Source: | Binary string: f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb! source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Downloads\hwid-spoofer-master\hwid-spoofer-master\x64\Release\hwid_spoofer.pdbGCTL source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Desktop\hwid-master\hwid-master\User\x64\Release\User.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: ak3o7AZ3mH.exe, 00000000.00000002.1583401890.00007FF6907AF000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: C:\Users\rapha\Downloads\Driver-HWID-btbd-modified-main\x64\Release\Kernel.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: rea de Trabalho\hwid-info-ReFo\x64\Release\hwid_info.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Desktop\NULL-CPP-SPOOFER-eeadd136b6993638016e3a5ee6bc267ab266943c\NULL-CPP-SPOOFER-eeadd136b6993638016e3a5ee6bc267ab266943c\NullSubwoofer\x64\Release\NullDriver.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\nicov\OneDrive\Desktop\Vanity Premium Sp00fer\Kernelmode\build\bin\Kernelmode.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1583401890.00007FF6907AF000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: pia\bin\x64\Release\net6.0\win-x64\native\AridekVM.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Downloads\hwid-spoofer-master\hwid-spoofer-master\x64\Release\hwid_spoofer.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Downloads\KDU-1.2.7\KDU-1.2.7\Source\Hamakaze\output\x64\Release\kdu.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\Yhome\source\repos\Gdrv-Loader-Updated\bin\gdrvloader.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://.css |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://.jpg |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl.thawte.com/ThawtePCA.crl0 |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0 |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://cs-g2-crl.thawte.com/ThawteCSG2.crl0 |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://html4/loose.dtd |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1580197827.0000024C0C281000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://keyauth.win:443/Pe |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.thawte.com0 |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/ |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/0DataContractXmlNamespacedhttp://schemas.datacontract.org/20 |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.Collections.Generic |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.Collections.GenericS |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.IO |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.Runtime.SerializationBISerializableFactoryTypeLocalNa |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.ThrowHelperArgumentNull |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/System.Xml |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name(DefaultRoleClaimTypexhttp://schemas.micro |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0 |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0( |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://ts-ocsp.ws.symantec.com07 |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/GlobalizationInvariantMode |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/binaryformatter |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/dotnet-illink/com |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/dotnet-illink/nativehost |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/dotnet-warnings/ |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://aridekvm.us/files/aridekvm.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://github.com/dotnet/runtime |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.0/ |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1463162075.0000024C0A6F0000.00000004.00001000.00020000.00000000.sdmp, ak3o7AZ3mH.exe, 00000000.00000002.1582876978.00007FF6902F0000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: https://keyauth.win/api/1.1/ |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vssadmin delete shadows /All /Quiet |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: \\.\%c:%c:\Windows\System32\restore\MachineGuid.txt%c:\Users\Public\Libraries\collection.dat%c:\System Volume Information\IndexerVolumeGuid%c:\System Volume Information\WPSettings.dat%c:\System Volume Information\tracking.log%c:\ProgramData\Microsoft\Windows\WER%c:\Users\Public\Shared Files%c:\Windows\INF\setupapi.dev.log%c:\Windows\INF\setupapi.setup.log%c:\Users\Public\Libraries%c:\MSOCache%c:\ProgramData\ntuser.pol%c:\Users\Default\NTUSER.DAT%c:\Recovery\ntuser.sys%c:\desktop.ini%c:\Windows\Prefetch\*%c:\Windows\Prefetch\%ws%c:\Users\*%c:\Users\%ws\*ntuser%c:\Users\%ws\%ws%c:\Usersdesktop.inifsutil usn deletejournal /d %c:vssadmin delete shadows /All /QuietWmiPrvSE.exeKilled Winmgmt |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: vssadmin delete shadows /All /Quiet |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: \\.\%c:%c:\Windows\System32\restore\MachineGuid.txt%c:\Users\Public\Libraries\collection.dat%c:\System Volume Information\IndexerVolumeGuid%c:\System Volume Information\WPSettings.dat%c:\System Volume Information\tracking.log%c:\ProgramData\Microsoft\Windows\WER%c:\Users\Public\Shared Files%c:\Windows\INF\setupapi.dev.log%c:\Windows\INF\setupapi.setup.log%c:\Users\Public\Libraries%c:\MSOCache%c:\ProgramData\ntuser.pol%c:\Users\Default\NTUSER.DAT%c:\Recovery\ntuser.sys%c:\desktop.ini%c:\Windows\Prefetch\*%c:\Windows\Prefetch\%ws%c:\Users\*%c:\Users\%ws\*ntuser%c:\Users\%ws\%ws%c:\Usersdesktop.inifsutil usn deletejournal /d %c:vssadmin delete shadows /All /QuietWmiPrvSE.exeKilled Winmgmt |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameTanikaze.dll( vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameHamakaze.exe( vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamegdrv.sysf# vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1463575601.0000024C0A5B0000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameAridekVM.dll2 vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1583130919.00007FF6903A9000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameAridekVM.dll2 vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000000.1436773073.00007FF690497000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameAridekVM.dll2 vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameTanikaze.dll( vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameHamakaze.exe( vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp | Binary or memory string: OriginalFilenamegdrv.sysf# vs ak3o7AZ3mH.exe |
Source: ak3o7AZ3mH.exe | Binary or memory string: OriginalFilenameAridekVM.dll2 vs ak3o7AZ3mH.exe |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: icu.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: wshunix.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: | Binary string: f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb! source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Downloads\hwid-spoofer-master\hwid-spoofer-master\x64\Release\hwid_spoofer.pdbGCTL source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Desktop\hwid-master\hwid-master\User\x64\Release\User.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: ak3o7AZ3mH.exe, 00000000.00000002.1583401890.00007FF6907AF000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: C:\Users\rapha\Downloads\Driver-HWID-btbd-modified-main\x64\Release\Kernel.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: rea de Trabalho\hwid-info-ReFo\x64\Release\hwid_info.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Desktop\NULL-CPP-SPOOFER-eeadd136b6993638016e3a5ee6bc267ab266943c\NULL-CPP-SPOOFER-eeadd136b6993638016e3a5ee6bc267ab266943c\NullSubwoofer\x64\Release\NullDriver.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\nicov\OneDrive\Desktop\Vanity Premium Sp00fer\Kernelmode\build\bin\Kernelmode.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1583401890.00007FF6907AF000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: pia\bin\x64\Release\net6.0\win-x64\native\AridekVM.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68FF10000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0CD5A000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Downloads\hwid-spoofer-master\hwid-spoofer-master\x64\Release\hwid_spoofer.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\rapha\Downloads\KDU-1.2.7\KDU-1.2.7\Source\Hamakaze\output\x64\Release\kdu.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\Yhome\source\repos\Gdrv-Loader-Updated\bin\gdrvloader.pdb source: ak3o7AZ3mH.exe, 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, ak3o7AZ3mH.exe, 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp |
Source: ak3o7AZ3mH.exe | Static PE information: section name: |
Source: ak3o7AZ3mH.exe | Static PE information: section name: |
Source: ak3o7AZ3mH.exe | Static PE information: section name: |
Source: ak3o7AZ3mH.exe | Static PE information: section name: |
Source: ak3o7AZ3mH.exe | Static PE information: section name: |
Source: ak3o7AZ3mH.exe | Static PE information: section name: |
Source: ak3o7AZ3mH.exe | Static PE information: section name: |
Source: ak3o7AZ3mH.exe | Static PE information: section name: |
Source: ak3o7AZ3mH.exe | Static PE information: section name: .exports |
Source: ak3o7AZ3mH.exe | Static PE information: section name: .imports |
Source: ak3o7AZ3mH.exe | Static PE information: section name: .themida |
Source: ak3o7AZ3mH.exe | Static PE information: section name: .boot |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: Amcache.hve.5.dr | Binary or memory string: VMware |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.5.dr | Binary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.5.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.5.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.5.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: ak3o7AZ3mH.exe, 00000000.00000002.1579814514.0000024C0A647000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.5.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.5.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.5.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.5.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.5.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.5.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.5.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.5.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.5.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Open window title or class name: regmonclass |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Open window title or class name: process monitor - sysinternals: www.sysinternals.com |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Open window title or class name: procmon_window_class |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Open window title or class name: registry monitor - sysinternals: www.sysinternals.com |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Open window title or class name: filemonclass |
Source: C:\Users\user\Desktop\ak3o7AZ3mH.exe | Open window title or class name: file monitor - sysinternals: www.sysinternals.com |
Source: Yara match | File source: 0.3.ak3o7AZ3mH.exe.24c0c4956ec.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.ak3o7AZ3mH.exe.7ff68f64b6ec.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.ak3o7AZ3mH.exe.24c0c45eae7.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.3.ak3o7AZ3mH.exe.24c0c59a2f1.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.ak3o7AZ3mH.exe.7ff68f7502f1.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.ak3o7AZ3mH.exe.7ff68f614ae7.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.ak3o7AZ3mH.exe.7ff68ec80000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.1581399019.00007FF68F436000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.1461934912.0000024C0C280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ak3o7AZ3mH.exe PID: 4080, type: MEMORYSTR |