Advertisement
paladin316

10657878_2019-07-17_20_30.txt

Jul 17th, 2019
1,344
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.07 KB | None | 0 0
  1.  
  2. * MalFamily: "Lokibot"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "10657878"
  7. * File Size: 603648
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "abee19515119e4cd329caa900dc9a86bc7f24cf2b806a68b4a90a1de068362ca"
  10. * MD5: "ff6a5bba7b19132e091d1018aa6cf7e1"
  11. * SHA1: "452ccc4cb248685d450874f476ad33eb1772c3b1"
  12. * SHA512: "966be4d6d6bb679e3286d3e944311e5fd5417c2ea020c7be1be35f9bdf64df2f4b708f198104f4594bdb94c3d84c876ba4e828329d0305442887b9203e7dc75d"
  13. * CRC32: "F62AC45A"
  14. * SSDEEP: "12288:zU+MjiB4XC/z5mThr90n9KCjNCiF4FdKAbWfXVPlZ39XJEujw/w:4nAcAMF90noWNCi4fK8CLXJEujw/w"
  15.  
  16. * Process Execution:
  17. "10657878.exe",
  18. "sedgf.exe",
  19. "sedgf.exe",
  20. "services.exe",
  21. "lsass.exe",
  22. "taskhost.exe",
  23. "sc.exe",
  24. "svchost.exe",
  25. "svchost.exe",
  26. "WerFault.exe",
  27. "wermgr.exe"
  28.  
  29.  
  30. * Executed Commands:
  31. "\"C:\\Users\\user\\AppData\\Roaming\\nmsp3\\sedgf.exe\"",
  32. "C:\\Windows\\system32\\lsass.exe",
  33. "taskhost.exe $(Arg0)",
  34. "C:\\Windows\\system32\\sc.exe start w32time task_started",
  35. "C:\\Windows\\system32\\svchost.exe -k LocalService",
  36. "C:\\Windows\\System32\\svchost.exe -k WerSvcGroup",
  37. "C:\\Windows\\system32\\WerFault.exe -u -p 576 -s 288",
  38. "\"C:\\Windows\\system32\\wermgr.exe\" \"-queuereporting_svc\" \"C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_e0bfc78dc22baf57413d9e3a2494cb68424d695b_cab_02631d9a\""
  39.  
  40.  
  41. * Signatures Detected:
  42.  
  43. "Description": "At least one process apparently crashed during execution",
  44. "Details":
  45.  
  46.  
  47. "Description": "Creates RWX memory",
  48. "Details":
  49.  
  50.  
  51. "Description": "A process attempted to delay the analysis task.",
  52. "Details":
  53.  
  54. "Process": "sedgf.exe tried to sleep 1106 seconds, actually delayed analysis time by 0 seconds"
  55.  
  56.  
  57.  
  58.  
  59. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  60. "Details":
  61.  
  62. "post_no_referer": "HTTP traffic contains a POST request with no referer header"
  63.  
  64.  
  65. "http_version_old": "HTTP traffic uses version 1.0"
  66.  
  67.  
  68. "suspicious_request": "http://doktiq.info/chrix/cat.php"
  69.  
  70.  
  71.  
  72.  
  73. "Description": "Performs some HTTP requests",
  74. "Details":
  75.  
  76. "url": "http://doktiq.info/chrix/cat.php"
  77.  
  78.  
  79.  
  80.  
  81. "Description": "The binary likely contains encrypted or compressed data.",
  82. "Details":
  83.  
  84. "section": "name: .rsrc, entropy: 7.08, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ, raw_size: 0x00025200, virtual_size: 0x0002518c"
  85.  
  86.  
  87.  
  88.  
  89. "Description": "Executed a process and injected code into it, probably while unpacking",
  90. "Details":
  91.  
  92. "Injection": "sedgf.exe(1140) -> sedgf.exe(2012)"
  93.  
  94.  
  95.  
  96.  
  97. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  98. "Details":
  99.  
  100. "Spam": "services.exe (500) called API GetSystemTimeAsFileTime 9217180 times"
  101.  
  102.  
  103.  
  104.  
  105. "Description": "Steals private information from local Internet browsers",
  106. "Details":
  107.  
  108. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
  109.  
  110.  
  111.  
  112.  
  113. "Description": "Installs itself for autorun at Windows startup",
  114. "Details":
  115.  
  116. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\nmsp3.vbs"
  117.  
  118.  
  119. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\nmsp3.vbs"
  120.  
  121.  
  122.  
  123.  
  124. "Description": "Creates a hidden or system file",
  125. "Details":
  126.  
  127. "file": "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe"
  128.  
  129.  
  130. "file": "C:\\Users\\user\\AppData\\Roaming\\474604"
  131.  
  132.  
  133.  
  134.  
  135. "Description": "File has been identified by 42 Antiviruses on VirusTotal as malicious",
  136. "Details":
  137.  
  138. "MicroWorld-eScan": "Trojan.Agent.EAQQ"
  139.  
  140.  
  141. "FireEye": "Generic.mg.ff6a5bba7b19132e"
  142.  
  143.  
  144. "McAfee": "Fareit-FOZ!FF6A5BBA7B19"
  145.  
  146.  
  147. "Cylance": "Unsafe"
  148.  
  149.  
  150. "AegisLab": "Trojan.Win32.Generic.4!c"
  151.  
  152.  
  153. "Alibaba": "Trojan:Win32/GenKryptik.c6b79630"
  154.  
  155.  
  156. "K7GW": "Riskware ( 0040eff71 )"
  157.  
  158.  
  159. "K7AntiVirus": "Riskware ( 0040eff71 )"
  160.  
  161.  
  162. "Arcabit": "Trojan.Graftor.D9812C"
  163.  
  164.  
  165. "TrendMicro": "TrojanSpy.Win32.LOKI.SMDD.hp"
  166.  
  167.  
  168. "Symantec": "Trojan.Gen.MBT"
  169.  
  170.  
  171. "APEX": "Malicious"
  172.  
  173.  
  174. "Paloalto": "generic.ml"
  175.  
  176.  
  177. "Kaspersky": "UDS:DangerousObject.Multi.Generic"
  178.  
  179.  
  180. "BitDefender": "Trojan.Agent.EAQQ"
  181.  
  182.  
  183. "Avast": "Win32:Malware-gen"
  184.  
  185.  
  186. "Tencent": "Win32.Trojan.Inject.Auto"
  187.  
  188.  
  189. "Endgame": "malicious (high confidence)"
  190.  
  191.  
  192. "Emsisoft": "Trojan.Agent.EAQQ (B)"
  193.  
  194.  
  195. "F-Secure": "Trojan.TR/Injector.midbq"
  196.  
  197.  
  198. "DrWeb": "Trojan.PWS.Pony.67"
  199.  
  200.  
  201. "Invincea": "heuristic"
  202.  
  203.  
  204. "McAfee-GW-Edition": "BehavesLike.Win32.Fareit.hh"
  205.  
  206.  
  207. "Trapmine": "malicious.high.ml.score"
  208.  
  209.  
  210. "SentinelOne": "DFI - Suspicious PE"
  211.  
  212.  
  213. "Avira": "TR/Injector.midbq"
  214.  
  215.  
  216. "MAX": "malware (ai score=100)"
  217.  
  218.  
  219. "Microsoft": "Trojan:Win32/Tiggre!plock"
  220.  
  221.  
  222. "ZoneAlarm": "UDS:DangerousObject.Multi.Generic"
  223.  
  224.  
  225. "GData": "Win32.Trojan.Agent.QCYM86"
  226.  
  227.  
  228. "AhnLab-V3": "Win-Trojan/Delphiless.Exp"
  229.  
  230.  
  231. "Acronis": "suspicious"
  232.  
  233.  
  234. "Ad-Aware": "Trojan.Agent.EAQQ"
  235.  
  236.  
  237. "ESET-NOD32": "a variant of Win32/Injector.EGRJ"
  238.  
  239.  
  240. "TrendMicro-HouseCall": "TrojanSpy.Win32.LOKI.SMDD.hp"
  241.  
  242.  
  243. "Rising": "Trojan.Injector!1.AF18 (CLASSIC)"
  244.  
  245.  
  246. "Ikarus": "Win32.Outbreak"
  247.  
  248.  
  249. "Fortinet": "W32/GenKryptik.DNHM!tr"
  250.  
  251.  
  252. "AVG": "Win32:Malware-gen"
  253.  
  254.  
  255. "Cybereason": "malicious.cb2486"
  256.  
  257.  
  258. "CrowdStrike": "win/malicious_confidence_100% (W)"
  259.  
  260.  
  261. "Qihoo-360": "HEUR/QVM05.1.9621.Malware.Gen"
  262.  
  263.  
  264.  
  265.  
  266. "Description": "Checks the system manufacturer, likely for anti-virtualization",
  267. "Details":
  268.  
  269.  
  270. "Description": "Creates a copy of itself",
  271. "Details":
  272.  
  273. "copy": "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe"
  274.  
  275.  
  276.  
  277.  
  278. "Description": "Harvests credentials from local FTP client softwares",
  279. "Details":
  280.  
  281. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\sitemanager.xml"
  282.  
  283.  
  284. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\recentservers.xml"
  285.  
  286.  
  287. "file": "C:\\Users\\user\\AppData\\Roaming\\Far Manager\\Profile\\PluginsData\\42E4AEB1-A230-44F4-B33C-F195BB654931.db"
  288.  
  289.  
  290. "file": "C:\\Program Files (x86)\\FTPGetter\\Profile\\servers.xml"
  291.  
  292.  
  293. "file": "C:\\Users\\user\\AppData\\Roaming\\FTPGetter\\servers.xml"
  294.  
  295.  
  296. "file": "C:\\Users\\user\\AppData\\Roaming\\Estsoft\\ALFTP\\ESTdb2.dat"
  297.  
  298.  
  299. "key": "HKEY_CURRENT_USER\\Software\\Far\\Plugins\\FTP\\Hosts"
  300.  
  301.  
  302. "key": "HKEY_CURRENT_USER\\Software\\Far2\\Plugins\\FTP\\Hosts"
  303.  
  304.  
  305. "key": "HKEY_CURRENT_USER\\Software\\Ghisler\\Total Commander"
  306.  
  307.  
  308. "key": "HKEY_CURRENT_USER\\Software\\LinasFTP\\Site Manager"
  309.  
  310.  
  311.  
  312.  
  313. "Description": "Harvests information related to installed instant messenger clients",
  314. "Details":
  315.  
  316. "file": "C:\\Users\\user\\AppData\\Roaming\\.purple\\accounts.xml"
  317.  
  318.  
  319.  
  320.  
  321. "Description": "Harvests information related to installed mail clients",
  322. "Details":
  323.  
  324. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook"
  325.  
  326.  
  327. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046\\Email"
  328.  
  329.  
  330. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046"
  331.  
  332.  
  333. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326"
  334.  
  335.  
  336. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff\\Email"
  337.  
  338.  
  339. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326\\Email"
  340.  
  341.  
  342. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001"
  343.  
  344.  
  345. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002"
  346.  
  347.  
  348. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\Email"
  349.  
  350.  
  351. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e\\Email"
  352.  
  353.  
  354. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1\\Email"
  355.  
  356.  
  357. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff"
  358.  
  359.  
  360. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2"
  361.  
  362.  
  363. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670"
  364.  
  365.  
  366. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7\\Email"
  367.  
  368.  
  369. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e"
  370.  
  371.  
  372. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2\\Email"
  373.  
  374.  
  375. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\Email"
  376.  
  377.  
  378. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a\\Email"
  379.  
  380.  
  381. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001\\Email"
  382.  
  383.  
  384. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  385.  
  386.  
  387. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259"
  388.  
  389.  
  390. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001"
  391.  
  392.  
  393. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook"
  394.  
  395.  
  396. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259\\Email"
  397.  
  398.  
  399. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook"
  400.  
  401.  
  402. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7"
  403.  
  404.  
  405. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670\\Email"
  406.  
  407.  
  408. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604\\Email"
  409.  
  410.  
  411. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\Email"
  412.  
  413.  
  414. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a"
  415.  
  416.  
  417. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046"
  418.  
  419.  
  420. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604"
  421.  
  422.  
  423. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1"
  424.  
  425.  
  426. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046\\Email"
  427.  
  428.  
  429.  
  430.  
  431. "Description": "Attempts to interact with an Alternate Data Stream (ADS)",
  432. "Details":
  433.  
  434. "file": "C:\\Users\\user\\AppData\\Roaming\\nmsp3\\sedgf.exe:ZoneIdentifier"
  435.  
  436.  
  437.  
  438.  
  439. "Description": "Collects information to fingerprint the system",
  440. "Details":
  441.  
  442.  
  443. "Description": "Anomalous binary characteristics",
  444. "Details":
  445.  
  446. "anomaly": "Timestamp on binary predates the release date of the OS version it requires by at least a year"
  447.  
  448.  
  449.  
  450.  
  451. "Description": "Created network traffic indicative of malicious activity",
  452. "Details":
  453.  
  454. "signature": "ET TROJAN LokiBot User-Agent (Charon/Inferno)"
  455.  
  456.  
  457. "signature": "ET TROJAN LokiBot Fake 404 Response"
  458.  
  459.  
  460. "signature": "ET TROJAN LokiBot Checkin"
  461.  
  462.  
  463. "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M2"
  464.  
  465.  
  466. "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M1"
  467.  
  468.  
  469. "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1"
  470.  
  471.  
  472. "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2"
  473.  
  474.  
  475.  
  476.  
  477.  
  478. * Started Service:
  479. "VaultSvc",
  480. "WerSvc",
  481. "W32Time"
  482.  
  483.  
  484. * Mutexes:
  485. "6EFA73A4746045B65DEE781E",
  486. "Local\\WERReportingForProcess576",
  487. "Global\\\\xe5\\x88\\x90\\xc2\\x8a",
  488. "Global\\\\xe1\\x9f\\xa0A",
  489. "WERUI_BEX64-e0bfc78dc22baf57413d9e3a2494cb68424d695b"
  490.  
  491.  
  492. * Modified Files:
  493. "C:\\Users\\user\\AppData\\Roaming\\nmsp3\\sedgf.exe",
  494. "C:\\Users\\user\\AppData\\Roaming\\nmsp3\\sedgf.exe:ZoneIdentifier",
  495. "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\nmsp3.vbs",
  496. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.lck",
  497. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe",
  498. "C:\\Windows\\sysnative\\LogFiles\\Scm\\4963ad21-c4a5-42a5-b9bd-e441d57204fe",
  499. "C:\\Windows\\sysnative\\LogFiles\\Scm\\7bbc503c-5977-4798-a4ae-61483a7e030d",
  500. "C:\\Windows\\sysnative\\LogFiles\\Scm\\0cac2e9c-ea8f-4241-b7b0-43263f35a662",
  501. "\\??\\PIPE\\lsarpc",
  502. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA01B.tmp.appcompat.txt",
  503. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA636.tmp.WERInternalMetadata.xml",
  504. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA676.tmp.hdmp",
  505. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERAF60.tmp.mdmp",
  506. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_e0bfc78dc22baf57413d9e3a2494cb68424d695b_cab_02631d9a\\WERA01B.tmp.appcompat.txt",
  507. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_e0bfc78dc22baf57413d9e3a2494cb68424d695b_cab_02631d9a\\WERA636.tmp.WERInternalMetadata.xml",
  508. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_e0bfc78dc22baf57413d9e3a2494cb68424d695b_cab_02631d9a\\WERA676.tmp.hdmp",
  509. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_e0bfc78dc22baf57413d9e3a2494cb68424d695b_cab_02631d9a\\WERAF60.tmp.mdmp",
  510. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_e0bfc78dc22baf57413d9e3a2494cb68424d695b_cab_02631d9a\\Report.wer",
  511. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_e0bfc78dc22baf57413d9e3a2494cb68424d695b_cab_02631d9a\\Report.wer.tmp"
  512.  
  513.  
  514. * Deleted Files:
  515. "C:\\Users\\user\\AppData\\Roaming\\nmsp3\\sedgf.exe",
  516. "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\nmsp3.vbs",
  517. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.lck",
  518. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA01B.tmp",
  519. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA01B.tmp.appcompat.txt",
  520. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA636.tmp",
  521. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA636.tmp.WERInternalMetadata.xml",
  522. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA676.tmp",
  523. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA676.tmp.hdmp",
  524. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERAF60.tmp",
  525. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERAF60.tmp.mdmp",
  526. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_e0bfc78dc22baf57413d9e3a2494cb68424d695b_cab_02631d9a\\Report.wer.tmp"
  527.  
  528.  
  529. * Modified Registry Keys:
  530. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\W32Time\\Type",
  531. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\WerSvc\\Type",
  532. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\W32Time\\TimeProviders\\NtpClient\\SpecialPollTimeRemaining",
  533. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Consent",
  534. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Consent\\DefaultConsent"
  535.  
  536.  
  537. * Deleted Registry Keys:
  538.  
  539. * DNS Communications:
  540.  
  541. "type": "A",
  542. "request": "doktiq.info",
  543. "answers":
  544.  
  545. "data": "47.74.38.64",
  546. "type": "A"
  547.  
  548.  
  549.  
  550.  
  551.  
  552. * Domains:
  553.  
  554. "ip": "47.74.38.64",
  555. "domain": "doktiq.info"
  556.  
  557.  
  558.  
  559. * Network Communication - ICMP:
  560.  
  561. * Network Communication - HTTP:
  562.  
  563. "count": 2,
  564. "body": "",
  565. "uri": "http://doktiq.info/chrix/cat.php",
  566. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  567. "method": "POST",
  568. "host": "doktiq.info",
  569. "version": "1.0",
  570. "path": "/chrix/cat.php",
  571. "data": "POST /chrix/cat.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: doktiq.info\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: B49153C6\r\nContent-Length: 176\r\nConnection: close\r\n\r\n",
  572. "port": 80
  573.  
  574.  
  575. "count": 18,
  576. "body": "",
  577. "uri": "http://doktiq.info/chrix/cat.php",
  578. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  579. "method": "POST",
  580. "host": "doktiq.info",
  581. "version": "1.0",
  582. "path": "/chrix/cat.php",
  583. "data": "POST /chrix/cat.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: doktiq.info\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: B49153C6\r\nContent-Length: 149\r\nConnection: close\r\n\r\n",
  584. "port": 80
  585.  
  586.  
  587.  
  588. * Network Communication - SMTP:
  589.  
  590. * Network Communication - Hosts:
  591.  
  592. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement