Advertisement
paladin316

Exes_3f4be953eded94510ce38b33a8a9af24_exe_2019-07-17_19_30.txt

Jul 17th, 2019
1,430
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.59 KB | None | 0 0
  1.  
  2. * MalFamily: "B6614A4A"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_3f4be953eded94510ce38b33a8a9af24.exe"
  7. * File Size: 1836032
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "90b4c15039647d0d0f2ddc6bbe03cfc7bc0ed411850480b2890c8cf11195c757"
  10. * MD5: "3f4be953eded94510ce38b33a8a9af24"
  11. * SHA1: "9633c33e7a5168f1c5ab31571f19f214892bce56"
  12. * SHA512: "eac3707a0c37517b5e1c4f5ceb4fdbaf5197a3c5127081dce4bb807d079fd81c970e815e2390bd46a08fc1e34838f91a735d82095b22787b27e56a1a28d3edb6"
  13. * CRC32: "B6614A4A"
  14. * SSDEEP: "24576:rAHnh+eWsN3skA4RV1Hom2KXMmHaSJteyE2zgEfnw6yIL6jgVy+V3XQPEb8f5:Gh+ZkldoPK8YaSOb2zg8w6B6juTE"
  15.  
  16. * Process Execution:
  17. "Exes_3f4be953eded94510ce38b33a8a9af24.exe",
  18. "RegAsm.exe",
  19. "services.exe",
  20. "svchost.exe",
  21. "WmiPrvSE.exe",
  22. "WmiPrvSE.exe",
  23. "svchost.exe",
  24. "svchost.exe",
  25. "WMIADAP.exe",
  26. "lsass.exe",
  27. "taskhost.exe"
  28.  
  29.  
  30. * Executed Commands:
  31. "C:\\Windows\\system32\\wbem\\wmiprvse.exe -secured -Embedding",
  32. "C:\\Windows\\system32\\wbem\\wmiprvse.exe -Embedding",
  33. "C:\\Windows\\system32\\svchost.exe -k netsvcs",
  34. "C:\\Windows\\system32\\lsass.exe",
  35. "taskhost.exe $(Arg0)",
  36. "\\\\?\\C:\\Windows\\system32\\wbem\\WMIADAP.EXE wmiadap.exe /F /T /R"
  37.  
  38.  
  39. * Signatures Detected:
  40.  
  41. "Description": "Creates RWX memory",
  42. "Details":
  43.  
  44.  
  45. "Description": "At least one IP Address, Domain, or File Name was found in a crypto call",
  46. "Details":
  47.  
  48. "ioc": "http://crl.globalsign.net/root-r2.crl0"
  49.  
  50.  
  51.  
  52.  
  53. "Description": "A process created a hidden window",
  54. "Details":
  55.  
  56. "Process": "svchost.exe -> \\\\?\\C:\\Windows\\system32\\wbem\\WMIADAP.EXE"
  57.  
  58.  
  59.  
  60.  
  61. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  62. "Details":
  63.  
  64. "get_no_useragent": "HTTP traffic contains a GET request with no user-agent header"
  65.  
  66.  
  67. "suspicious_request": "http://checkip.amazonaws.com/"
  68.  
  69.  
  70.  
  71.  
  72. "Description": "Performs some HTTP requests",
  73. "Details":
  74.  
  75. "url": "http://checkip.amazonaws.com/"
  76.  
  77.  
  78.  
  79.  
  80. "Description": "Executed a process and injected code into it, probably while unpacking",
  81. "Details":
  82.  
  83. "Injection": "Exes_3f4be953eded94510ce38b33a8a9af24.exe(1424) -> RegAsm.exe(2824)"
  84.  
  85.  
  86.  
  87.  
  88. "Description": "Sniffs keystrokes",
  89. "Details":
  90.  
  91. "SetWindowsHookExW": "Process: RegAsm.exe(2824)"
  92.  
  93.  
  94.  
  95.  
  96. "Description": "A process attempted to delay the analysis task by a long amount of time.",
  97. "Details":
  98.  
  99. "Process": "WmiPrvSE.exe tried to sleep 972 seconds, actually delayed analysis time by 0 seconds"
  100.  
  101.  
  102. "Process": "svchost.exe tried to sleep 360 seconds, actually delayed analysis time by 0 seconds"
  103.  
  104.  
  105. "Process": "RegAsm.exe tried to sleep 3176 seconds, actually delayed analysis time by 0 seconds"
  106.  
  107.  
  108.  
  109.  
  110. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  111. "Details":
  112.  
  113. "Spam": "services.exe (500) called API GetSystemTimeAsFileTime 13131110 times"
  114.  
  115.  
  116.  
  117.  
  118. "Description": "Steals private information from local Internet browsers",
  119. "Details":
  120.  
  121. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Cookies"
  122.  
  123.  
  124. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
  125.  
  126.  
  127.  
  128.  
  129. "Description": "Retrieves Windows ProductID, probably to fingerprint the sandbox",
  130. "Details":
  131.  
  132.  
  133. "Description": "File has been identified by 22 Antiviruses on VirusTotal as malicious",
  134. "Details":
  135.  
  136. "FireEye": "Generic.mg.3f4be953eded9451"
  137.  
  138.  
  139. "McAfee": "Trojan-AitInject.aq"
  140.  
  141.  
  142. "Cylance": "Unsafe"
  143.  
  144.  
  145. "Invincea": "heuristic"
  146.  
  147.  
  148. "Cyren": "W32/AutoIt.IJ.gen!Eldorado"
  149.  
  150.  
  151. "Symantec": "ML.Attribute.HighConfidence"
  152.  
  153.  
  154. "APEX": "Malicious"
  155.  
  156.  
  157. "Kaspersky": "UDS:DangerousObject.Multi.Generic"
  158.  
  159.  
  160. "Rising": "Trojan.Win32.Agent_.sa (CLASSIC)"
  161.  
  162.  
  163. "TrendMicro": "Trojan.AutoIt.CRYPTINJECT.SMA"
  164.  
  165.  
  166. "McAfee-GW-Edition": "BehavesLike.Win32.Downloader.th"
  167.  
  168.  
  169. "F-Prot": "W32/AutoIt.IJ.gen!Eldorado"
  170.  
  171.  
  172. "Fortinet": "AutoIt/Injector.EDG!tr"
  173.  
  174.  
  175. "Endgame": "malicious (high confidence)"
  176.  
  177.  
  178. "ZoneAlarm": "UDS:DangerousObject.Multi.Generic"
  179.  
  180.  
  181. "Microsoft": "Trojan:Win32/Wacatac.B!ml"
  182.  
  183.  
  184. "Acronis": "suspicious"
  185.  
  186.  
  187. "Malwarebytes": "Trojan.MalPack.AutoIt"
  188.  
  189.  
  190. "ESET-NOD32": "a variant of Win32/Injector.Autoit.EDK"
  191.  
  192.  
  193. "TrendMicro-HouseCall": "Trojan.AutoIt.CRYPTINJECT.SMA"
  194.  
  195.  
  196. "SentinelOne": "DFI - Suspicious PE"
  197.  
  198.  
  199. "Qihoo-360": "HEUR/QVM10.1.95DF.Malware.Gen"
  200.  
  201.  
  202.  
  203.  
  204. "Description": "Checks the CPU name from registry, possibly for anti-virtualization",
  205. "Details":
  206.  
  207.  
  208. "Description": "Harvests credentials from local FTP client softwares",
  209. "Details":
  210.  
  211. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\recentservers.xml"
  212.  
  213.  
  214. "file": "C:\\Users\\user\\AppData\\Roaming\\SmartFTP\\Client 2.0\\Favorites\\Quick Connect\\"
  215.  
  216.  
  217. "file": "C:\\Users\\user\\AppData\\Roaming\\SmartFTP\\Client 2.0\\Favorites\\Quick Connect\\*.xml"
  218.  
  219.  
  220. "file": "C:\\Users\\user\\AppData\\Roaming\\FTPGetter\\servers.xml"
  221.  
  222.  
  223. "file": "C:\\Users\\user\\AppData\\Roaming\\Ipswitch\\WS_FTP\\Sites\\ws_ftp.ini"
  224.  
  225.  
  226. "file": "C:\\cftp\\Ftplist.txt"
  227.  
  228.  
  229. "key": "HKEY_CURRENT_USER\\Software\\FTPWare\\COREFTP\\Sites"
  230.  
  231.  
  232.  
  233.  
  234. "Description": "Harvests information related to installed mail clients",
  235. "Details":
  236.  
  237. "file": "C:\\Users\\user\\AppData\\Roaming\\Thunderbird\\profiles.ini"
  238.  
  239.  
  240. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows Messaging Subsystem\\Profiles\\9375CFF0413111d3B88A00104B2A6676"
  241.  
  242.  
  243. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  244.  
  245.  
  246. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\SMTP Password"
  247.  
  248.  
  249. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\Email"
  250.  
  251.  
  252. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\HTTP Password"
  253.  
  254.  
  255. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  256.  
  257.  
  258. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\HTTP Password"
  259.  
  260.  
  261. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  262.  
  263.  
  264. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\POP3 Password"
  265.  
  266.  
  267. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\Email"
  268.  
  269.  
  270. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\SMTP Password"
  271.  
  272.  
  273. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\IMAP Password"
  274.  
  275.  
  276. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001"
  277.  
  278.  
  279. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\IMAP Password"
  280.  
  281.  
  282. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\POP3 Password"
  283.  
  284.  
  285. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002"
  286.  
  287.  
  288.  
  289.  
  290. "Description": "Makes SMTP requests, possibly sending spam or exfiltrating data.",
  291. "Details":
  292.  
  293. "SMTP": "209.85.232.108 (smtp.gmail.com)"
  294.  
  295.  
  296.  
  297.  
  298. "Description": "Collects information to fingerprint the system",
  299. "Details":
  300.  
  301.  
  302. "Description": "Anomalous binary characteristics",
  303. "Details":
  304.  
  305. "anomaly": "Actual checksum does not match that reported in PE header"
  306.  
  307.  
  308.  
  309.  
  310.  
  311. * Started Service:
  312. "VaultSvc",
  313. "Winmgmt"
  314.  
  315.  
  316. * Mutexes:
  317. "Global\\CLR_CASOFF_MUTEX",
  318. "Global\\.net clr networking",
  319. "Local\\_!MSFTHISTORY!_",
  320. "Local\\c:!users!user!appdata!local!microsoft!windows!temporary internet files!content.ie5!",
  321. "Local\\c:!users!user!appdata!roaming!microsoft!windows!cookies!",
  322. "Local\\c:!users!user!appdata!local!microsoft!windows!history!history.ie5!",
  323. "Global\\ADAP_WMI_ENTRY",
  324. "Global\\RefreshRA_Mutex",
  325. "Global\\RefreshRA_Mutex_Lib",
  326. "Global\\RefreshRA_Mutex_Flag"
  327.  
  328.  
  329. * Modified Files:
  330. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\index.dat",
  331. "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\index.dat",
  332. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\index.dat",
  333. "C:\\Users\\user\\AppData\\Roaming\\VlS26480GW.jpeg",
  334. "C:\\Users\\user\\AppData\\Roaming\\wc1wb3ht.mhk\\Chrome\\Default\\Cookies",
  335. "C:\\Users\\user\\AppData\\Roaming\\wc1wb3ht.mhk.zip",
  336. "C:\\Users\\user\\AppData\\Roaming\\U5QycQS1FE.jpeg",
  337. "C:\\Users\\user\\AppData\\Roaming\\K7vJ7pL63A.jpeg",
  338. "C:\\Users\\user\\AppData\\Roaming\\Uud9u7u00J.jpeg",
  339. "C:\\Users\\user\\AppData\\Roaming\\RH1N1AU1pg.jpeg",
  340. "C:\\Users\\user\\AppData\\Roaming\\P8p08K6zwv.jpeg",
  341. "C:\\Users\\user\\AppData\\Roaming\\Qp7T96mUr6.jpeg",
  342. "C:\\Users\\user\\AppData\\Roaming\\S1S7ivI768.jpeg",
  343. "C:\\Users\\user\\AppData\\Roaming\\CVD19xH28i.jpeg",
  344. "C:\\Users\\user\\AppData\\Roaming\\XZ4Cgrdw39.jpeg",
  345. "\\??\\PIPE\\samr",
  346. "C:\\Windows\\sysnative\\wbem\\repository\\WRITABLE.TST",
  347. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING1.MAP",
  348. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING2.MAP",
  349. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING3.MAP",
  350. "C:\\Windows\\sysnative\\wbem\\repository\\OBJECTS.DATA",
  351. "C:\\Windows\\sysnative\\wbem\\repository\\INDEX.BTR",
  352. "C:\\Windows\\sysnative\\LogFiles\\Scm\\4963ad21-c4a5-42a5-b9bd-e441d57204fe",
  353. "C:\\Windows\\sysnative\\LogFiles\\Scm\\6989c65b-f90d-4030-b893-c2a331a9b917",
  354. "\\??\\WMIDataDevice",
  355. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM",
  356. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2WMI SELF-INSTRUMENTATION EVENT PROVIDER",
  357. "\\??\\PIPE\\wkssvc",
  358. "\\??\\PIPE\\srvsvc",
  359. "C:\\Windows\\sysnative\\wbem\\Performance\\WmiApRpl_new.h"
  360.  
  361.  
  362. * Deleted Files:
  363. "C:\\Users\\user\\AppData\\Roaming\\wc1wb3ht.mhk\\Chrome\\Default\\Cookies",
  364. "C:\\Users\\user\\AppData\\Roaming\\wc1wb3ht.mhk\\Chrome\\Default",
  365. "C:\\Users\\user\\AppData\\Roaming\\wc1wb3ht.mhk\\Chrome",
  366. "C:\\Users\\user\\AppData\\Roaming\\wc1wb3ht.mhk",
  367. "C:\\Users\\user\\AppData\\Roaming\\U5QycQS1FE.jpeg",
  368. "C:\\Users\\user\\AppData\\Roaming\\wc1wb3ht.mhk.zip",
  369. "C:\\Users\\user\\AppData\\Roaming\\VlS26480GW.jpeg",
  370. "C:\\Users\\user\\AppData\\Roaming\\K7vJ7pL63A.jpeg",
  371. "C:\\Users\\user\\AppData\\Roaming\\Uud9u7u00J.jpeg",
  372. "C:\\Users\\user\\AppData\\Roaming\\RH1N1AU1pg.jpeg",
  373. "C:\\Users\\user\\AppData\\Roaming\\P8p08K6zwv.jpeg"
  374.  
  375.  
  376. * Modified Registry Keys:
  377. "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\RegAsm_RASAPI32",
  378. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RegAsm_RASAPI32\\EnableFileTracing",
  379. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RegAsm_RASAPI32\\EnableConsoleTracing",
  380. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RegAsm_RASAPI32\\FileTracingMask",
  381. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RegAsm_RASAPI32\\ConsoleTracingMask",
  382. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RegAsm_RASAPI32\\MaxFileSize",
  383. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\RegAsm_RASAPI32\\FileDirectory",
  384. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\LanguageList",
  385. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\LastServiceStart",
  386. "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Wbem\\Transports\\Decoupled\\Server",
  387. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\CreationTime",
  388. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\MarshaledProxy",
  389. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\ProcessIdentifier",
  390. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ConfigValueEssNeedsLoading",
  391. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\List of event-active namespaces",
  392. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\VaultSvc\\Type",
  393. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ProcessID",
  394. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ThrottleDrege",
  395. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Parameters\\ServiceDllUnloadOnStop",
  396. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\LastServiceStopMissed",
  397. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\ESS\\//./root/CIMV2\\SCM Event Provider",
  398. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\IDE\\DiskVBOX_HARDDISK___________________________1.0_____\\5&33d1638a&0&0.0.0_0-00000000-0000-0000-0000-000000000000",
  399. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\advapi32.dllMofResourceName",
  400. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\en-US\\advapi32.dll.muiMofResourceName",
  401. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\ACPI.sysACPIMOFResource",
  402. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\en-US\\ACPI.sys.muiACPIMOFResource",
  403. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\ndis.sysMofResourceName",
  404. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\en-US\\ndis.sys.muiMofResourceName",
  405. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\mssmbios.sysMofResource",
  406. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\mssmbios.sys.muiMofResource",
  407. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\HDAudBus.sysHDAudioMofName",
  408. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\HDAudBus.sys.muiHDAudioMofName",
  409. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\intelppm.sysPROCESSORWMI",
  410. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\intelppm.sys.muiPROCESSORWMI",
  411. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\System32\\Drivers\\portcls.SYSPortclsMof",
  412. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\System32\\Drivers\\en-US\\portcls.SYS.muiPortclsMof",
  413. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\monitor.sysMonitorWMI"
  414.  
  415.  
  416. * Deleted Registry Keys:
  417. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\monitor.sysMonitorWMI"
  418.  
  419.  
  420. * DNS Communications:
  421.  
  422. "type": "A",
  423. "request": "checkip.amazonaws.com",
  424. "answers":
  425.  
  426. "data": "52.206.161.133",
  427. "type": "A"
  428.  
  429.  
  430. "data": "checkip.check-ip.aws.a2z.com",
  431. "type": "CNAME"
  432.  
  433.  
  434. "data": "52.6.79.229",
  435. "type": "A"
  436.  
  437.  
  438. "data": "34.197.157.64",
  439. "type": "A"
  440.  
  441.  
  442. "data": "checkip.us-east-1.prod.check-ip.aws.a2z.com",
  443. "type": "CNAME"
  444.  
  445.  
  446. "data": "34.233.102.38",
  447. "type": "A"
  448.  
  449.  
  450. "data": "52.202.139.131",
  451. "type": "A"
  452.  
  453.  
  454. "data": "18.211.215.84",
  455. "type": "A"
  456.  
  457.  
  458.  
  459.  
  460. "type": "A",
  461. "request": "smtp.gmail.com",
  462. "answers":
  463.  
  464. "data": "gmail-smtp-msa.l.google.com",
  465. "type": "CNAME"
  466.  
  467.  
  468. "data": "209.85.232.108",
  469. "type": "A"
  470.  
  471.  
  472.  
  473.  
  474.  
  475. * Domains:
  476.  
  477. "ip": "74.125.141.109",
  478. "domain": "smtp.gmail.com"
  479.  
  480.  
  481. "ip": "34.233.102.38",
  482. "domain": "checkip.amazonaws.com"
  483.  
  484.  
  485.  
  486. * Network Communication - ICMP:
  487.  
  488. * Network Communication - HTTP:
  489.  
  490. "count": 1,
  491. "body": "",
  492. "uri": "http://checkip.amazonaws.com/",
  493. "user-agent": "",
  494. "method": "GET",
  495. "host": "checkip.amazonaws.com",
  496. "version": "1.1",
  497. "path": "/",
  498. "data": "GET / HTTP/1.1\r\nHost: checkip.amazonaws.com\r\nConnection: Keep-Alive\r\n\r\n",
  499. "port": 80
  500.  
  501.  
  502.  
  503. * Network Communication - SMTP:
  504.  
  505. "raw": "EHLO Host\r\nSTARTTLS\r\nEHLO Host\r\nSTARTTLS\r\n\\x16\\x03\\x01\\x00q\\x01\\x00\\x00m\\x03\\x01/e\\xe5\\xc6\\xb9\\xb1\\xb8\\xaa\\x8e\\xc6+%\\xd5\\xb7\\xda\\xdf\\xe1\\xe5\\x1e\\xb18w\\xe2MGJ\\x97e\\x9b\\x00\\x00\\x18\\x00/\\x005\\x00\\x05\\x00\n\\xc0\\x13\\xc0\\x14\\xc0\t\\xc0\n\\x002\\x008\\x00\\x13\\x00\\x04\\x01\\x00\\x00,\\xff\\x01\\x00\\x01\\x00\\x00\\x00\\x00\\x13\\x00\\x11\\x00\\x00\\x0esmtp.gmail.com\\x00\n\\x00\\x06\\x00\\x04\\x00\\x17\\x00\\x18\\x00\\x0b\\x00\\x02\\x01\\x00EHLO Host\r\nSTARTTLS\r\n\\x16\\x03\\x01\\x00q\\x01\\x00\\x00m\\x03\\x01/e\\xe5&\\x97\\x9e\\x9d`\\xa4\\xbd\\x8eq\\xc6\\xf3d\\x1b\\xd0X#\\xe7\\x9a\\xb3tu-\\x9c\\xb2\\\\x00\\x00\\x18\\x00/\\x005\\x00\\x05\\x00\n\\xc0\\x13\\xc0\\x14\\xc0\t\\xc0\n\\x002\\x008\\x00\\x13\\x00\\x04\\x01\\x00\\x00,\\xff\\x01\\x00\\x01\\x00\\x00\\x00\\x00\\x13\\x00\\x11\\x00\\x00\\x0esmtp.gmail.com\\x00\n\\x00\\x06\\x00\\x04\\x00\\x17\\x00\\x18\\x00\\x0b\\x00\\x02\\x01\\x00\\x16\\x03\\x01\\x00F\\x10\\x00\\x00BA\\x04\\x06IN\\x03\\xc5\\x80A\\x86/\\xad\\xf5W\\xd8\\x9d\\xe3\\xac\\xc2\\xf2Z\\xd8\\xf9\\x03\\x13\\xa4\\x8d\\x13\\xea\\xff\\xca)\\xc8\\xfbl\\x17\\xaf\\xc6Q\\xf5\\x82\\xde\\x9d\\x97*\\xb4\\xb7\\x92\\x92I\\xc0\\xf2\\xec\\xf1\\xb6\\xa3\\xc5\\xbej\\xe5*2\\xde\\xef\\x14\\x03\\x01\\x00\\x01\\x01\\x16\\x03\\x01\\x000~\n@\\x0c8\\xe4\\xd2\\x907\\x90\\xcc\\x19\\x00\\xb9\\xda.T\\xb5\\xa4\\xe61B\\xa9\\xd8\\x03w\\xcf@\\xb4\\xab\\xbdeB\\x00\\xb4x\\xe7>\\x13\\xa6\n\\x08\\xf7_\\xd2\\x8f\\xfa4\\x17\\x03\\x01\\x000\\xd5\\x1f\\xed\\xe1\\x05\\xa2\\xcc\\x14`brL\\x19\r\\xc9\\xd4\\xa3\\xf8\\x85BH\\x19\"\\x88\\xc1Q\t\\x03\\x15K\\x8b9\\xda\\xd2wqc%\\xbb\\xa8\\x17pODT\\\\x17\\x03\\x01\\x00@@D)\\x0b?\\xb0\\xa3\t\\x94\\xa5t\\xf2+\\x1e\\x9e\\xc0M\\x7f7l\\x01\n\\xc8\\x16\\xf0Z\\x11\\xe5\\xae\\xe6sz\\xed\\x89S0|\\xb7\\xfc\\x07\\x13\\xea\\x02\\x1f\\xc0\\xe2\\x8b\\x9a\\x87bN\\xe3\\xa8\\xe4\\xbf\\xd3\\xe1k\\xb5t\\xee\\x17\\x03\\x01\\x000\\xc5'\\x94\\x07\\xa7A\\xdb\n\\x98\\x9c\\x05zT\\x8fmP\\x9f\\x19@\\x7f\\xc9\\xb2s!(\\x95\\xb7\\x8aM\\xf5\\xc14\\xc3n\\xac\\xc2\\xf4\\xd6Z\\x89#\\xac\\xc7\\x1b\\xe0\\xa5\\x10u\\x17\\x03\\x01\\x00@\\x17\\xb1\\xd7\\x879\\xb9H\\xb5\\xb7\\xe7\\xa2y\\x07\\xf8S\\x9e4\\xc6\\xb1u\\xa1B\\xe7\\x1f\\xe2\\xc0\\x16\\xc1\\xe8\\x02^\\xfb9J\\xef\\xadl\r\\xd1\\x80\\xe7Nw\\xcd\\x98\\xa6\\xdc\\xc7\\x16\\xa7\\xe1\\xeb\\x94\\xb7\\xbc<<\"\\x82Y%\\x85EHLO Host\r\nSTARTTLS\r\n\\x16\\x03\\x01\\x00q\\x01\\x00\\x00m\\x03\\x01/e\\xe6\\xb3\\xff\\xa2\\x02\\xf3\\xca\\xa6&\\xdc\\xec\\xbd`<K\\xdf\\x8e\\x1d\\xedU\\xac\\xc9\r\\xa3G\\x82\\xf9\\xbaP\\x00\\x00\\x18\\x00/\\x005\\x00\\x05\\x00\n\\xc0\\x13\\xc0\\x14\\xc0\t\\xc0\n\\x002\\x008\\x00\\x13\\x00\\x04\\x01\\x00\\x00,\\xff\\x01\\x00\\x01\\x00\\x00\\x00\\x00\\x13\\x00\\x11\\x00\\x00\\x0esmtp.gmail.com\\x00\n\\x00\\x06\\x00\\x04\\x00\\x17\\x00\\x18\\x00\\x0b\\x00\\x02\\x01\\x00\\x16\\x03\\x01\\x00F\\x10\\x00\\x00BA\\x04l\\xfaL\\xee\\xe2\\x82\\xe6\\x08o\\xbe\\x83\\x9a\\x06\\x92\\xb3\\x82|\\xda\\x0fi\\xf0\\x7f\\xfa\\x1b\\x9b\\xd1g(\\x80\\x0e\\xae\\xd9'p\\x11\\xac^\\xdaQ\\x1e\\xd5\n\\x1aS\\xc2s\\xdbg\\xbdn\\x04\\xa2\\xb7\\xf5\\x94$+b(P\\xe8\\x14\\x03\\x01\\x00\\x01\\x01\\x16\\x03\\x01\\x000\\xdf\\xac\\xdb\\x05@\\xd0W\\xf5\\x07/m\\xf1\\x1e\\xbb!Z\\xb5\\xa7\\x12\\xab\\xdbM\\x1f\\x08\\x1a\\x1d\\xca\\x11\\xd8\\x9d\\xf9\\xb7\\xfe\\xd4`Bh6\\xbc\\xb9\\x93(V\\xcc\\x0f\\x17\\x03\\x01\\x000U\\xa6\\xdc\\xda\\xf7\\x08\\\\xb1:\\x99\\xe9\\x0f7\\xe9\\x9b\\xa0\\x1c\\xa7y\\xa8LB\\xc0\\x0f\\xc6\\xf6U\\xd3:\\xb1\\xaa\\xee\\xceFc\\x01\\xbf\\xa0\\xe0\\x8ey\\xab\\x9a\\x94\\xdc\\x02a\\x98\\x17\\x03\\x01\\x00@\"N\\xe6P\\xba\\xb7>\\x1an\\xb1H\\xa8n+\n\\xc5\\x14\\xd5h/\\xc6N\\xb8\\xbbnDW\\x0e\\x89\\xf9mj\\xfcV\\x0cS~\\xe7j\\xa0\\xff\\x89\\xf2g\\x02i\\xe7B*\\x8fD\\xe8\\xa5g\\xf7?\\xd7\\x02\\xfe\\xb3\\xa2\\xe4^\\x17\\x03\\x01\\x000\\x9d\\x86\\xec\\xb5\\x11\\x95\\x01\\xad\\x9a\\xa8;I\\x94p1.\\x99\\x0c\\x9f!\\xf4\\x04\\xbc\\xa2\\x80\\xdf\\xcfl\\x03\\x89\\xcf\\xa8\\xcc\\x8e\\xe5\\x8d\\xeb\\xf0\\x1a\\x95L3\\xb5\\xa7\\xb5\\xce\\xaa\\xf8\\x17\\x03\\x01\\x00@\\x96y\\xe4y\\xf2\\x98^\\x02B\\xb0-\\xe0\\xf5\\x1f\\xed\\xb1\\xf3$2G\\xe1\\xc9\\x11\\x94\\x8e4\\x82\\x97nP\\xa2\\xc7\\x03\\x017\\x928\\xcd2,\\x88\\xb7\\xed\\x1aR\\x00\\xcf\\xf7O\\x0b\\xf1 \\xc6u^f\t\\xb0\\x8eJ\\xd7SI",
  506. "dst": "209.85.232.108"
  507.  
  508.  
  509.  
  510. * Network Communication - Hosts:
  511.  
  512. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement