Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack |
Malware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "cbea22e5-f897-4039-a352-cfbfd96f", "Group": "chase1", "Domain1": "45.137.22.50", "Domain2": "127.0.0.1", "Port": 4557, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"} |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49742 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49747 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49748 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49751 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49753 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49754 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49758 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49768 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49769 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49775 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49776 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49777 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49778 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49779 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49781 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49783 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49784 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49785 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49786 -> 45.137.22.50:4557 |
Source: Traffic |
Snort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49787 -> 45.137.22.50:4557 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 45.137.22.50 |
Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORY |
Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORY |
Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE |
Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE |
Matched rule: Detetcs the Nanocore RAT Author: Florian Roth |
Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE |
Matched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net> |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_00BD6C06 |
0_2_00BD6C06 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_05536F68 |
0_2_05536F68 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_055372F0 |
0_2_055372F0 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_05538491 |
0_2_05538491 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_05538718 |
0_2_05538718 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_055383F0 |
0_2_055383F0 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_0553EB38 |
0_2_0553EB38 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_0553D558 |
0_2_0553D558 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_0553D548 |
0_2_0553D548 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_05537348 |
0_2_05537348 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_0553738D |
0_2_0553738D |
Source: C:\Users\user\Desktop\note-mxm.exe |
Code function: 0_2_05537840 |
0_2_05537840 |
Source: note-mxm.exe, 00000000.00000002.670586898.00000000014A9000.00000004.00000020.sdmp |
Binary or memory string: OriginalFilenameSeekOrigin.exeP vs note-mxm.exe |
Source: note-mxm.exe, 00000000.00000002.672562684.000000000413E000.00000004.00000001.sdmp |
Binary or memory string: OriginalFilenameDSASignature.dll@ vs note-mxm.exe |
Source: note-mxm.exe, 00000000.00000002.676279917.000000000BF20000.00000002.00000001.sdmp |
Binary or memory string: System.OriginalFileName vs note-mxm.exe |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: OriginalFilenameSimpleUI.dll( vs note-mxm.exe |
Source: note-mxm.exe, 00000000.00000002.670401401.00000000013DA000.00000004.00000020.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs note-mxm.exe |
Source: note-mxm.exe, 00000005.00000003.672190079.0000000006D32000.00000004.00000001.sdmp |
Binary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs note-mxm.exe |
Source: note-mxm.exe, 00000005.00000000.663314117.0000000000F02000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameSeekOrigin.exeP vs note-mxm.exe |
Source: note-mxm.exe |
Binary or memory string: OriginalFilenameSeekOrigin.exeP vs note-mxm.exe |
Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORY |
Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 00000000.00000002.671855765.0000000003F79000.00000004.00000001.sdmp, type: MEMORY |
Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.note-mxm.exe.40870d0.2.raw.unpack, type: UNPACKEDPE |
Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE |
Matched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ |
Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE |
Matched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.note-mxm.exe.40870d0.2.unpack, type: UNPACKEDPE |
Matched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: Select * from Clientes WHERE id=@id;; |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data); |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: Select * from SecurityLogonType WHERE id=@id; |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo; |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade); |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone); |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data); |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor); |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo) |
Source: unknown |
Process created: C:\Users\user\Desktop\note-mxm.exe 'C:\Users\user\Desktop\note-mxm.exe' |
|
Source: C:\Users\user\Desktop\note-mxm.exe |
Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp' |
|
Source: C:\Windows\SysWOW64\schtasks.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\note-mxm.exe |
Process created: C:\Users\user\Desktop\note-mxm.exe C:\Users\user\Desktop\note-mxm.exe |
|
Source: C:\Users\user\Desktop\note-mxm.exe |
Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\fGAhpbrTQZcHeY' /XML 'C:\Users\user\AppData\Local\Temp\tmp943B.tmp' |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process created: C:\Users\user\Desktop\note-mxm.exe C:\Users\user\Desktop\note-mxm.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: vmware |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath " |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: VMWARE |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: VMware SVGA II |
Source: note-mxm.exe, 00000000.00000002.670714258.0000000002FBA000.00000004.00000001.sdmp |
Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000 |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Users\user\Desktop\note-mxm.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Users\user\Desktop\note-mxm.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct |
Source: C:\Users\user\Desktop\note-mxm.exe |
WMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct |