Advertisement
paladin316

Exes_256e178897594e237119a26ace1dbe59_exe_2019-07-17_11_30.txt

Jul 17th, 2019
1,293
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.08 KB | None | 0 0
  1.  
  2. * MalFamily: "1D650A86"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_256e178897594e237119a26ace1dbe59.exe"
  7. * File Size: 1102336
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "18b5fa5df34dfc0289561e402f9fb43f7943abd66ea10a6b9709935371d8a32f"
  10. * MD5: "256e178897594e237119a26ace1dbe59"
  11. * SHA1: "6da4b8d68747b279f44aececb798b5800dfe0074"
  12. * SHA512: "544384af83ebaeea91dd2a3b50e4018f9d2d3b04cb1c477b1a2d0b9cc379c8ef86c186364abcc40967ad0e00d8e0ccc5d419415749e86309fe70a753db3808cc"
  13. * CRC32: "1D650A86"
  14. * SSDEEP: "24576:WQXkM6SWlbEiNkvQ37GkpcIJjdPdb60ajfk+t1j1/7IQVFco:WNbbSmP5ofrd1/7IQzco"
  15.  
  16. * Process Execution:
  17. "Exes_256e178897594e237119a26ace1dbe59.exe",
  18. "Exes_256e178897594e237119a26ace1dbe59.exe",
  19. "services.exe",
  20. "svchost.exe",
  21. "WmiPrvSE.exe",
  22. "WmiPrvSE.exe",
  23. "lsass.exe",
  24. "taskhost.exe",
  25. "sdclt.exe",
  26. "svchost.exe",
  27. "WerFault.exe",
  28. "wermgr.exe",
  29. "taskhost.exe",
  30. "WMIADAP.exe"
  31.  
  32.  
  33. * Executed Commands:
  34. "\"C:\\Users\\user\\AppData\\Local\\Temp\\Exes_256e178897594e237119a26ace1dbe59.exe\"",
  35. "C:\\Windows\\system32\\wbem\\wmiprvse.exe -secured -Embedding",
  36. "C:\\Windows\\system32\\wbem\\wmiprvse.exe -Embedding",
  37. "C:\\Windows\\system32\\lsass.exe",
  38. "C:\\Windows\\System32\\sdclt.exe /CONFIGNOTIFICATION",
  39. "taskhost.exe $(Arg0)",
  40. "C:\\Windows\\System32\\svchost.exe -k WerSvcGroup",
  41. "C:\\Windows\\system32\\WerFault.exe -u -p 2012 -s 288",
  42. "\"C:\\Windows\\system32\\wermgr.exe\" \"-queuereporting_svc\" \"C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_8478494ab213e04fcdfadcd5962755450ccadd6_cab_06936cb8\""
  43.  
  44.  
  45. * Signatures Detected:
  46.  
  47. "Description": "At least one process apparently crashed during execution",
  48. "Details":
  49.  
  50.  
  51. "Description": "Attempts to connect to a dead IP:Port (1 unique times)",
  52. "Details":
  53.  
  54. "IP": "43.225.55.205:587"
  55.  
  56.  
  57.  
  58.  
  59. "Description": "Creates RWX memory",
  60. "Details":
  61.  
  62.  
  63. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  64. "Details":
  65.  
  66. "get_no_useragent": "HTTP traffic contains a GET request with no user-agent header"
  67.  
  68.  
  69. "suspicious_request": "http://checkip.amazonaws.com/"
  70.  
  71.  
  72.  
  73.  
  74. "Description": "Performs some HTTP requests",
  75. "Details":
  76.  
  77. "url": "http://checkip.amazonaws.com/"
  78.  
  79.  
  80.  
  81.  
  82. "Description": "The binary likely contains encrypted or compressed data.",
  83. "Details":
  84.  
  85. "section": "name: .rsrc, entropy: 7.20, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ, raw_size: 0x00047e00, virtual_size: 0x00047c10"
  86.  
  87.  
  88.  
  89.  
  90. "Description": "Executed a process and injected code into it, probably while unpacking",
  91. "Details":
  92.  
  93. "Injection": "Exes_256e178897594e237119a26ace1dbe59.exe(2360) -> Exes_256e178897594e237119a26ace1dbe59.exe(2592)"
  94.  
  95.  
  96.  
  97.  
  98. "Description": "Sniffs keystrokes",
  99. "Details":
  100.  
  101. "SetWindowsHookExW": "Process: Exes_256e178897594e237119a26ace1dbe59.exe(2592)"
  102.  
  103.  
  104.  
  105.  
  106. "Description": "Attempts to restart the guest VM",
  107. "Details":
  108.  
  109.  
  110. "Description": "A process attempted to delay the analysis task by a long amount of time.",
  111. "Details":
  112.  
  113. "Process": "Exes_256e178897594e237119a26ace1dbe59.exe tried to sleep 2164 seconds, actually delayed analysis time by 0 seconds"
  114.  
  115.  
  116. "Process": "WmiPrvSE.exe tried to sleep 302 seconds, actually delayed analysis time by 0 seconds"
  117.  
  118.  
  119.  
  120.  
  121. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  122. "Details":
  123.  
  124. "Spam": "services.exe (500) called API GetSystemTimeAsFileTime 5927411 times"
  125.  
  126.  
  127.  
  128.  
  129. "Description": "Steals private information from local Internet browsers",
  130. "Details":
  131.  
  132. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
  133.  
  134.  
  135.  
  136.  
  137. "Description": "Retrieves Windows ProductID, probably to fingerprint the sandbox",
  138. "Details":
  139.  
  140.  
  141. "Description": "File has been identified by 22 Antiviruses on VirusTotal as malicious",
  142. "Details":
  143.  
  144. "MicroWorld-eScan": "Gen:Variant.Graftor.622892"
  145.  
  146.  
  147. "FireEye": "Generic.mg.256e178897594e23"
  148.  
  149.  
  150. "CrowdStrike": "win/malicious_confidence_100% (D)"
  151.  
  152.  
  153. "TrendMicro": "TrojanSpy.Win32.LOKI.SMDD.hp"
  154.  
  155.  
  156. "Symantec": "Packed.Generic.516"
  157.  
  158.  
  159. "APEX": "Malicious"
  160.  
  161.  
  162. "Paloalto": "generic.ml"
  163.  
  164.  
  165. "Endgame": "malicious (high confidence)"
  166.  
  167.  
  168. "Invincea": "heuristic"
  169.  
  170.  
  171. "McAfee-GW-Edition": "BehavesLike.Win32.Fareit.th"
  172.  
  173.  
  174. "Trapmine": "malicious.high.ml.score"
  175.  
  176.  
  177. "MAX": "malware (ai score=81)"
  178.  
  179.  
  180. "Microsoft": "Trojan:Win32/Wacatac.B!ml"
  181.  
  182.  
  183. "GData": "Gen:Variant.Graftor.622892"
  184.  
  185.  
  186. "AhnLab-V3": "Win-Trojan/Delphiless.Exp"
  187.  
  188.  
  189. "Acronis": "suspicious"
  190.  
  191.  
  192. "Ad-Aware": "Gen:Variant.Graftor.622892"
  193.  
  194.  
  195. "TrendMicro-HouseCall": "TrojanSpy.Win32.LOKI.SMDD.hp"
  196.  
  197.  
  198. "Rising": "Trojan.Injector!1.AF18 (CLASSIC)"
  199.  
  200.  
  201. "Fortinet": "W32/GenKryptik.DNHM!tr"
  202.  
  203.  
  204. "Cybereason": "malicious.68747b"
  205.  
  206.  
  207. "Qihoo-360": "HEUR/QVM05.1.9505.Malware.Gen"
  208.  
  209.  
  210.  
  211.  
  212. "Description": "Checks the CPU name from registry, possibly for anti-virtualization",
  213. "Details":
  214.  
  215.  
  216. "Description": "Checks the system manufacturer, likely for anti-virtualization",
  217. "Details":
  218.  
  219.  
  220. "Description": "Harvests credentials from local FTP client softwares",
  221. "Details":
  222.  
  223. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\recentservers.xml"
  224.  
  225.  
  226. "file": "C:\\Users\\user\\AppData\\Roaming\\SmartFTP\\Client 2.0\\Favorites\\Quick Connect\\"
  227.  
  228.  
  229. "file": "C:\\Users\\user\\AppData\\Roaming\\SmartFTP\\Client 2.0\\Favorites\\Quick Connect\\*.xml"
  230.  
  231.  
  232. "file": "C:\\Users\\user\\AppData\\Roaming\\Ipswitch\\WS_FTP\\Sites\\ws_ftp.ini"
  233.  
  234.  
  235. "file": "C:\\cftp\\Ftplist.txt"
  236.  
  237.  
  238. "key": "HKEY_CURRENT_USER\\Software\\FTPWare\\COREFTP\\Sites"
  239.  
  240.  
  241.  
  242.  
  243. "Description": "Harvests information related to installed mail clients",
  244. "Details":
  245.  
  246. "file": "C:\\Users\\user\\AppData\\Roaming\\Thunderbird\\profiles.ini"
  247.  
  248.  
  249. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows Messaging Subsystem\\Profiles\\9375CFF0413111d3B88A00104B2A6676"
  250.  
  251.  
  252. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  253.  
  254.  
  255. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\SMTP Password"
  256.  
  257.  
  258. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\Email"
  259.  
  260.  
  261. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\HTTP Password"
  262.  
  263.  
  264. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  265.  
  266.  
  267. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\HTTP Password"
  268.  
  269.  
  270. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  271.  
  272.  
  273. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\POP3 Password"
  274.  
  275.  
  276. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\Email"
  277.  
  278.  
  279. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\SMTP Password"
  280.  
  281.  
  282. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\IMAP Password"
  283.  
  284.  
  285. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001"
  286.  
  287.  
  288. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\IMAP Password"
  289.  
  290.  
  291. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\POP3 Password"
  292.  
  293.  
  294. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002"
  295.  
  296.  
  297.  
  298.  
  299. "Description": "Collects information to fingerprint the system",
  300. "Details":
  301.  
  302.  
  303. "Description": "Anomalous binary characteristics",
  304. "Details":
  305.  
  306. "anomaly": "Timestamp on binary predates the release date of the OS version it requires by at least a year"
  307.  
  308.  
  309.  
  310.  
  311.  
  312. * Started Service:
  313. "VaultSvc",
  314. "WerSvc"
  315.  
  316.  
  317. * Mutexes:
  318. "Global\\CLR_CASOFF_MUTEX",
  319. "Local\\_!MSFTHISTORY!_",
  320. "Local\\c:!users!user!appdata!local!microsoft!windows!temporary internet files!content.ie5!",
  321. "Local\\c:!users!user!appdata!roaming!microsoft!windows!cookies!",
  322. "Local\\c:!users!user!appdata!local!microsoft!windows!history!history.ie5!",
  323. "Global\\.net clr networking",
  324. "Local\\WERReportingForProcess2012",
  325. "Global\\\\xe5\\x88\\x90\\xc2\\x96",
  326. "Global\\\\xed\\x95\\xb0\\xc7\\x8e",
  327. "WERUI_BEX64-8478494ab213e04fcdfadcd5962755450ccadd6",
  328. "Global\\ADAP_WMI_ENTRY",
  329. "Global\\RefreshRA_Mutex",
  330. "Global\\RefreshRA_Mutex_Lib",
  331. "Global\\RefreshRA_Mutex_Flag",
  332. "CicLoadWinStaWinSta0",
  333. "Local\\MSCTF.CtfMonitorInstMutexDefault1"
  334.  
  335.  
  336. * Modified Files:
  337. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\index.dat",
  338. "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\index.dat",
  339. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\index.dat",
  340. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM",
  341. "\\??\\WMIDataDevice",
  342. "\\??\\PIPE\\wkssvc",
  343. "\\??\\PIPE\\srvsvc",
  344. "C:\\Windows\\sysnative\\LogFiles\\Scm\\2ce1541b-c7b1-4ba0-8974-722d18a3c54d",
  345. "C:\\Windows\\sysnative\\LogFiles\\Scm\\4963ad21-c4a5-42a5-b9bd-e441d57204fe",
  346. "C:\\Windows\\sysnative\\LogFiles\\Scm\\f0cfc274-6e3d-421a-9066-c7393a63dc0e",
  347. "C:\\Windows\\sysnative\\LogFiles\\Scm\\5869f1c1-01d7-41f7-84b7-715672259fa8",
  348. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB289.tmp.appcompat.txt",
  349. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB653.tmp.WERInternalMetadata.xml",
  350. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB6A2.tmp.hdmp",
  351. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERC317.tmp.mdmp",
  352. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_8478494ab213e04fcdfadcd5962755450ccadd6_cab_06936cb8\\WERB289.tmp.appcompat.txt",
  353. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_8478494ab213e04fcdfadcd5962755450ccadd6_cab_06936cb8\\WERB653.tmp.WERInternalMetadata.xml",
  354. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_8478494ab213e04fcdfadcd5962755450ccadd6_cab_06936cb8\\WERB6A2.tmp.hdmp",
  355. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_8478494ab213e04fcdfadcd5962755450ccadd6_cab_06936cb8\\WERC317.tmp.mdmp",
  356. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_8478494ab213e04fcdfadcd5962755450ccadd6_cab_06936cb8\\Report.wer",
  357. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_8478494ab213e04fcdfadcd5962755450ccadd6_cab_06936cb8\\Report.wer.tmp",
  358. "C:\\Windows\\sysnative\\wbem\\Performance\\WmiApRpl_new.h"
  359.  
  360.  
  361. * Deleted Files:
  362. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB289.tmp",
  363. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB289.tmp.appcompat.txt",
  364. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB653.tmp",
  365. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB653.tmp.WERInternalMetadata.xml",
  366. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB6A2.tmp",
  367. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERB6A2.tmp.hdmp",
  368. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERC317.tmp",
  369. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERC317.tmp.mdmp",
  370. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_8478494ab213e04fcdfadcd5962755450ccadd6_cab_06936cb8\\Report.wer.tmp"
  371.  
  372.  
  373. * Modified Registry Keys:
  374. "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\Exes_256e178897594e237119a26ace1dbe59_RASAPI32",
  375. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\Exes_256e178897594e237119a26ace1dbe59_RASAPI32\\EnableFileTracing",
  376. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\Exes_256e178897594e237119a26ace1dbe59_RASAPI32\\EnableConsoleTracing",
  377. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\Exes_256e178897594e237119a26ace1dbe59_RASAPI32\\FileTracingMask",
  378. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\Exes_256e178897594e237119a26ace1dbe59_RASAPI32\\ConsoleTracingMask",
  379. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\Exes_256e178897594e237119a26ace1dbe59_RASAPI32\\MaxFileSize",
  380. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\Exes_256e178897594e237119a26ace1dbe59_RASAPI32\\FileDirectory",
  381. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\WerSvc\\Type",
  382. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Consent",
  383. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Consent\\DefaultConsent",
  384. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\IDE\\DiskVBOX_HARDDISK___________________________1.0_____\\5&33d1638a&0&0.0.0_0-00000000-0000-0000-0000-000000000000",
  385. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\advapi32.dllMofResourceName",
  386. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\en-US\\advapi32.dll.muiMofResourceName",
  387. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\ACPI.sysACPIMOFResource",
  388. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\en-US\\ACPI.sys.muiACPIMOFResource",
  389. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\ndis.sysMofResourceName",
  390. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\en-US\\ndis.sys.muiMofResourceName",
  391. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\mssmbios.sysMofResource",
  392. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\mssmbios.sys.muiMofResource",
  393. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\HDAudBus.sysHDAudioMofName",
  394. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\HDAudBus.sys.muiHDAudioMofName",
  395. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\intelppm.sysPROCESSORWMI",
  396. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\intelppm.sys.muiPROCESSORWMI",
  397. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\System32\\Drivers\\portcls.SYSPortclsMof",
  398. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\System32\\Drivers\\en-US\\portcls.SYS.muiPortclsMof",
  399. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\monitor.sysMonitorWMI"
  400.  
  401.  
  402. * Deleted Registry Keys:
  403. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\monitor.sysMonitorWMI"
  404.  
  405.  
  406. * DNS Communications:
  407.  
  408. "type": "A",
  409. "request": "checkip.amazonaws.com",
  410. "answers":
  411.  
  412. "data": "52.206.161.133",
  413. "type": "A"
  414.  
  415.  
  416. "data": "checkip.check-ip.aws.a2z.com",
  417. "type": "CNAME"
  418.  
  419.  
  420. "data": "52.6.79.229",
  421. "type": "A"
  422.  
  423.  
  424. "data": "34.197.157.64",
  425. "type": "A"
  426.  
  427.  
  428. "data": "checkip.us-east-1.prod.check-ip.aws.a2z.com",
  429. "type": "CNAME"
  430.  
  431.  
  432. "data": "34.233.102.38",
  433. "type": "A"
  434.  
  435.  
  436. "data": "52.202.139.131",
  437. "type": "A"
  438.  
  439.  
  440. "data": "18.211.215.84",
  441. "type": "A"
  442.  
  443.  
  444.  
  445.  
  446. "type": "A",
  447. "request": "mail.hindlab.com",
  448. "answers":
  449.  
  450. "data": "hindlab.com",
  451. "type": "CNAME"
  452.  
  453.  
  454. "data": "43.225.55.205",
  455. "type": "A"
  456.  
  457.  
  458.  
  459.  
  460.  
  461. * Domains:
  462.  
  463. "ip": "52.6.79.229",
  464. "domain": "checkip.amazonaws.com"
  465.  
  466.  
  467. "ip": "43.225.55.205",
  468. "domain": "mail.hindlab.com"
  469.  
  470.  
  471.  
  472. * Network Communication - ICMP:
  473.  
  474. * Network Communication - HTTP:
  475.  
  476. "count": 1,
  477. "body": "",
  478. "uri": "http://checkip.amazonaws.com/",
  479. "user-agent": "",
  480. "method": "GET",
  481. "host": "checkip.amazonaws.com",
  482. "version": "1.1",
  483. "path": "/",
  484. "data": "GET / HTTP/1.1\r\nHost: checkip.amazonaws.com\r\nConnection: Keep-Alive\r\n\r\n",
  485. "port": 80
  486.  
  487.  
  488. "count": 1,
  489. "body": "",
  490. "uri": "http://checkip.amazonaws.com/",
  491. "user-agent": "",
  492. "method": "GET",
  493. "host": "checkip.amazonaws.com",
  494. "version": "1.1",
  495. "path": "/",
  496. "data": "GET / HTTP/1.1\r\nHost: checkip.amazonaws.com\r\n\r\n",
  497. "port": 80
  498.  
  499.  
  500.  
  501. * Network Communication - SMTP:
  502.  
  503. * Network Communication - Hosts:
  504.  
  505. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement