40,781 [modules.auxiliary.sysmon] INFO: Found Sysmon Executable 2026-04-15 03:03:40,781 [modules.auxiliary.sysmon] INFO: Found Sysmon config 2026-04-15 03:03:40,781 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 560 2026-04-15 03:03:40,781 [lib.api.process] INFO: Monitor config for process 560: C:\tmpn7j73yx1\dll\560.ini 2026-04-15 03:03:40,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-15 03:03:40,796 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-15 03:03:40,796 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-15 03:03:40,796 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2026-04-15 03:03:40,796 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpn7j73yx1\dll\odvYqdd.dll, loader C:\tmpn7j73yx1\bin\oqotqyVc.exe 2026-04-15 03:03:40,812 [root] DEBUG: Loader: Injecting process 560 with C:\tmpn7j73yx1\dll\odvYqdd.dll. 2026-04-15 03:03:40,859 [root] DEBUG: 560: Python path set to 'C:\olddocs'. 2026-04-15 03:03:40,859 [root] DEBUG: 560: Disabling sleep skipping. 2026-04-15 03:03:40,859 [root] DEBUG: 560: Process dumps enabled. 2026-04-15 03:03:40,859 [root] DEBUG: 560: AMSI dumping enabled. 2026-04-15 03:03:40,875 [root] DEBUG: 560: TLS secret dump mode enabled. 2026-04-15 03:03:40,875 [root] DEBUG: 560: Monitor initialised: 64-bit capemon loaded in process 560 at 0x000007FEF5C20000, thread 3028, image base 0x00000000FF510000, stack from 0x0000000002172000-0x0000000002180000 2026-04-15 03:03:40,875 [root] DEBUG: 560: Commandline: C:\Windows\system32\lsass.exe 2026-04-15 03:03:40,890 [root] DEBUG: 560: Hooked 5 out of 5 functions 2026-04-15 03:03:40,890 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2026-04-15 03:03:40,890 [root] DEBUG: Successfully injected DLL C:\tmpn7j73yx1\dll\odvYqdd.dll. 2026-04-15 03:03:40,906 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 560 2026-04-15 03:03:40,906 [root] DEBUG: Started auxiliary module TLSDumpMasterSecrets 2026-04-15 03:03:40,906 [root] DEBUG: Initializing auxiliary module "Usage"... 2026-04-15 03:03:40,906 [root] DEBUG: Started auxiliary module Usage 2026-04-15 03:03:43,000 [modules.auxiliary.sysmon] INFO: Clearing existing sysmon logs 2026-04-15 03:03:43,703 [root] INFO: Restarting WMI Service 2026-04-15 03:03:47,796 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\cmd.exe" with arguments "/c start /wait "" "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat"" with pid 2188 2026-04-15 03:03:47,796 [lib.api.process] INFO: Monitor config for process 2188: C:\tmpn7j73yx1\dll\2188.ini 2026-04-15 03:03:47,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-15 03:03:47,796 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-15 03:03:47,796 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-15 03:03:47,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpn7j73yx1\dll\MDncXB.dll, loader C:\tmpn7j73yx1\bin\PARdjgO.exe 2026-04-15 03:03:47,843 [root] DEBUG: Loader: Injecting process 2188 (thread 2812) with C:\tmpn7j73yx1\dll\MDncXB.dll. 2026-04-15 03:03:47,859 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2026-04-15 03:03:47,859 [root] DEBUG: Successfully injected DLL C:\tmpn7j73yx1\dll\MDncXB.dll. 2026-04-15 03:03:47,859 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2188 2026-04-15 03:03:49,859 [lib.api.process] INFO: Successfully resumed process with pid 2188 2026-04-15 03:03:49,906 [root] DEBUG: 2188: Python path set to 'C:\olddocs'. 2026-04-15 03:03:49,906 [root] DEBUG: 2188: Disabling sleep skipping. 2026-04-15 03:03:49,906 [root] DEBUG: 2188: Process dumps enabled. 2026-04-15 03:03:49,906 [root] DEBUG: 2188: AMSI dumping enabled. 2026-04-15 03:03:49,906 [root] DEBUG: 2188: Dropped file limit defaulting to 100. 2026-04-15 03:03:49,921 [root] DEBUG: 2188: YaraInit: Compiled 45 rule files 2026-04-15 03:03:49,921 [root] DEBUG: 2188: YaraInit: Compiled rules saved to file C:\tmpn7j73yx1\data\yara\capemon.yac 2026-04-15 03:03:49,921 [root] DEBUG: 2188: YaraScan: Scanning 0x49EC0000, size 0x4bb2e 2026-04-15 03:03:49,937 [root] DEBUG: 2188: Monitor initialised: 32-bit capemon loaded in process 2188 at 0x73d40000, thread 2812, image base 0x49ec0000, stack from 0x2b3000-0x3b0000 2026-04-15 03:03:49,937 [root] DEBUG: 2188: Commandline: "C:\Windows\system32\cmd.exe" /c start /wait "" "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat" 2026-04-15 03:03:49,953 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2026-04-15 03:03:49,953 [root] DEBUG: 2188: set_hooks: Unable to hook GetCommandLineA 2026-04-15 03:03:49,953 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2026-04-15 03:03:49,953 [root] DEBUG: 2188: set_hooks: Unable to hook GetCommandLineW 2026-04-15 03:03:49,968 [root] DEBUG: 2188: Hooked 625 out of 627 functions 2026-04-15 03:03:49,968 [root] DEBUG: 2188: RestoreHeaders: Restored original import table. 2026-04-15 03:03:49,984 [root] INFO: Loaded monitor into process with pid 2188 2026-04-15 03:03:49,984 [root] DEBUG: 2188: caller_dispatch: Added region at 0x49EC0000 to tracked regions list (ntdll::NtOpenThread returns to 0x49EC732B, thread 2812). 2026-04-15 03:03:49,984 [root] DEBUG: 2188: YaraScan: Scanning 0x49EC0000, size 0x4bb2e 2026-04-15 03:03:49,984 [root] DEBUG: 2188: ProcessImageBase: Main module image at 0x49EC0000 unmodified (entropy change 0.000000e+00) 2026-04-15 03:03:49,984 [root] DEBUG: 2188: CreateProcessHandler: Injection info set for new process 1524: C:\Windows\system32\cmd.exe, ImageBase: 0x49EC0000 2026-04-15 03:03:49,984 [root] INFO: Announced 32-bit process name: cmd.exe pid: 1524 2026-04-15 03:03:49,984 [lib.api.process] INFO: Monitor config for process 1524: C:\tmpn7j73yx1\dll\1524.ini 2026-04-15 03:03:50,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-15 03:03:50,000 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-15 03:03:50,000 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-15 03:03:50,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpn7j73yx1\dll\MDncXB.dll, loader C:\tmpn7j73yx1\bin\PARdjgO.exe 2026-04-15 03:03:50,000 [root] DEBUG: Loader: Injecting process 1524 (thread 352) with C:\tmpn7j73yx1\dll\MDncXB.dll. 2026-04-15 03:03:50,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2026-04-15 03:03:50,000 [root] DEBUG: Successfully injected DLL C:\tmpn7j73yx1\dll\MDncXB.dll. 2026-04-15 03:03:50,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1524 2026-04-15 03:03:50,000 [root] DEBUG: 2188: DLL loaded at 0x733F0000: C:\Windows\system32\apphelp (0x4c000 bytes). 2026-04-15 03:03:50,015 [root] WARNING: Received request to inject process with pid 1524, skipped alredy in inject list 2026-04-15 03:03:50,015 [root] WARNING: Received request to inject process with pid 1524, skipped alredy in inject list 2026-04-15 03:03:50,046 [root] DEBUG: 1524: Python path set to 'C:\olddocs'. 2026-04-15 03:03:50,046 [root] DEBUG: 1524: Disabling sleep skipping. 2026-04-15 03:03:50,046 [root] DEBUG: 1524: Process dumps enabled. 2026-04-15 03:03:50,046 [root] DEBUG: 1524: AMSI dumping enabled. 2026-04-15 03:03:50,046 [root] DEBUG: 1524: Dropped file limit defaulting to 100. 2026-04-15 03:03:50,062 [root] DEBUG: 1524: YaraInit: Compiled rules loaded from existing file C:\tmpn7j73yx1\data\yara\capemon.yac 2026-04-15 03:03:50,062 [root] DEBUG: 1524: YaraScan: Scanning 0x49EC0000, size 0x4bb2e 2026-04-15 03:03:50,062 [root] DEBUG: 1524: Monitor initialised: 32-bit capemon loaded in process 1524 at 0x73d40000, thread 352, image base 0x49ec0000, stack from 0x1d3000-0x2d0000 2026-04-15 03:03:50,062 [root] DEBUG: 1524: Commandline: C:\Windows\system32\cmd.exe /K "C:\Users\pgabriel\AppData\Local\Temp\opencalc.bat" 2026-04-15 03:03:50,078 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2026-04-15 03:03:50,078 [root] DEBUG: 1524: set_hooks: Unable to hook GetCommandLineA 2026-04-15 03:03:50,078 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2026-04-15 03:03:50,078 [root] DEBUG: 1524: set_hooks: Unable to hook GetCommandLineW 2026-04-15 03:03:50,093 [root] DEBUG: 1524: Hooked 625 out of 627 functions 2026-04-15 03:03:50,109 [root] DEBUG: 1524: RestoreHeaders: Restored original import table. 2026-04-15 03:03:50,109 [root] INFO: Loaded monitor into process with pid 1524 2026-04-15 03:03:50,109 [root] DEBUG: 1524: caller_dispatch: Added region at 0x49EC0000 to tracked regions list (ntdll::NtOpenThread returns to 0x49EC732B, thread 352). 2026-04-15 03:03:50,109 [root] DEBUG: 1524: YaraScan: Scanning 0x49EC0000, size 0x4bb2e 2026-04-15 03:03:50,109 [root] DEBUG: 1524: ProcessImageBase: Main module image at 0x49EC0000 unmodified (entropy change 0.000000e+00) 2026-04-15 03:03:50,171 [root] DEBUG: 1524: CreateProcessHandler: Injection info set for new process 2404: C:\Windows\system32\calc.exe, ImageBase: 0x008F0000 2026-04-15 03:03:50,171 [root] INFO: Announced 32-bit process name: calc.exe pid: 2404 2026-04-15 03:03:50,171 [lib.api.process] INFO: Monitor config for process 2404: C:\tmpn7j73yx1\dll\2404.ini 2026-04-15 03:03:50,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-15 03:03:50,187 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-15 03:03:50,187 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-15 03:03:50,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpn7j73yx1\dll\MDncXB.dll, loader C:\tmpn7j73yx1\bin\PARdjgO.exe 2026-04-15 03:03:50,187 [root] DEBUG: Loader: Injecting process 2404 (thread 2436) with C:\tmpn7j73yx1\dll\MDncXB.dll. 2026-04-15 03:03:50,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2026-04-15 03:03:50,203 [root] DEBUG: Successfully injected DLL C:\tmpn7j73yx1\dll\MDncXB.dll. 2026-04-15 03:03:50,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2404 2026-04-15 03:03:50,203 [root] DEBUG: 1524: DLL loaded at 0x733F0000: C:\Windows\system32\apphelp (0x4c000 bytes). 2026-04-15 03:03:50,218 [root] WARNING: Received request to inject process with pid 2404, skipped alredy in inject list 2026-04-15 03:03:50,249 [root] DEBUG: 2404: Python path set to 'C:\olddocs'. 2026-04-15 03:03:50,249 [root] DEBUG: 2404: Process dumps enabled. 2026-04-15 03:03:50,249 [root] DEBUG: 2404: AMSI dumping enabled. 2026-04-15 03:03:50,249 [root] DEBUG: 2404: Dropped file limit defaulting to 100. 2026-04-15 03:03:50,249 [root] DEBUG: 2404: Disabling sleep skipping. 2026-04-15 03:03:50,249 [root] DEBUG: 2404: YaraInit: Compiled rules loaded from existing file C:\tmpn7j73yx1\data\yara\capemon.yac 2026-04-15 03:03:50,265 [root] DEBUG: 2404: YaraScan: Scanning 0x008F0000, size 0xbfb3a 2026-04-15 03:03:50,265 [root] DEBUG: 2404: Monitor initialised: 32-bit capemon loaded in process 2404 at 0x73d40000, thread 2436, image base 0x8f0000, stack from 0x236000-0x240000 2026-04-15 03:03:50,265 [root] DEBUG: 2404: Commandline: calc.exe 2026-04-15 03:03:50,281 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2026-04-15 03:03:50,296 [root] DEBUG: 2404: set_hooks: Unable to hook GetCommandLineA 2026-04-15 03:03:50,296 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2026-04-15 03:03:50,296 [root] DEBUG: 2404: set_hooks: Unable to hook GetCommandLineW 2026-04-15 03:03:50,312 [root] DEBUG: 2404: Hooked 625 out of 627 functions 2026-04-15 03:03:50,312 [root] DEBUG: 2404: RestoreHeaders: Restored original import table. 2026-04-15 03:03:50,312 [root] INFO: Loaded monitor into process with pid 2404 2026-04-15 03:03:50,328 [root] DEBUG: 2404: caller_dispatch: Added region at 0x008F0000 to tracked regions list (ntdll::NtClose returns to 0x00903433, thread 2436). 2026-04-15 03:03:50,328 [root] DEBUG: 2404: YaraScan: Scanning 0x008F0000, size 0xbfb3a 2026-04-15 03:03:50,328 [root] DEBUG: 2404: ProcessImageBase: Main module image at 0x008F0000 unmodified (entropy change 0.000000e+00) 2026-04-15 03:03:50,328 [root] DEBUG: 2404: DLL loaded at 0x72940000: C:\Windows\SysWOW64\WindowsCodecs (0x130000 bytes). 2026-04-15 03:03:50,343 [root] DEBUG: 2404: DLL loaded at 0x74440000: C:\Windows\SysWOW64\dwmapi (0x13000 bytes). 2026-04-15 03:03:50,390 [root] DEBUG: 2404: DLL loaded at 0x752D0000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes). 2026-04-15 03:03:50,572 [root] DEBUG: 2404: DLL loaded at 0x74300000: C:\Windows\SysWOW64\oleacc (0x3c000 bytes). 2026-04-15 03:03:53,009 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-15 03:03:55,775 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:03:56,041 [lib.common.results] INFO: File 1776247435978515600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:03:56,072 [lib.common.results] INFO: File 1776247435978515600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:03:56,072 [lib.common.results] INFO: File 1776247435978515600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:03:56,087 [lib.common.results] INFO: File 1776247435978515600.Application.evtx.gz size is 6958, Max size: 100000000 2026-04-15 03:03:56,103 [lib.common.results] INFO: File 1776247436041015600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:03:56,103 [lib.common.results] INFO: File 1776247436041015600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:03:56,103 [lib.common.results] INFO: File 1776247436041015600.System.evtx.gz size is 8711, Max size: 100000000 2026-04-15 03:03:56,119 [lib.common.results] INFO: File 1776247436041015600.Security.evtx.gz size is 7807, Max size: 100000000 2026-04-15 03:03:56,150 [lib.common.results] INFO: File 1776247436087890600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:03:58,103 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247438.1035156.sysmon.evtx.gz to host 2026-04-15 03:03:58,103 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 14538, Max size: 100000000 2026-04-15 03:04:03,884 [lib.common.results] INFO: File c:\olddocs\1776247438884.saz size is 4599, Max size: 100000000 2026-04-15 03:04:03,900 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:04:11,181 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:04:11,400 [lib.common.results] INFO: File 1776247451353515600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:04:11,416 [lib.common.results] INFO: File 1776247451353515600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:04:11,416 [lib.common.results] INFO: File 1776247451353515600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:04:11,431 [lib.common.results] INFO: File 1776247451353515600.Application.evtx.gz size is 6893, Max size: 100000000 2026-04-15 03:04:11,462 [lib.common.results] INFO: File 1776247451416015600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:04:11,462 [lib.common.results] INFO: File 1776247451400390600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:04:11,462 [lib.common.results] INFO: File 1776247451416015600.Security.evtx.gz size is 8026, Max size: 100000000 2026-04-15 03:04:11,478 [lib.common.results] INFO: File 1776247451431640600.System.evtx.gz size is 8199, Max size: 100000000 2026-04-15 03:04:11,509 [lib.common.results] INFO: File 1776247451462890600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:04:13,119 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-15 03:04:18,197 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247458.1972656.sysmon.evtx.gz to host 2026-04-15 03:04:18,212 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5956, Max size: 100000000 2026-04-15 03:04:24,009 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:04:26,541 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:04:26,759 [lib.common.results] INFO: File 1776247466712890600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:04:26,775 [lib.common.results] INFO: File 1776247466712890600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:04:26,791 [lib.common.results] INFO: File 1776247466712890600.Application.evtx.gz size is 6893, Max size: 100000000 2026-04-15 03:04:26,791 [lib.common.results] INFO: File 1776247466712890600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:04:26,822 [lib.common.results] INFO: File 1776247466759765600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:04:26,822 [lib.common.results] INFO: File 1776247466775390600.Security.evtx.gz size is 7868, Max size: 100000000 2026-04-15 03:04:26,853 [lib.common.results] INFO: File 1776247466775390600.System.evtx.gz size is 8215, Max size: 100000000 2026-04-15 03:04:26,853 [lib.common.results] INFO: File 1776247466775390600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:04:26,869 [lib.common.results] INFO: File 1776247466822265600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:04:33,228 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-15 03:04:38,291 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247478.2910156.sysmon.evtx.gz to host 2026-04-15 03:04:38,291 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 6115, Max size: 100000000 2026-04-15 03:04:41,900 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:04:42,103 [lib.common.results] INFO: File 1776247482056640600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:04:42,119 [lib.common.results] INFO: File 1776247482056640600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:04:42,119 [lib.common.results] INFO: File 1776247482056640600.Application.evtx.gz size is 6893, Max size: 100000000 2026-04-15 03:04:42,119 [lib.common.results] INFO: File 1776247482056640600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:04:42,150 [lib.common.results] INFO: File 1776247482103515600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:04:42,150 [lib.common.results] INFO: File 1776247482103515600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:04:42,166 [lib.common.results] INFO: File 1776247482103515600.Security.evtx.gz size is 8022, Max size: 100000000 2026-04-15 03:04:42,166 [lib.common.results] INFO: File 1776247482119140600.System.evtx.gz size is 8091, Max size: 100000000 2026-04-15 03:04:42,197 [lib.common.results] INFO: File 1776247482150390600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:04:44,087 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:04:53,306 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-15 03:04:57,228 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:04:57,447 [lib.common.results] INFO: File 1776247497400390600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:04:57,447 [lib.common.results] INFO: File 1776247497400390600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:04:57,447 [lib.common.results] INFO: File 1776247497400390600.Application.evtx.gz size is 6956, Max size: 100000000 2026-04-15 03:04:57,462 [lib.common.results] INFO: File 1776247497400390600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:04:57,509 [lib.common.results] INFO: File 1776247497447265600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:04:57,525 [lib.common.results] INFO: File 1776247497447265600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:04:57,525 [lib.common.results] INFO: File 1776247497447265600.Security.evtx.gz size is 7903, Max size: 100000000 2026-04-15 03:04:57,541 [lib.common.results] INFO: File 1776247497462890600.System.evtx.gz size is 8110, Max size: 100000000 2026-04-15 03:04:57,556 [lib.common.results] INFO: File 1776247497509765600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:04:58,384 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247498.3847656.sysmon.evtx.gz to host 2026-04-15 03:04:58,384 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 6117, Max size: 100000000 2026-04-15 03:05:04,181 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:05:12,587 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:05:12,822 [lib.common.results] INFO: File 1776247512775390600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:05:12,837 [lib.common.results] INFO: File 1776247512775390600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:05:12,837 [lib.common.results] INFO: File 1776247512775390600.Application.evtx.gz size is 6890, Max size: 100000000 2026-04-15 03:05:12,837 [lib.common.results] INFO: File 1776247512775390600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:05:12,884 [lib.common.results] INFO: File 1776247512822265600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:05:12,900 [lib.common.results] INFO: File 1776247512822265600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:05:12,900 [lib.common.results] INFO: File 1776247512837890600.System.evtx.gz size is 8109, Max size: 100000000 2026-04-15 03:05:12,916 [lib.common.results] INFO: File 1776247512822265600.Security.evtx.gz size is 7886, Max size: 100000000 2026-04-15 03:05:12,931 [lib.common.results] INFO: File 1776247512884765600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:05:13,400 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-15 03:05:18,462 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247518.4628904.sysmon.evtx.gz to host 2026-04-15 03:05:18,462 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 6040, Max size: 100000000 2026-04-15 03:05:24,259 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:05:27,962 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:05:28,166 [lib.common.results] INFO: File 1776247528119140600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:05:28,166 [lib.common.results] INFO: File 1776247528119140600.Application.evtx.gz size is 6890, Max size: 100000000 2026-04-15 03:05:28,181 [lib.common.results] INFO: File 1776247528119140600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:05:28,181 [lib.common.results] INFO: File 1776247528119140600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:05:28,228 [lib.common.results] INFO: File 1776247528166015600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:05:28,228 [lib.common.results] INFO: File 1776247528166015600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:05:28,228 [lib.common.results] INFO: File 1776247528166015600.Security.evtx.gz size is 7880, Max size: 100000000 2026-04-15 03:05:28,244 [lib.common.results] INFO: File 1776247528181640600.System.evtx.gz size is 8095, Max size: 100000000 2026-04-15 03:05:28,259 [lib.common.results] INFO: File 1776247528228515600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:05:33,494 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-15 03:05:38,556 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247538.5566406.sysmon.evtx.gz to host 2026-04-15 03:05:38,556 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5667, Max size: 100000000 2026-04-15 03:05:43,291 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:05:43,494 [lib.common.results] INFO: File 1776247543447265600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:05:43,494 [lib.common.results] INFO: File 1776247543447265600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:05:43,494 [lib.common.results] INFO: File 1776247543447265600.Application.evtx.gz size is 6890, Max size: 100000000 2026-04-15 03:05:43,509 [lib.common.results] INFO: File 1776247543447265600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:05:43,541 [lib.common.results] INFO: File 1776247543494140600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:05:43,556 [lib.common.results] INFO: File 1776247543494140600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:05:43,556 [lib.common.results] INFO: File 1776247543494140600.Security.evtx.gz size is 7933, Max size: 100000000 2026-04-15 03:05:43,556 [lib.common.results] INFO: File 1776247543509765600.System.evtx.gz size is 8106, Max size: 100000000 2026-04-15 03:05:43,587 [lib.common.results] INFO: File 1776247543541015600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:05:44,337 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:05:53,572 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-15 03:05:58,619 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:05:58,712 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247558.7128906.sysmon.evtx.gz to host 2026-04-15 03:05:58,712 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 6020, Max size: 100000000 2026-04-15 03:05:58,837 [lib.common.results] INFO: File 1776247558791015600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:05:58,837 [lib.common.results] INFO: File 1776247558791015600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:05:58,853 [lib.common.results] INFO: File 1776247558791015600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:05:58,853 [lib.common.results] INFO: File 1776247558791015600.Application.evtx.gz size is 6890, Max size: 100000000 2026-04-15 03:05:58,900 [lib.common.results] INFO: File 1776247558837890600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:05:58,900 [lib.common.results] INFO: File 1776247558837890600.Security.evtx.gz size is 7950, Max size: 100000000 2026-04-15 03:05:58,900 [lib.common.results] INFO: File 1776247558837890600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:05:58,900 [lib.common.results] INFO: File 1776247558837890600.System.evtx.gz size is 8099, Max size: 100000000 2026-04-15 03:05:58,931 [lib.common.results] INFO: File 1776247558884765600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:06:04,416 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:06:13,728 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-15 03:06:13,962 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:06:14,181 [lib.common.results] INFO: File 1776247574134765600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:06:14,197 [lib.common.results] INFO: File 1776247574134765600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:06:14,197 [lib.common.results] INFO: File 1776247574134765600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:06:14,197 [lib.common.results] INFO: File 1776247574134765600.Application.evtx.gz size is 6890, Max size: 100000000 2026-04-15 03:06:14,244 [lib.common.results] INFO: File 1776247574181640600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:06:14,259 [lib.common.results] INFO: File 1776247574197265600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:06:14,259 [lib.common.results] INFO: File 1776247574197265600.System.evtx.gz size is 8100, Max size: 100000000 2026-04-15 03:06:14,275 [lib.common.results] INFO: File 1776247574181640600.Security.evtx.gz size is 7947, Max size: 100000000 2026-04-15 03:06:14,275 [lib.common.results] INFO: File 1776247574244140600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:06:18,791 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247578.7910156.sysmon.evtx.gz to host 2026-04-15 03:06:18,806 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5698, Max size: 100000000 2026-04-15 03:06:20,869 [root] INFO: Analysis timeout hit, terminating analysis 2026-04-15 03:06:20,869 [lib.api.process] INFO: Terminate event set for process 2188 2026-04-15 03:06:20,869 [root] DEBUG: 2188: Terminate Event: Attempting to dump process 2188 2026-04-15 03:06:20,869 [root] DEBUG: 2188: DoProcessDump: Skipping process dump as code is identical on disk. 2026-04-15 03:06:20,869 [lib.api.process] INFO: Termination confirmed for process 2188 2026-04-15 03:06:20,869 [root] INFO: Terminate event set for process 2188 2026-04-15 03:06:20,869 [root] DEBUG: 2188: Terminate Event: monitor shutdown complete for process 2188 2026-04-15 03:06:20,869 [lib.api.process] INFO: Terminate event set for process 1524 2026-04-15 03:06:20,869 [root] DEBUG: 1524: Terminate Event: Attempting to dump process 1524 2026-04-15 03:06:20,869 [root] DEBUG: 1524: DoProcessDump: Skipping process dump as code is identical on disk. 2026-04-15 03:06:20,884 [lib.api.process] INFO: Termination confirmed for process 1524 2026-04-15 03:06:20,884 [root] INFO: Terminate event set for process 1524 2026-04-15 03:06:20,884 [root] DEBUG: 1524: Terminate Event: monitor shutdown complete for process 1524 2026-04-15 03:06:20,884 [lib.api.process] INFO: Terminate event set for process 2404 2026-04-15 03:06:20,884 [root] DEBUG: 2404: Terminate Event: Attempting to dump process 2404 2026-04-15 03:06:20,884 [root] DEBUG: 2404: DoProcessDump: Skipping process dump as code is identical on disk. 2026-04-15 03:06:20,884 [lib.api.process] INFO: Termination confirmed for process 2404 2026-04-15 03:06:20,884 [root] DEBUG: 2404: Terminate Event: monitor shutdown complete for process 2404 2026-04-15 03:06:20,884 [root] INFO: Terminate event set for process 2404 2026-04-15 03:06:20,884 [root] INFO: Created shutdown mutex 2026-04-15 03:06:21,884 [root] INFO: Shutting down package 2026-04-15 03:06:21,884 [root] INFO: Stopping auxiliary modules 2026-04-15 03:06:21,884 [modules.auxiliary.curtain] ERROR: Curtain - Error collecting PowerShell events - [WinError 6] The handle is invalid 2026-04-15 03:06:21,884 [lib.common.results] INFO: File C:\curtain.log size is 0, Max size: 100000000 2026-04-15 03:06:21,900 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:06:22,103 [lib.common.results] INFO: File 1776247582056640600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:06:22,103 [lib.common.results] INFO: File 1776247582056640600.Application.evtx.gz size is 6890, Max size: 100000000 2026-04-15 03:06:22,103 [lib.common.results] INFO: File 1776247582056640600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:06:22,119 [lib.common.results] INFO: File 1776247582056640600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:06:22,150 [lib.common.results] INFO: File 1776247582103515600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:06:22,150 [lib.common.results] INFO: File 1776247582103515600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:06:22,166 [lib.common.results] INFO: File 1776247582103515600.Security.evtx.gz size is 8041, Max size: 100000000 2026-04-15 03:06:22,181 [lib.common.results] INFO: File 1776247582119140600.System.evtx.gz size is 8102, Max size: 100000000 2026-04-15 03:06:22,197 [lib.common.results] INFO: File 1776247582150390600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:06:24,494 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:06:27,291 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-15 03:06:27,291 [modules.auxiliary.sysmon] INFO: Doing final sysmon log dump 2026-04-15 03:06:29,322 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-15 03:06:29,541 [lib.common.results] INFO: File 1776247589494140600.InternetExplorer.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:06:29,541 [lib.common.results] INFO: File 1776247589494140600.HardwareEvents.evtx.gz size is 250, Max size: 100000000 2026-04-15 03:06:29,541 [lib.common.results] INFO: File 1776247589494140600.Application.evtx.gz size is 6890, Max size: 100000000 2026-04-15 03:06:29,556 [lib.common.results] INFO: File 1776247589494140600.KeyManagementService.evtx.gz size is 4650, Max size: 100000000 2026-04-15 03:06:29,587 [lib.common.results] INFO: File 1776247589541015600.OAlerts.evtx.gz size is 244, Max size: 100000000 2026-04-15 03:06:29,603 [lib.common.results] INFO: File 1776247589541015600.Security.evtx.gz size is 7958, Max size: 100000000 2026-04-15 03:06:29,603 [lib.common.results] INFO: File 1776247589541015600.Setup.evtx.gz size is 241, Max size: 100000000 2026-04-15 03:06:29,619 [lib.common.results] INFO: File 1776247589556640600.System.evtx.gz size is 8110, Max size: 100000000 2026-04-15 03:06:29,634 [lib.common.results] INFO: File 1776247589587890600.WindowsPowerShell.evtx.gz size is 2058, Max size: 100000000 2026-04-15 03:06:32,369 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776247592.3691404.sysmon.evtx.gz to host 2026-04-15 03:06:32,369 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5269, Max size: 100000000 2026-04-15 03:06:32,384 [root] INFO: Finishing auxiliary modules 2026-04-15 03:06:32,384 [root] INFO: Shutting down pipe server and dumping dropped files 2026-04-15 03:06:32,384 [root] WARNING: Folder at path "C:\fZIYKyA\debugger" does not exist, skipping 2026-04-15 03:06:32,384 [root] WARNING: Folder at path "C:\fZIYKyA\tlsdump" does not exist, skipping 2026-04-15 03:06:32,384 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| win7office2k3flash2800137TWN3H105 | win7office2k3flash2800137TWN3H105 | KVM | 2026-04-15 09:03:40 | 2026-04-15 09:06:44 | internet |
| File Name | opencalc.bat |
|---|---|
| File Size | 9 bytes |
| File Type | ASCII text |
| MD5 | c61463921d79e07e461fd0e731f72619 |
| SHA1 | 4c70ac1680d2c4bdb145d5be5dad5230b20805f2 |
| SHA256 | 7fdf626e0603f5bc2375a7bbc92c94a21088841c0a03cf3c5f12aa9c680ce4e6 |
| SHA512 | 1a0ada808250064beaafad6095f6d12b0a26ddeb0aff616205986dc4db7c4e72686701945bfb948a141a5f6db0d0e6cec29cd2fddc59ba07a9279a93a7e3541e |
| SHA3-384 | b61a7654e9f55c8d3f21ad0e18325fb9d987f7baece23caa7b5803b1ed18cc0603d1cc5a57f344355e3e08a0950fcd36 |
| CRC32 | 8D648BCF |
| Ssdeep | 3:FGLAdK:FbK |
File
|
|
calc.exe |
|
| Defense Evasion | Privilege Escalation |
|
|
|---|
| Direct | IP | Country Name |
|---|---|---|
| Y | 8.8.8.8 [VT] | United States |
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP