| Category | Package | Started | Completed | Duration | Options | Log | MalScore |
|---|---|---|---|---|---|---|---|
| FILE | doc | 2026-04-15 20:03:43 | 2026-04-15 20:06:49 | 186 seconds | Show Options | Show Log | 1.0 |
procdump=1
amsidump=1
2025-12-02 01:32:53,687 [root] INFO: Date set to: 20260415T13:03:42, timeout set to: 150
2026-04-15 14:03:42,015 [root] DEBUG: Starting analyzer from: C:\tmpo9x_r7kq
2026-04-15 14:03:42,015 [root] DEBUG: Storing results at: C:\CuaSfk
2026-04-15 14:03:42,015 [root] DEBUG: Pipe server name: \\.\PIPE\LSzMPX
2026-04-15 14:03:42,015 [root] DEBUG: Python path: C:\olddocs
2026-04-15 14:03:42,015 [root] INFO: Analysis package "doc" has been specified
2026-04-15 14:03:42,015 [root] DEBUG: Importing analysis package "doc"...
2026-04-15 14:03:42,031 [root] DEBUG: Initializing analysis package "doc"...
2026-04-15 14:03:42,031 [root] INFO: Analyzer: Package modules.packages.doc does not specify a DLL option
2026-04-15 14:03:42,031 [root] INFO: Analyzer: Package modules.packages.doc does not specify a DLL_64 option
2026-04-15 14:03:42,031 [root] INFO: Analyzer: Package modules.packages.doc does not specify a loader option
2026-04-15 14:03:42,031 [root] INFO: Analyzer: Package modules.packages.doc does not specify a loader_64 option
2026-04-15 14:03:42,062 [root] DEBUG: Importing auxiliary module "modules.auxiliary.browser"...
2026-04-15 14:03:42,062 [root] DEBUG: Importing auxiliary module "modules.auxiliary.curtain"...
2026-04-15 14:03:42,062 [root] DEBUG: Importing auxiliary module "modules.auxiliary.default_apps"...
2026-04-15 14:03:42,062 [root] DEBUG: Importing auxiliary module "modules.auxiliary.digisig"...
2026-04-15 14:03:42,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.disguise"...
2026-04-15 14:03:42,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.evtx"...
2026-04-15 14:03:42,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.fiddler"...
2026-04-15 14:03:42,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.human"...
2026-04-15 14:03:42,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.screenshots"...
2026-04-15 14:03:42,125 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops'
2026-04-15 14:03:42,234 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab'
2026-04-15 14:03:42,234 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw'
2026-04-15 14:03:42,234 [root] DEBUG: Importing auxiliary module "modules.auxiliary.sysmon"...
2026-04-15 14:03:42,249 [root] DEBUG: Importing auxiliary module "modules.auxiliary.tlsdump"...
2026-04-15 14:03:42,249 [root] DEBUG: Importing auxiliary module "modules.auxiliary.usage"...
2026-04-15 14:03:42,249 [root] DEBUG: Initializing auxiliary module "Browser"...
2026-04-15 14:03:42,249 [root] DEBUG: Started auxiliary module Browser
2026-04-15 14:03:42,249 [root] DEBUG: Initializing auxiliary module "Curtain"...
2026-04-15 14:03:42,249 [root] DEBUG: Started auxiliary module Curtain
2026-04-15 14:03:42,249 [root] DEBUG: Initializing auxiliary module "DefaultApps"...
2026-04-15 14:03:42,296 [modules.auxiliary.default_apps] DEBUG: Getting current user SID using WinAPI
2026-04-15 14:03:42,296 [root] DEBUG: Started auxiliary module DefaultApps
2026-04-15 14:03:42,296 [root] DEBUG: Initializing auxiliary module "DigiSig"...
2026-04-15 14:03:42,296 [modules.auxiliary.digisig] INFO: signtool.exe was not found in bin/
2026-04-15 14:03:42,296 [modules.auxiliary.digisig] INFO: doc
2026-04-15 14:03:42,296 [modules.auxiliary.digisig] INFO: Skipping authenticode validation, unsupported analyzer package
2026-04-15 14:03:42,296 [root] DEBUG: Started auxiliary module DigiSig
2026-04-15 14:03:42,296 [root] DEBUG: Initializing auxiliary module "Disguise"...
2026-04-15 14:03:42,593 [modules.auxiliary.disguise] INFO: Setting NoRecentDocsHistory
2026-04-15 14:03:42,593 [root] WARNING: Cannot execute auxiliary module Disguise: [WinError 2] The system cannot find the file specified
2026-04-15 14:03:42,593 [root] DEBUG: Initializing auxiliary module "Evtx"...
2026-04-15 14:03:42,593 [modules.auxiliary.evtx] INFO: Loading audit policy C:\tmpo9x_r7kq\bin\auditpol.csv
2026-04-15 14:03:42,765 [modules.auxiliary.evtx] INFO: Wiping logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:03:43,531 [root] DEBUG: Started auxiliary module Evtx
2026-04-15 14:03:43,531 [root] DEBUG: Initializing auxiliary module "Fiddler"...
2026-04-15 14:03:43,531 [modules.auxiliary.fiddler] INFO: fiddler package: doc
2026-04-15 14:03:43,546 [root] DEBUG: Started auxiliary module Fiddler
2026-04-15 14:03:43,546 [root] DEBUG: Initializing auxiliary module "Human"...
2026-04-15 14:03:43,546 [root] DEBUG: Started auxiliary module Human
2026-04-15 14:03:43,546 [root] DEBUG: Initializing auxiliary module "Screenshots"...
2026-04-15 14:03:43,546 [root] DEBUG: Started auxiliary module Screenshots
2026-04-15 14:03:43,546 [root] DEBUG: Initializing auxiliary module "Sysmon"...
2026-04-15 14:03:43,546 [modules.auxiliary.sysmon] INFO: Seeing if we need to update sysmon config
2026-04-15 14:03:43,546 [root] DEBUG: Started auxiliary module Sysmon
2026-04-15 14:03:43,546 [root] DEBUG: Initializing auxiliary module "TLSDumpMasterSecrets"...
2026-04-15 14:03:43,546 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 560
2026-04-15 14:03:43,546 [lib.api.process] INFO: Monitor config for process 560: C:\tmpo9x_r7kq\dll\560.ini
2026-04-15 14:03:43,562 [modules.auxiliary.sysmon] INFO: Found Sysmon Executable
2026-04-15 14:03:43,562 [modules.auxiliary.sysmon] INFO: Found Sysmon config
2026-04-15 14:03:43,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2026-04-15 14:03:43,562 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor
2026-04-15 14:03:43,562 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor
2026-04-15 14:03:43,562 [lib.api.process] INFO: Option 'office' with value '1' sent to monitor
2026-04-15 14:03:43,562 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor
2026-04-15 14:03:43,562 [lib.api.process] INFO: Option 'no-iat' with value '1' sent to monitor
2026-04-15 14:03:43,562 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor
2026-04-15 14:03:43,562 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpo9x_r7kq\dll\LwlclwI.dll, loader C:\tmpo9x_r7kq\bin\NvvOKpWJ.exe
2026-04-15 14:03:43,578 [root] DEBUG: Loader: IAT patching disabled.
2026-04-15 14:03:43,578 [root] DEBUG: Loader: Injecting process 560 with C:\tmpo9x_r7kq\dll\LwlclwI.dll.
2026-04-15 14:03:43,625 [root] DEBUG: 560: Python path set to 'C:\olddocs'.
2026-04-15 14:03:43,625 [root] DEBUG: 560: Disabling sleep skipping.
2026-04-15 14:03:43,625 [root] DEBUG: 560: Process dumps enabled.
2026-04-15 14:03:43,640 [root] DEBUG: 560: AMSI dumping enabled.
2026-04-15 14:03:43,640 [root] DEBUG: 560: Monitor config - unrecognised key office.
2026-04-15 14:03:43,640 [root] DEBUG: 560: In-monitor YARA scans disabled.
2026-04-15 14:03:43,640 [root] DEBUG: 560: TLS secret dump mode enabled.
2026-04-15 14:03:43,640 [root] DEBUG: 560: Monitor initialised: 64-bit capemon loaded in process 560 at 0x000007FEF59B0000, thread 2204, image base 0x00000000FF9D0000, stack from 0x0000000001F23000-0x0000000001F30000
2026-04-15 14:03:43,656 [root] DEBUG: 560: Hooked 5 out of 5 functions
2026-04-15 14:03:43,656 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread.
2026-04-15 14:03:43,656 [root] DEBUG: Successfully injected DLL C:\tmpo9x_r7kq\dll\LwlclwI.dll.
2026-04-15 14:03:43,671 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 560
2026-04-15 14:03:43,671 [root] DEBUG: Started auxiliary module TLSDumpMasterSecrets
2026-04-15 14:03:43,671 [root] DEBUG: Initializing auxiliary module "Usage"...
2026-04-15 14:03:43,671 [root] DEBUG: Started auxiliary module Usage
2026-04-15 14:03:45,703 [modules.auxiliary.sysmon] INFO: Clearing existing sysmon logs
2026-04-15 14:03:46,453 [root] INFO: Restarting WMI Service
2026-04-15 14:03:55,515 [lib.api.process] INFO: Successfully executed process from path "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" with arguments ""C:\Users\pgabriel\AppData\Local\Temp\1234_as_password_ha.docx" /q" with pid 1364
2026-04-15 14:03:55,515 [lib.api.process] INFO: Monitor config for process 1364: C:\tmpo9x_r7kq\dll\1364.ini
2026-04-15 14:03:55,531 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2026-04-15 14:03:55,531 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor
2026-04-15 14:03:55,531 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor
2026-04-15 14:03:55,531 [lib.api.process] INFO: Option 'office' with value '1' sent to monitor
2026-04-15 14:03:55,531 [lib.api.process] INFO: Option 'yarascan' with value '0' sent to monitor
2026-04-15 14:03:55,531 [lib.api.process] INFO: Option 'no-iat' with value '1' sent to monitor
2026-04-15 14:03:55,531 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpo9x_r7kq\dll\Kwqpix.dll, loader C:\tmpo9x_r7kq\bin\YRweBwk.exe
2026-04-15 14:03:55,546 [root] DEBUG: Loader: IAT patching disabled.
2026-04-15 14:03:55,562 [root] DEBUG: Loader: Injecting process 1364 (thread 2448) with C:\tmpo9x_r7kq\dll\Kwqpix.dll.
2026-04-15 14:03:55,562 [root] DEBUG: InjectDllViaQueuedAPC: APC injection queued.
2026-04-15 14:03:55,562 [root] DEBUG: Successfully injected DLL C:\tmpo9x_r7kq\dll\Kwqpix.dll.
2026-04-15 14:03:55,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1364
2026-04-15 14:03:55,703 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:03:57,562 [lib.api.process] INFO: Successfully resumed process with pid 1364
2026-04-15 14:03:57,578 [root] DEBUG: 1364: Python path set to 'C:\olddocs'.
2026-04-15 14:03:57,578 [root] DEBUG: 1364: Disabling sleep skipping.
2026-04-15 14:03:57,593 [root] DEBUG: 1364: Process dumps enabled.
2026-04-15 14:03:57,593 [root] DEBUG: 1364: AMSI dumping enabled.
2026-04-15 14:03:57,593 [root] DEBUG: 1364: Monitor config - unrecognised key office.
2026-04-15 14:03:57,593 [root] DEBUG: 1364: In-monitor YARA scans disabled.
2026-04-15 14:03:57,593 [root] DEBUG: 1364: Dropped file limit defaulting to 100.
2026-04-15 14:03:57,593 [root] DEBUG: 1364: Microsoft Office settings enabled.
2026-04-15 14:03:57,593 [root] DEBUG: 1364: Monitor initialised: 32-bit capemon loaded in process 1364 at 0x73c70000, thread 2448, image base 0x12c0000, stack from 0x353000-0x360000
2026-04-15 14:03:57,593 [root] DEBUG: 1364: Commandline: "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" "C:\Users\pgabriel\AppData\Local\Temp\1234_as_password_ha.docx" /q
2026-04-15 14:03:57,625 [root] DEBUG: 1364: Hooked 456 out of 456 functions
2026-04-15 14:03:57,640 [root] INFO: Loaded monitor into process with pid 1364
2026-04-15 14:03:57,640 [root] DEBUG: 1364: DLL loaded at 0x6FC30000: C:\Program Files (x86)\Microsoft Office\Office15\wwlib (0x14bc000 bytes).
2026-04-15 14:03:57,640 [root] DEBUG: 1364: DLL loaded at 0x73AE0000: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus (0x190000 bytes).
2026-04-15 14:03:57,656 [root] DEBUG: 1364: DLL loaded at 0x6EE80000: C:\Program Files (x86)\Microsoft Office\Office15\oart (0xda8000 bytes).
2026-04-15 14:03:57,656 [root] DEBUG: 1364: DLL loaded at 0x74360000: C:\Windows\system32\MSVCP100 (0x69000 bytes).
2026-04-15 14:03:57,656 [root] DEBUG: 1364: DLL loaded at 0x72260000: C:\Windows\system32\d2d1 (0x347000 bytes).
2026-04-15 14:03:57,671 [root] DEBUG: 1364: DLL loaded at 0x6D590000: C:\Program Files (x86)\Common Files\Microsoft Shared\Office15\mso (0x18e4000 bytes).
2026-04-15 14:03:57,671 [root] DEBUG: 1364: DLL loaded at 0x72FE0000: C:\Windows\system32\MSIMG32 (0x5000 bytes).
2026-04-15 14:03:57,687 [root] DEBUG: 1364: DLL loaded at 0x731D0000: C:\Windows\system32\uxtheme (0x80000 bytes).
2026-04-15 14:03:57,687 [root] DEBUG: 1364: DLL loaded at 0x72FF0000: C:\Windows\system32\WTSAPI32 (0xd000 bytes).
2026-04-15 14:03:57,687 [root] DEBUG: 1364: DLL loaded at 0x74420000: C:\Windows\system32\WINSTA (0x29000 bytes).
2026-04-15 14:03:57,703 [root] DEBUG: 1364: DLL loaded at 0x741D0000: C:\Windows\system32\dxgi (0x4c000 bytes).
2026-04-15 14:03:57,703 [root] DEBUG: 1364: DLL loaded at 0x73100000: C:\Windows\system32\VERSION (0x9000 bytes).
2026-04-15 14:03:57,703 [root] DEBUG: 1364: DLL loaded at 0x744A0000: C:\Windows\system32\dwmapi (0x13000 bytes).
2026-04-15 14:03:57,703 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\setupapi (0x19d000 bytes).
2026-04-15 14:03:57,703 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:57,703 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:57,718 [root] DEBUG: 1364: DLL loaded at 0x76E60000: C:\Windows\syswow64\WINTRUST (0x2f000 bytes).
2026-04-15 14:03:57,734 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\setupapi (0x19d000 bytes).
2026-04-15 14:03:57,734 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:57,734 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:57,750 [root] DEBUG: 1364: DLL loaded at 0x72020000: C:\Windows\system32\msi (0x240000 bytes).
2026-04-15 14:03:57,859 [root] DEBUG: 1364: DLL loaded at 0x71A00000: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE15\MSPTLS (0x116000 bytes).
2026-04-15 14:03:57,875 [root] DEBUG: 1364: DLL loaded at 0x75B50000: C:\Windows\syswow64\SHELL32 (0xc4a000 bytes).
2026-04-15 14:03:57,875 [root] DEBUG: 1364: DLL loaded at 0x76FC0000: C:\Windows\syswow64\profapi (0xb000 bytes).
2026-04-15 14:03:57,890 [root] DEBUG: 1364: DLL loaded at 0x73260000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\Comctl32 (0x19e000 bytes).
2026-04-15 14:03:57,953 [root] DEBUG: 1364: DLL loaded at 0x74330000: C:\Windows\system32\d3d10_1 (0x2c000 bytes).
2026-04-15 14:03:57,968 [root] DEBUG: 1364: DLL loaded at 0x739D0000: C:\Windows\system32\d3d10_1core (0x41000 bytes).
2026-04-15 14:03:57,968 [root] DEBUG: 1364: DLL loaded at 0x71500000: C:\Windows\system32\d3d11 (0x175000 bytes).
2026-04-15 14:03:57,968 [root] DEBUG: 1364: DLL loaded at 0x71310000: C:\Windows\system32\D3D10Warp (0x1e9000 bytes).
2026-04-15 14:03:57,968 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\setupapi (0x19d000 bytes).
2026-04-15 14:03:57,984 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:57,984 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:58,000 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\setupapi (0x19d000 bytes).
2026-04-15 14:03:58,000 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:58,000 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:58,015 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\setupapi (0x19d000 bytes).
2026-04-15 14:03:58,015 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:58,015 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:58,031 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\setupapi (0x19d000 bytes).
2026-04-15 14:03:58,046 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:58,062 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:58,156 [root] DEBUG: 1364: DLL loaded at 0x711E0000: C:\Windows\system32\WindowsCodecs (0x130000 bytes).
2026-04-15 14:03:58,156 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\setupapi (0x19d000 bytes).
2026-04-15 14:03:58,156 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:58,156 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:58,171 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\setupapi (0x19d000 bytes).
2026-04-15 14:03:58,171 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:58,171 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:58,187 [root] DEBUG: 1364: DLL loaded at 0x6D450000: C:\Windows\system32\DWrite (0x135000 bytes).
2026-04-15 14:03:58,218 [root] DEBUG: 1364: DLL loaded at 0x71190000: C:\Windows\system32\mscoree (0x4a000 bytes).
2026-04-15 14:03:58,218 [root] DEBUG: 1364: DLL loaded at 0x71100000: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei (0x8d000 bytes).
2026-04-15 14:03:58,234 [root] DEBUG: 1364: DLL loaded at 0x6D390000: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE15\adal (0xb5000 bytes).
2026-04-15 14:03:58,234 [root] DEBUG: 1364: DLL loaded at 0x6D330000: C:\Windows\system32\WINHTTP (0x58000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x6D2E0000: C:\Windows\system32\webio (0x50000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x76C70000: C:\Windows\syswow64\WININET (0x1e4000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x76800000: C:\Windows\syswow64\api-ms-win-downlevel-user32-l1-1-0 (0x4000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x767F0000: C:\Windows\syswow64\api-ms-win-downlevel-shlwapi-l1-1-0 (0x4000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x750A0000: C:\Windows\syswow64\api-ms-win-downlevel-version-l1-1-0 (0x4000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x768E0000: C:\Windows\syswow64\api-ms-win-downlevel-normaliz-l1-1-0 (0x3000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x75B20000: C:\Windows\syswow64\normaliz (0x3000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x75150000: C:\Windows\syswow64\iertutil (0x232000 bytes).
2026-04-15 14:03:58,249 [root] DEBUG: 1364: DLL loaded at 0x75B30000: C:\Windows\syswow64\api-ms-win-downlevel-advapi32-l1-1-0 (0x5000 bytes).
2026-04-15 14:03:58,265 [root] DEBUG: 1364: DLL loaded at 0x75A70000: C:\Windows\syswow64\USERENV (0x17000 bytes).
2026-04-15 14:03:58,265 [root] DEBUG: 1364: DLL loaded at 0x747A0000: C:\Windows\system32\Secur32 (0x8000 bytes).
2026-04-15 14:03:58,343 [root] DEBUG: 1364: DLL loaded at 0x750B0000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes).
2026-04-15 14:03:58,343 [root] DEBUG: 1364: DLL loaded at 0x6D280000: C:\Windows\System32\netprofm (0x5a000 bytes).
2026-04-15 14:03:58,343 [root] DEBUG: 1364: DLL loaded at 0x74320000: C:\Windows\System32\nlaapi (0x10000 bytes).
2026-04-15 14:03:58,359 [root] DEBUG: 1364: DLL loaded at 0x73090000: C:\Windows\system32\CRYPTSP (0x17000 bytes).
2026-04-15 14:03:58,359 [root] DEBUG: 1364: DLL loaded at 0x73050000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2026-04-15 14:03:58,359 [root] DEBUG: 1364: DLL loaded at 0x738B0000: C:\Windows\system32\RpcRtRemote (0xe000 bytes).
2026-04-15 14:03:58,375 [root] DEBUG: 1364: DLL loaded at 0x74250000: C:\Windows\System32\npmproxy (0x8000 bytes).
2026-04-15 14:03:58,531 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:03:58,640 [root] DEBUG: 1364: DLL loaded at 0x6D0F0000: C:\Program Files (x86)\Common Files\Microsoft Shared\Office15\riched20 (0x18e000 bytes).
2026-04-15 14:03:58,656 [root] DEBUG: 1364: DLL loaded at 0x683D0000: C:\Program Files (x86)\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppc (0x2d000 bytes).
2026-04-15 14:03:58,734 [root] DEBUG: 1364: DLL loaded at 0x738E0000: C:\Windows\system32\IPHLPAPI (0x1c000 bytes).
2026-04-15 14:03:58,734 [root] DEBUG: 1364: DLL loaded at 0x738D0000: C:\Windows\system32\WINNSI (0x7000 bytes).
2026-04-15 14:03:58,734 [root] DEBUG: 1364: DLL loaded at 0x74240000: C:\Windows\system32\dhcpcsvc6 (0xd000 bytes).
2026-04-15 14:03:58,734 [root] DEBUG: 1364: DLL loaded at 0x741B0000: C:\Windows\system32\dhcpcsvc (0x12000 bytes).
2026-04-15 14:03:58,781 [lib.common.results] INFO: File 1776287038718750000.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:03:58,796 [lib.common.results] INFO: File 1776287038703125000.Application.evtx.gz size is 6704, Max size: 100000000
2026-04-15 14:03:58,796 [lib.common.results] INFO: File 1776287038718750000.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:03:58,828 [root] DEBUG: 1364: DLL loaded at 0x74230000: C:\Windows\system32\credssp (0x8000 bytes).
2026-04-15 14:03:58,843 [root] DEBUG: 1364: DLL loaded at 0x73870000: C:\Windows\system32\mswsock (0x3c000 bytes).
2026-04-15 14:03:58,843 [root] DEBUG: 1364: DLL loaded at 0x682C0000: C:\Windows\system32\WINSPOOL.DRV (0x51000 bytes).
2026-04-15 14:03:58,843 [root] DEBUG: 1364: DLL loaded at 0x73860000: C:\Windows\System32\wshtcpip (0x5000 bytes).
2026-04-15 14:03:58,843 [root] DEBUG: 1364: DLL loaded at 0x73850000: C:\Windows\System32\wship6 (0x6000 bytes).
2026-04-15 14:03:58,859 [root] DEBUG: 1364: DLL loaded at 0x68270000: C:\Windows\system32\DNSAPI (0x44000 bytes).
2026-04-15 14:03:58,859 [lib.common.results] INFO: File 1776287038796875000.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:03:58,859 [lib.common.results] INFO: File 1776287038796875000.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:03:58,859 [lib.common.results] INFO: File 1776287038781250000.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:03:58,890 [lib.common.results] INFO: File 1776287038796875000.Security.evtx.gz size is 15544, Max size: 100000000
2026-04-15 14:03:58,906 [lib.common.results] INFO: File 1776287038859375000.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:03:58,921 [lib.common.results] INFO: File 1776287038859375000.System.evtx.gz size is 9000, Max size: 100000000
2026-04-15 14:03:58,921 [root] DEBUG: 1364: DLL loaded at 0x68380000: C:\Windows\SysWOW64\schannel (0x41000 bytes).
2026-04-15 14:03:58,937 [root] DEBUG: 1364: DLL loaded at 0x758A0000: C:\Windows\syswow64\SETUPAPI (0x19d000 bytes).
2026-04-15 14:03:58,953 [root] DEBUG: 1364: DLL loaded at 0x75600000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2026-04-15 14:03:58,953 [root] DEBUG: 1364: DLL loaded at 0x76E90000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2026-04-15 14:03:58,953 [root] DEBUG: 560: DLL loaded at 0x000007FEF1DB0000: C:\Windows\system32\dssenh (0x32000 bytes).
2026-04-15 14:03:58,953 [root] DEBUG: 1364: DLL loaded at 0x68170000: C:\Windows\system32\propsys (0xf5000 bytes).
2026-04-15 14:03:58,953 [root] DEBUG: 1364: DLL loaded at 0x73120000: C:\Windows\system32\ntmarta (0x21000 bytes).
2026-04-15 14:03:58,953 [root] DEBUG: 1364: DLL loaded at 0x76A30000: C:\Windows\syswow64\WLDAP32 (0x45000 bytes).
2026-04-15 14:03:59,015 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Roaming\Microsoft\Templates\Normal.dotm
2026-04-15 14:03:59,031 [root] DEBUG: 1364: DLL loaded at 0x68010000: C:\Windows\System32\msxml6 (0x158000 bytes).
2026-04-15 14:03:59,140 [root] DEBUG: 560: DLL loaded at 0x000007FEFA740000: C:\Windows\system32\keyiso (0xb000 bytes).
2026-04-15 14:03:59,203 [root] DEBUG: 1364: DLL loaded at 0x68350000: C:\Windows\system32\XmlLite (0x2f000 bytes).
2026-04-15 14:03:59,312 [root] DEBUG: 1364: DLL loaded at 0x76A80000: C:\Windows\SysWOW64\urlmon (0x14a000 bytes).
2026-04-15 14:03:59,312 [root] DEBUG: 1364: DLL loaded at 0x75630000: C:\Windows\syswow64\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes).
2026-04-15 14:03:59,328 [root] DEBUG: 1364: DLL loaded at 0x739C0000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes).
2026-04-15 14:03:59,343 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Local\Temp\~$34_as_password_ha.docx
2026-04-15 14:03:59,500 [root] DEBUG: 1364: DLL loaded at 0x67FB0000: C:\Windows\system32\SXS (0x5f000 bytes).
2026-04-15 14:03:59,812 [root] DEBUG: 560: TLS 1.2 secrets logged to: C:\CuaSfk\tlsdump\tlsdump.log
2026-04-15 14:03:59,890 [root] DEBUG: 560: DLL loaded at 0x000007FEFA270000: C:\Windows\system32\cryptnet (0x27000 bytes).
2026-04-15 14:03:59,890 [root] DEBUG: 560: DLL loaded at 0x000007FEFD7D0000: C:\Windows\system32\WLDAP32 (0x52000 bytes).
2026-04-15 14:03:59,953 [root] DEBUG: 1364: DLL loaded at 0x67F70000: C:\Windows\system32\ncrypt (0x39000 bytes).
2026-04-15 14:03:59,968 [root] DEBUG: 1364: DLL loaded at 0x67F30000: C:\Windows\SysWOW64\bcryptprimitives (0x3d000 bytes).
2026-04-15 14:04:00,203 [root] DEBUG: 1364: DLL loaded at 0x68330000: C:\Windows\system32\GPAPI (0x16000 bytes).
2026-04-15 14:04:00,281 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\office15client.microsoft.com\config15--lcid=1033&syslcid=1033&uilcid=1033&build=15.0.4569&crev=10
2026-04-15 14:04:00,296 [root] DEBUG: 1364: DLL loaded at 0x67E60000: C:\Windows\system32\webservices (0xc2000 bytes).
2026-04-15 14:04:00,328 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma00546271.png0 size is 119666, Max size: 100000000
2026-04-15 14:04:00,343 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma02786999.png0 size is 8127, Max size: 100000000
2026-04-15 14:04:00,359 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900771.png0 size is 10213, Max size: 100000000
2026-04-15 14:04:00,375 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16382936.png0 size is 37573, Max size: 100000000
2026-04-15 14:04:00,406 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16382941.png0 size is 96333, Max size: 100000000
2026-04-15 14:04:00,437 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma02835058.png0 size is 186365, Max size: 100000000
2026-04-15 14:04:00,484 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma03978815.png0 size is 711398, Max size: 100000000
2026-04-15 14:04:00,515 [root] DEBUG: 1364: DLL loaded at 0x67E40000: C:\Windows\system32\cryptnet (0x1d000 bytes).
2026-04-15 14:04:00,515 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt78018332.png0 size is 26105, Max size: 100000000
2026-04-15 14:04:00,531 [root] DEBUG: 1364: DLL loaded at 0x739B0000: C:\Windows\system32\SensApi (0x6000 bytes).
2026-04-15 14:04:00,546 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16392850.png0 size is 280509, Max size: 100000000
2026-04-15 14:04:00,562 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt45325165.png0 size is 9149, Max size: 100000000
2026-04-15 14:04:00,578 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma03982351.png0 size is 12860, Max size: 100000000
2026-04-15 14:04:00,609 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16392877.png0 size is 86215, Max size: 100000000
2026-04-15 14:04:00,625 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16402488.png0 size is 114584, Max size: 100000000
2026-04-15 14:04:00,640 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma16412178.png0 size is 283253, Max size: 100000000
2026-04-15 14:04:00,671 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma56348247.png0 size is 55049, Max size: 100000000
2026-04-15 14:04:00,687 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900720.png0 size is 22877, Max size: 100000000
2026-04-15 14:04:00,718 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-ma88924273.png0 size is 103770, Max size: 100000000
2026-04-15 14:04:00,734 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02836342.png0 size is 26220, Max size: 100000000
2026-04-15 14:04:00,750 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02892315.png0 size is 20776, Max size: 100000000
2026-04-15 14:04:00,765 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt10002124.png0 size is 11329, Max size: 100000000
2026-04-15 14:04:00,796 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287040.796875.sysmon.evtx.gz to host
2026-04-15 14:04:00,796 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 9665, Max size: 100000000
2026-04-15 14:04:00,796 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt78500733.png0 size is 10169, Max size: 100000000
2026-04-15 14:04:00,828 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02911863.png0 size is 41743, Max size: 100000000
2026-04-15 14:04:00,843 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900688.png0 size is 8561, Max size: 100000000
2026-04-15 14:04:00,875 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900722.png0 size is 19188, Max size: 100000000
2026-04-15 14:04:00,890 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02900743.png0 size is 33070, Max size: 100000000
2026-04-15 14:04:00,906 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt02923944.png0 size is 4886, Max size: 100000000
2026-04-15 14:04:00,937 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt10002117.png0 size is 4962, Max size: 100000000
2026-04-15 14:04:00,968 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt16402400.png0 size is 33856, Max size: 100000000
2026-04-15 14:04:01,000 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt22746018.png0 size is 18469, Max size: 100000000
2026-04-15 14:04:01,015 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt45088960.png0 size is 40992, Max size: 100000000
2026-04-15 14:04:01,031 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\binaries.templates.cdn.office.net\support-templates-en-us-mt45420242.png0 size is 13339, Max size: 100000000
2026-04-15 14:04:03,489 [root] DEBUG: 1364: DLL loaded at 0x67E10000: C:\Windows\system32\POWRPROF (0x25000 bytes).
2026-04-15 14:04:06,646 [lib.common.results] INFO: File c:\olddocs\1776287041656.saz size is 18684, Max size: 100000000
2026-04-15 14:04:06,662 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:04:13,956 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:04:14,230 [lib.common.results] INFO: File 1776287054175781200.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:04:14,238 [lib.common.results] INFO: File 1776287054175781200.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:04:14,238 [lib.common.results] INFO: File 1776287054175781200.Application.evtx.gz size is 6631, Max size: 100000000
2026-04-15 14:04:14,246 [lib.common.results] INFO: File 1776287054175781200.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:04:14,269 [lib.common.results] INFO: File 1776287054230468700.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:04:14,285 [lib.common.results] INFO: File 1776287054238281200.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:04:14,292 [lib.common.results] INFO: File 1776287054230468700.Security.evtx.gz size is 8049, Max size: 100000000
2026-04-15 14:04:14,292 [lib.common.results] INFO: File 1776287054238281200.System.evtx.gz size is 8744, Max size: 100000000
2026-04-15 14:04:14,308 [lib.common.results] INFO: File 1776287054269531200.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:04:15,808 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:04:20,945 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287060.9453125.sysmon.evtx.gz to host
2026-04-15 14:04:20,945 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 74147, Max size: 100000000
2026-04-15 14:04:26,759 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:04:29,354 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:04:29,604 [lib.common.results] INFO: File 1776287069557617100.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:04:29,620 [lib.common.results] INFO: File 1776287069557617100.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:04:29,620 [lib.common.results] INFO: File 1776287069557617100.Application.evtx.gz size is 6631, Max size: 100000000
2026-04-15 14:04:29,635 [lib.common.results] INFO: File 1776287069557617100.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:04:29,666 [lib.common.results] INFO: File 1776287069604492100.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:04:29,682 [lib.common.results] INFO: File 1776287069620117100.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:04:29,698 [lib.common.results] INFO: File 1776287069604492100.Security.evtx.gz size is 7792, Max size: 100000000
2026-04-15 14:04:29,713 [lib.common.results] INFO: File 1776287069620117100.System.evtx.gz size is 8429, Max size: 100000000
2026-04-15 14:04:29,729 [lib.common.results] INFO: File 1776287069666992100.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:04:35,966 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:04:41,049 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287081.0498044.sysmon.evtx.gz to host
2026-04-15 14:04:41,049 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5566, Max size: 100000000
2026-04-15 14:04:44,761 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:04:45,011 [lib.common.results] INFO: File 1776287084964843700.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:04:45,035 [lib.common.results] INFO: File 1776287084964843700.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:04:45,035 [lib.common.results] INFO: File 1776287084964843700.Application.evtx.gz size is 6631, Max size: 100000000
2026-04-15 14:04:45,042 [lib.common.results] INFO: File 1776287084964843700.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:04:45,082 [lib.common.results] INFO: File 1776287085035156200.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:04:45,089 [lib.common.results] INFO: File 1776287085019531200.Security.evtx.gz size is 7742, Max size: 100000000
2026-04-15 14:04:45,089 [lib.common.results] INFO: File 1776287085011718700.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:04:45,089 [lib.common.results] INFO: File 1776287085035156200.System.evtx.gz size is 8420, Max size: 100000000
2026-04-15 14:04:45,121 [lib.common.results] INFO: File 1776287085074218700.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:04:46,857 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:04:56,065 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:05:00,169 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:05:00,428 [lib.common.results] INFO: File 1776287100373046800.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:05:00,444 [lib.common.results] INFO: File 1776287100373046800.Application.evtx.gz size is 6839, Max size: 100000000
2026-04-15 14:05:00,444 [lib.common.results] INFO: File 1776287100373046800.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:05:00,459 [lib.common.results] INFO: File 1776287100373046800.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:05:00,475 [lib.common.results] INFO: File 1776287100428710900.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:05:00,475 [lib.common.results] INFO: File 1776287100428710900.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:05:00,483 [lib.common.results] INFO: File 1776287100428710900.Security.evtx.gz size is 7791, Max size: 100000000
2026-04-15 14:05:00,499 [lib.common.results] INFO: File 1776287100444335900.System.evtx.gz size is 8433, Max size: 100000000
2026-04-15 14:05:00,514 [lib.common.results] INFO: File 1776287100467773400.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:05:01,139 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287101.1396484.sysmon.evtx.gz to host
2026-04-15 14:05:01,139 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5614, Max size: 100000000
2026-04-15 14:05:06,955 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:05:15,567 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:05:15,801 [lib.common.results] INFO: File 1776287115754882800.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:05:15,817 [lib.common.results] INFO: File 1776287115754882800.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:05:15,817 [lib.common.results] INFO: File 1776287115754882800.Application.evtx.gz size is 6772, Max size: 100000000
2026-04-15 14:05:15,833 [lib.common.results] INFO: File 1776287115754882800.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:05:15,848 [lib.common.results] INFO: File 1776287115817382800.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:05:15,848 [lib.common.results] INFO: File 1776287115801757800.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:05:15,864 [lib.common.results] INFO: File 1776287115801757800.Security.evtx.gz size is 7802, Max size: 100000000
2026-04-15 14:05:15,879 [lib.common.results] INFO: File 1776287115817382800.System.evtx.gz size is 8433, Max size: 100000000
2026-04-15 14:05:15,895 [lib.common.results] INFO: File 1776287115848632800.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:05:16,154 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:05:21,250 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287121.2509766.sysmon.evtx.gz to host
2026-04-15 14:05:21,250 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5620, Max size: 100000000
2026-04-15 14:05:27,067 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:05:30,928 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:05:31,170 [lib.common.results] INFO: File 1776287131116210900.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:05:31,178 [lib.common.results] INFO: File 1776287131116210900.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:05:31,178 [lib.common.results] INFO: File 1776287131116210900.Application.evtx.gz size is 6772, Max size: 100000000
2026-04-15 14:05:31,186 [lib.common.results] INFO: File 1776287131116210900.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:05:31,225 [lib.common.results] INFO: File 1776287131178710900.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:05:31,233 [lib.common.results] INFO: File 1776287131170898400.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:05:31,241 [lib.common.results] INFO: File 1776287131178710900.Security.evtx.gz size is 7716, Max size: 100000000
2026-04-15 14:05:31,256 [lib.common.results] INFO: File 1776287131186523400.System.evtx.gz size is 8439, Max size: 100000000
2026-04-15 14:05:31,280 [lib.common.results] INFO: File 1776287131225585900.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:05:36,283 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:05:41,947 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287141.9472656.sysmon.evtx.gz to host
2026-04-15 14:05:41,947 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5352, Max size: 100000000
2026-04-15 14:05:46,326 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:05:46,583 [lib.common.results] INFO: File 1776287146529296800.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:05:46,607 [lib.common.results] INFO: File 1776287146529296800.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:05:46,607 [lib.common.results] INFO: File 1776287146529296800.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:05:46,623 [lib.common.results] INFO: File 1776287146529296800.Application.evtx.gz size is 6772, Max size: 100000000
2026-04-15 14:05:46,638 [lib.common.results] INFO: File 1776287146583984300.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:05:46,654 [lib.common.results] INFO: File 1776287146591796800.System.evtx.gz size is 8460, Max size: 100000000
2026-04-15 14:05:46,654 [lib.common.results] INFO: File 1776287146583984300.Security.evtx.gz size is 7850, Max size: 100000000
2026-04-15 14:05:46,662 [lib.common.results] INFO: File 1776287146591796800.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:05:46,685 [lib.common.results] INFO: File 1776287146638671800.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:05:47,193 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:05:56,965 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:06:01,727 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:06:01,961 [lib.common.results] INFO: File 1776287161915039000.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:06:01,994 [lib.common.results] INFO: File 1776287161915039000.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:06:02,025 [lib.common.results] INFO: File 1776287161915039000.Application.evtx.gz size is 6772, Max size: 100000000
2026-04-15 14:06:02,048 [lib.common.results] INFO: File 1776287161915039000.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:06:02,056 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287162.0566406.sysmon.evtx.gz to host
2026-04-15 14:06:02,056 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5586, Max size: 100000000
2026-04-15 14:06:02,072 [lib.common.results] INFO: File 1776287161961914000.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:06:02,087 [lib.common.results] INFO: File 1776287161961914000.Security.evtx.gz size is 7781, Max size: 100000000
2026-04-15 14:06:02,103 [lib.common.results] INFO: File 1776287161961914000.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:06:02,119 [lib.common.results] INFO: File 1776287161983398400.System.evtx.gz size is 8441, Max size: 100000000
2026-04-15 14:06:02,134 [lib.common.results] INFO: File 1776287162017578100.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:06:07,286 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:06:17,074 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:06:17,175 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:06:17,386 [lib.common.results] INFO: File 1776287177347656200.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:06:17,402 [lib.common.results] INFO: File 1776287177347656200.Application.evtx.gz size is 6772, Max size: 100000000
2026-04-15 14:06:17,402 [lib.common.results] INFO: File 1776287177347656200.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:06:17,402 [lib.common.results] INFO: File 1776287177347656200.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:06:17,441 [lib.common.results] INFO: File 1776287177386718700.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:06:17,464 [lib.common.results] INFO: File 1776287177394531200.System.evtx.gz size is 8455, Max size: 100000000
2026-04-15 14:06:17,472 [lib.common.results] INFO: File 1776287177394531200.Security.evtx.gz size is 7837, Max size: 100000000
2026-04-15 14:06:17,488 [lib.common.results] INFO: File 1776287177394531200.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:06:17,503 [lib.common.results] INFO: File 1776287177441406200.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:06:22,160 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287182.1601562.sysmon.evtx.gz to host
2026-04-15 14:06:22,175 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 5443, Max size: 100000000
2026-04-15 14:06:27,399 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:06:28,125 [root] INFO: Analysis timeout hit, terminating analysis
2026-04-15 14:06:28,125 [lib.api.process] INFO: Terminate event set for process 1364
2026-04-15 14:06:28,125 [root] DEBUG: 1364: Terminate Event: Attempting to dump process 1364
2026-04-15 14:06:28,125 [root] DEBUG: 1364: VerifyCodeSection: Executable code does not match, 0x64c of 0x154f matching
2026-04-15 14:06:28,125 [root] DEBUG: 1364: DoProcessDump: Code modification detected, dumping Imagebase at 0x012C0000.
2026-04-15 14:06:28,125 [root] DEBUG: 1364: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2026-04-15 14:06:28,125 [root] DEBUG: 1364: DumpProcess: Instantiating PeParser with address: 0x012C0000.
2026-04-15 14:06:28,125 [root] DEBUG: 1364: DumpProcess: Module entry point VA is 0x000010D4.
2026-04-15 14:06:28,157 [lib.common.results] INFO: File C:\CuaSfk\CAPE\1364_57812862115342026 size is 1915904, Max size: 100000000
2026-04-15 14:06:28,172 [root] DEBUG: 1364: DumpProcess: Module image dump success - dump size 0x1d3c00.
2026-04-15 14:06:28,204 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Local\Temp\1234_as_password_ha.docx
2026-04-15 14:06:28,204 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Local\Microsoft\Office\Word15.customUI
2026-04-15 14:06:28,204 [root] INFO: Added new file to list with pid None and path C:\Users\pgabriel\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A0983B66-4D50-4AF9-A8DA-371828EF86C1}.tmp
2026-04-15 14:06:28,204 [lib.api.process] INFO: Termination confirmed for process 1364
2026-04-15 14:06:28,204 [root] INFO: Terminate event set for process 1364
2026-04-15 14:06:28,204 [root] DEBUG: 1364: Terminate Event: monitor shutdown complete for process 1364
2026-04-15 14:06:28,204 [root] INFO: Created shutdown mutex
2026-04-15 14:06:29,206 [root] INFO: Shutting down package
2026-04-15 14:06:29,206 [root] INFO: Stopping auxiliary modules
2026-04-15 14:06:29,206 [modules.auxiliary.curtain] ERROR: Curtain - Error collecting PowerShell events - [WinError 6] The handle is invalid
2026-04-15 14:06:29,206 [lib.common.results] INFO: File C:\curtain.log size is 0, Max size: 100000000
2026-04-15 14:06:29,221 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:06:29,440 [lib.common.results] INFO: File 1776287189393554600.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:06:29,440 [lib.common.results] INFO: File 1776287189393554600.Application.evtx.gz size is 6772, Max size: 100000000
2026-04-15 14:06:29,440 [lib.common.results] INFO: File 1776287189393554600.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:06:29,487 [lib.common.results] INFO: File 1776287189440429600.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:06:29,487 [lib.common.results] INFO: File 1776287189440429600.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:06:29,502 [lib.common.results] INFO: File 1776287189424804600.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:06:29,518 [lib.common.results] INFO: File 1776287189440429600.Security.evtx.gz size is 7953, Max size: 100000000
2026-04-15 14:06:29,534 [lib.common.results] INFO: File 1776287189487304600.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:06:29,534 [lib.common.results] INFO: File 1776287189487304600.System.evtx.gz size is 8439, Max size: 100000000
2026-04-15 14:06:32,551 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell
2026-04-15 14:06:32,787 [lib.common.results] INFO: File 1776287192740234300.InternetExplorer.evtx.gz size is 252, Max size: 100000000
2026-04-15 14:06:32,802 [lib.common.results] INFO: File 1776287192740234300.HardwareEvents.evtx.gz size is 275, Max size: 100000000
2026-04-15 14:06:32,810 [lib.common.results] INFO: File 1776287192740234300.Application.evtx.gz size is 6772, Max size: 100000000
2026-04-15 14:06:32,818 [lib.common.results] INFO: File 1776287192748046800.KeyManagementService.evtx.gz size is 7705, Max size: 100000000
2026-04-15 14:06:32,841 [lib.common.results] INFO: File 1776287192787109300.OAlerts.evtx.gz size is 243, Max size: 100000000
2026-04-15 14:06:32,849 [lib.common.results] INFO: File 1776287192787109300.Security.evtx.gz size is 7839, Max size: 100000000
2026-04-15 14:06:32,857 [lib.common.results] INFO: File 1776287192794921800.Setup.evtx.gz size is 240, Max size: 100000000
2026-04-15 14:06:32,880 [lib.common.results] INFO: File 1776287192802734300.System.evtx.gz size is 8437, Max size: 100000000
2026-04-15 14:06:32,888 [lib.common.results] INFO: File 1776287192841796800.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000
2026-04-15 14:06:34,646 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine
2026-04-15 14:06:34,646 [modules.auxiliary.sysmon] INFO: Doing final sysmon log dump
2026-04-15 14:06:37,194 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs
2026-04-15 14:06:39,709 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1776287199.709961.sysmon.evtx.gz to host
2026-04-15 14:06:39,709 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 11454, Max size: 100000000
2026-04-15 14:06:39,725 [root] INFO: Finishing auxiliary modules
2026-04-15 14:06:39,725 [root] INFO: Shutting down pipe server and dumping dropped files
2026-04-15 14:06:39,725 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Roaming\Microsoft\Templates\Normal.dotm size is 17789, Max size: 100000000
2026-04-15 14:06:39,741 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Temp\~$34_as_password_ha.docx size is 162, Max size: 100000000
2026-04-15 14:06:39,756 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\15.0\WebServiceCache\AllUsers\office15client.microsoft.com\config15--lcid=1033&syslcid=1033&uilcid=1033&build=15.0.4569&crev=10 size is 23349, Max size: 100000000
2026-04-15 14:06:39,756 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Temp\1234_as_password_ha.docx size is 107520, Max size: 100000000
2026-04-15 14:06:39,772 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Office\Word15.customUI size is 3514, Max size: 100000000
2026-04-15 14:06:39,788 [lib.common.results] INFO: File C:\Users\pgabriel\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A0983B66-4D50-4AF9-A8DA-371828EF86C1}.tmp size is 1024, Max size: 100000000
2026-04-15 14:06:39,803 [root] WARNING: Folder at path "C:\CuaSfk\debugger" does not exist, skipping
2026-04-15 14:06:39,803 [root] INFO: Uploading files at path "C:\CuaSfk\tlsdump"
2026-04-15 14:06:39,803 [lib.common.results] INFO: File C:\CuaSfk\tlsdump\tlsdump.log size is 1644, Max size: 100000000
2026-04-15 14:06:39,819 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| win7office2k3flash2800137TWN3H107 | win7office2k3flash2800137TWN3H107 | KVM | 2026-04-15 20:03:43 | 2026-04-15 20:06:49 | internet |
| File Name | 1234_as_password_ha.docx |
|---|---|
| File Size | 107520 bytes |
| File Type | CDFV2 Encrypted |
| MD5 | 31ecd43e3606e0e4fe8ed3dc515e8b69 |
| SHA1 | b5f7856b2a0ca9bce5355bfb6e81e5991183ebf4 |
| SHA256 | af46d415f384795c00d2c08071848cf6c304e116b0db05e85a74ca3aeb783af0 |
| SHA512 | 077abf6135aa0927ec816fab927a5665eb826b3620174749c954c5b3c950889cef2693d86a065aaf036591b9bc29e96275ce54663754a032146a9fc29dc65ec6 |
| SHA3-384 | 5681b7a8afe9ce13719632b96a2cec0a09512fd2fa77d030f5077867fc5ea0e313c2e0a52c993a9359be977ce86776d2 |
| CRC32 | 445C5EE7 |
| TLSH | T1B5B31276C4A4CCDBE0222DB97247D40550236D8ED6813E663FAAB5050AF02B66FEC5FD |
| Ssdeep | 3072:SKoFaUTc1xuMY8n2+IuyiVVZOTAduwe/N/:JoRT8k+ZwAkw4 |
File
|
|
| Name | Response | Post-Analysis Lookup |
|---|---|---|
| roaming.svc.cloud.microsoft [VT] |
CNAME eur.roaming1.live.com.akadns.net
[VT]
A 52.110.10.12 [VT] CNAME roaming-prod-weightedww.trafficmanager.net [VT] A 52.110.10.63 [VT] A 52.110.10.60 [VT] CNAME atm.office.mira.tm.svc.cloud.microsoft [VT] A 52.110.10.13 [VT] CNAME prod.roaming1.live.com.akadns.net [VT] |
52.110.10.53 [VT] |
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP