Source: jkj.exe, 00000002.00000002.499467282.0000000002D01000.00000004.00000001.sdmp |
String found in binary or memory: http://127.0.0.1:HTTP/1.1 |
Source: jkj.exe, 00000002.00000002.499467282.0000000002D01000.00000004.00000001.sdmp |
String found in binary or memory: http://DynDns.comDynDNS |
Source: jkj.exe, 00000002.00000002.499467282.0000000002D01000.00000004.00000001.sdmp |
String found in binary or memory: http://lDWAxa.com |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: jkj.exe, 00000002.00000002.501100641.0000000002FAF000.00000004.00000001.sdmp |
String found in binary or memory: http://us2.smtp.mailhostbox.com |
Source: jkj.exe |
String found in binary or memory: http://vbcity.com/forums/t/51894.aspx |
Source: jkj.exe |
String found in binary or memory: https://github.com/MrCylops |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
String found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css |
Source: jkj.exe, 00000002.00000002.501073952.0000000002FA9000.00000004.00000001.sdmp, jkj.exe, 00000002.00000002.501100641.0000000002FAF000.00000004.00000001.sdmp, jkj.exe, 00000002.00000002.499467282.0000000002D01000.00000004.00000001.sdmp, jkj.exe, 00000002.00000002.500942585.0000000002F6E000.00000004.00000001.sdmp |
String found in binary or memory: https://woZnmpjv3WDVYC.net |
Source: jkj.exe, 00000000.00000002.242218894.0000000004289000.00000004.00000001.sdmp, jkj.exe, 00000002.00000002.496080669.0000000000402000.00000040.00000001.sdmp |
String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip |
Source: jkj.exe, 00000002.00000002.499467282.0000000002D01000.00000004.00000001.sdmp |
String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 0_2_0312C2B0 |
0_2_0312C2B0 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 0_2_03129990 |
0_2_03129990 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_00F2B498 |
2_2_00F2B498 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_00F25200 |
2_2_00F25200 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_00F26470 |
2_2_00F26470 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012C110E |
2_2_012C110E |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012C5B68 |
2_2_012C5B68 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012C0FE8 |
2_2_012C0FE8 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012CAE98 |
2_2_012CAE98 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012C99B8 |
2_2_012C99B8 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012C6318 |
2_2_012C6318 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012C0310 |
2_2_012C0310 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012C63B8 |
2_2_012C63B8 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012CE238 |
2_2_012CE238 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_012C9A18 |
2_2_012C9A18 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_02CC46A0 |
2_2_02CC46A0 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_02CC35AE |
2_2_02CC35AE |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_02CC4672 |
2_2_02CC4672 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_02CC5392 |
2_2_02CC5392 |
Source: C:\Users\user\Desktop\jkj.exe |
Code function: 2_2_02CCDA00 |
2_2_02CCDA00 |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: OriginalFilenameSimpleUI.dll( vs jkj.exe |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: OriginalFilenameZYwGteJVgFXSnvZzvhPVYhghGRH.exe4 vs jkj.exe |
Source: jkj.exe, 00000000.00000003.233786860.00000000043DD000.00000004.00000001.sdmp |
Binary or memory string: OriginalFilenameDSASignature.dll@ vs jkj.exe |
Source: jkj.exe, 00000000.00000000.228090436.0000000000F98000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameRuntimeMethodInfo.exe> vs jkj.exe |
Source: jkj.exe, 00000001.00000000.235506598.0000000000118000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameRuntimeMethodInfo.exe> vs jkj.exe |
Source: jkj.exe, 00000002.00000002.496793189.0000000000BE8000.00000004.00000001.sdmp |
Binary or memory string: OriginalFilenameUNKNOWN_FILET vs jkj.exe |
Source: jkj.exe, 00000002.00000002.496080669.0000000000402000.00000040.00000001.sdmp |
Binary or memory string: OriginalFilenameZYwGteJVgFXSnvZzvhPVYhghGRH.exe4 vs jkj.exe |
Source: jkj.exe, 00000002.00000002.496712907.0000000000A58000.00000002.00020000.sdmp |
Binary or memory string: OriginalFilenameRuntimeMethodInfo.exe> vs jkj.exe |
Source: jkj.exe, 00000002.00000002.498271905.000000000111A000.00000004.00000020.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs jkj.exe |
Source: jkj.exe, 00000002.00000002.498837681.0000000001210000.00000002.00000001.sdmp |
Binary or memory string: OriginalFilenamemscorrc.dllT vs jkj.exe |
Source: jkj.exe |
Binary or memory string: OriginalFilenameRuntimeMethodInfo.exe> vs jkj.exe |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: Select * from Clientes WHERE id=@id;; |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data); |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: Select * from SecurityLogonType WHERE id=@id; |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo; |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade); |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone); |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data); |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor); |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo) |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: vmware |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath " |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: VMWARE |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: VMware SVGA II |
Source: jkj.exe, 00000000.00000002.239111016.0000000003281000.00000004.00000001.sdmp |
Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000 |
Source: jkj.exe, 00000002.00000002.505607331.00000000069C0000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: jkj.exe, Memory.cs |
Reference to suspicious API methods: ('WriteProcessMemory', 'WriteProcessMemory@kernel32.dll'), ('ReadProcessMemory', 'ReadProcessMemory@kernel32.dll') |
Source: jkj.exe, ProcessClass.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: 0.0.jkj.exe.ec0000.0.unpack, Memory.cs |
Reference to suspicious API methods: ('WriteProcessMemory', 'WriteProcessMemory@kernel32.dll'), ('ReadProcessMemory', 'ReadProcessMemory@kernel32.dll') |
Source: 0.0.jkj.exe.ec0000.0.unpack, ProcessClass.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: 0.2.jkj.exe.ec0000.0.unpack, Memory.cs |
Reference to suspicious API methods: ('WriteProcessMemory', 'WriteProcessMemory@kernel32.dll'), ('ReadProcessMemory', 'ReadProcessMemory@kernel32.dll') |
Source: 0.2.jkj.exe.ec0000.0.unpack, ProcessClass.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: 1.2.jkj.exe.40000.0.unpack, Memory.cs |
Reference to suspicious API methods: ('WriteProcessMemory', 'WriteProcessMemory@kernel32.dll'), ('ReadProcessMemory', 'ReadProcessMemory@kernel32.dll') |
Source: 1.2.jkj.exe.40000.0.unpack, ProcessClass.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: 1.0.jkj.exe.40000.0.unpack, Memory.cs |
Reference to suspicious API methods: ('WriteProcessMemory', 'WriteProcessMemory@kernel32.dll'), ('ReadProcessMemory', 'ReadProcessMemory@kernel32.dll') |
Source: 1.0.jkj.exe.40000.0.unpack, ProcessClass.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: 2.2.jkj.exe.400000.0.unpack, A/b2.cs |
Reference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll') |
Source: 2.2.jkj.exe.980000.1.unpack, Memory.cs |
Reference to suspicious API methods: ('WriteProcessMemory', 'WriteProcessMemory@kernel32.dll'), ('ReadProcessMemory', 'ReadProcessMemory@kernel32.dll') |
Source: 2.2.jkj.exe.980000.1.unpack, ProcessClass.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: 2.0.jkj.exe.980000.0.unpack, Memory.cs |
Reference to suspicious API methods: ('WriteProcessMemory', 'WriteProcessMemory@kernel32.dll'), ('ReadProcessMemory', 'ReadProcessMemory@kernel32.dll') |
Source: 2.0.jkj.exe.980000.0.unpack, ProcessClass.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: jkj.exe, 00000002.00000002.499038696.00000000016A0000.00000002.00000001.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: jkj.exe, 00000002.00000002.499038696.00000000016A0000.00000002.00000001.sdmp |
Binary or memory string: Progman |
Source: jkj.exe, 00000002.00000002.499038696.00000000016A0000.00000002.00000001.sdmp |
Binary or memory string: SProgram Managerl |
Source: jkj.exe, 00000002.00000002.499038696.00000000016A0000.00000002.00000001.sdmp |
Binary or memory string: Shell_TrayWnd, |
Source: jkj.exe, 00000002.00000002.499038696.00000000016A0000.00000002.00000001.sdmp |
Binary or memory string: Progmanlock |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Users\user\Desktop\jkj.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Users\user\Desktop\jkj.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\jkj.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation |
Jump to behavior |
Source: Yara match |
File source: 00000002.00000002.496080669.0000000000402000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.242218894.0000000004289000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: jkj.exe PID: 5768, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: jkj.exe PID: 6092, type: MEMORY |
Source: Yara match |
File source: 2.2.jkj.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.jkj.exe.445e700.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.jkj.exe.445e700.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.jkj.exe.431e450.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000002.00000002.496080669.0000000000402000.00000040.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.242218894.0000000004289000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: jkj.exe PID: 5768, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: jkj.exe PID: 6092, type: MEMORY |
Source: Yara match |
File source: 2.2.jkj.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.jkj.exe.445e700.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.jkj.exe.445e700.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.jkj.exe.431e450.3.raw.unpack, type: UNPACKEDPE |