Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000002.485148988.0000000003450000.00000004.00000001.sdmp | String found in binary or memory: http://107.170.146.252:8080/FzxV1tcYAXWJ/49nleX/mnwI0BZz7GFzEpyb4FJ/ |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000002.486301037.0000000003626000.00000004.00000001.sdmp | String found in binary or memory: http://167.114.153.111:8080/Gjg6VQQfQODeFKh5/ipksxZysj4/Y3BzlSWrxu2eNy/ |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000002.486301037.0000000003626000.00000004.00000001.sdmp | String found in binary or memory: http://167.114.153.111:8080/Gjg6VQQfQODeFKh5/ipksxZysj4/Y3BzlSWrxu2eNy/7 |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000003.341262791.0000000003627000.00000004.00000001.sdmp | String found in binary or memory: http://88.153.35.32/C2AWX/0IcMqQll94L/ |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000003.341262791.0000000003627000.00000004.00000001.sdmp | String found in binary or memory: http://88.153.35.32/C2AWX/0IcMqQll94L/7 |
Source: svchost.exe, 00000003.00000002.484487790.0000028B6F612000.00000004.00000001.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: svchost.exe, 00000003.00000002.484487790.0000028B6F612000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: svchost.exe, 00000003.00000002.484568656.0000028B6F63D000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: svchost.exe, 0000000B.00000002.312330349.0000015EE0C13000.00000004.00000001.sdmp | String found in binary or memory: http://www.bingmapsportal.com |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://%s.dnet.xboxlive.com |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://%s.xboxlive.com |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://activity.windows.com |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 0000000B.00000003.312047109.0000015EE0C5A000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 0000000B.00000002.312388605.0000015EE0C4E000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations |
Source: svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 0000000B.00000003.312073422.0000015EE0C41000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 0000000B.00000003.312073422.0000015EE0C41000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n= |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 0000000B.00000002.312395961.0000015EE0C5C000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 0000000B.00000003.312047109.0000015EE0C5A000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 0000000B.00000002.312395961.0000015EE0C5C000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 0000000B.00000002.312395961.0000015EE0C5C000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 0000000B.00000002.312405048.0000015EE0C64000.00000004.00000001.sdmp, svchost.exe, 0000000B.00000003.312069072.0000015EE0C45000.00000004.00000001.sdmp, svchost.exe, 0000000B.00000003.312047109.0000015EE0C5A000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 0000000B.00000003.290284677.0000015EE0C31000.00000004.00000001.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000003.341262791.0000000003627000.00000004.00000001.sdmp | String found in binary or memory: https://fs.microsoft.c |
Source: svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 0000000B.00000002.312330349.0000015EE0C13000.00000004.00000001.sdmp, svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 0000000B.00000003.312069072.0000015EE0C45000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 0000000B.00000003.312069072.0000015EE0C45000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Source: svchost.exe, 0000000B.00000003.290284677.0000015EE0C31000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= |
Source: svchost.exe, 0000000B.00000002.312366257.0000015EE0C3A000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 0000000B.00000002.312330349.0000015EE0C13000.00000004.00000001.sdmp | String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000002.485148988.0000000003450000.00000004.00000001.sdmp | String found in binary or memory: http://107.170.146.252:8080/FzxV1tcYAXWJ/49nleX/mnwI0BZz7GFzEpyb4FJ/ |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000002.486301037.0000000003626000.00000004.00000001.sdmp | String found in binary or memory: http://167.114.153.111:8080/Gjg6VQQfQODeFKh5/ipksxZysj4/Y3BzlSWrxu2eNy/ |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000002.486301037.0000000003626000.00000004.00000001.sdmp | String found in binary or memory: http://167.114.153.111:8080/Gjg6VQQfQODeFKh5/ipksxZysj4/Y3BzlSWrxu2eNy/7 |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000003.341262791.0000000003627000.00000004.00000001.sdmp | String found in binary or memory: http://88.153.35.32/C2AWX/0IcMqQll94L/ |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000003.341262791.0000000003627000.00000004.00000001.sdmp | String found in binary or memory: http://88.153.35.32/C2AWX/0IcMqQll94L/7 |
Source: svchost.exe, 00000003.00000002.484487790.0000028B6F612000.00000004.00000001.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: svchost.exe, 00000003.00000002.484487790.0000028B6F612000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: svchost.exe, 00000003.00000002.484568656.0000028B6F63D000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: svchost.exe, 0000000B.00000002.312330349.0000015EE0C13000.00000004.00000001.sdmp | String found in binary or memory: http://www.bingmapsportal.com |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://%s.dnet.xboxlive.com |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://%s.xboxlive.com |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://activity.windows.com |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 00000008.00000002.481945367.0000026800640000.00000004.00000001.sdmp | String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 0000000B.00000003.312047109.0000015EE0C5A000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 0000000B.00000002.312388605.0000015EE0C4E000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations |
Source: svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 0000000B.00000003.312073422.0000015EE0C41000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 0000000B.00000003.312073422.0000015EE0C41000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n= |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 0000000B.00000002.312395961.0000015EE0C5C000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 0000000B.00000003.312047109.0000015EE0C5A000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 0000000B.00000002.312395961.0000015EE0C5C000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 0000000B.00000002.312395961.0000015EE0C5C000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 0000000B.00000002.312405048.0000015EE0C64000.00000004.00000001.sdmp, svchost.exe, 0000000B.00000003.312069072.0000015EE0C45000.00000004.00000001.sdmp, svchost.exe, 0000000B.00000003.312047109.0000015EE0C5A000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 0000000B.00000003.312039038.0000015EE0C5F000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 0000000B.00000003.290284677.0000015EE0C31000.00000004.00000001.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000003.341262791.0000000003627000.00000004.00000001.sdmp | String found in binary or memory: https://fs.microsoft.c |
Source: svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 0000000B.00000002.312330349.0000015EE0C13000.00000004.00000001.sdmp, svchost.exe, 0000000B.00000002.312371583.0000015EE0C3D000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 0000000B.00000003.312069072.0000015EE0C45000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 0000000B.00000003.312069072.0000015EE0C45000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Source: svchost.exe, 0000000B.00000003.290284677.0000015EE0C31000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= |
Source: svchost.exe, 0000000B.00000002.312366257.0000015EE0C3A000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 0000000B.00000002.312330349.0000015EE0C13000.00000004.00000001.sdmp | String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_00451D80 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A8240 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A3F20 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A7740 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A3BA0 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A1C70 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A6530 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A3D10 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_00451D80 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A8240 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A3F20 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A7740 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A3BA0 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A1C70 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A6530 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A3D10 |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF8240 |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF3BA0 |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF3F20 |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF6530 |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF3D10 |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF1C70 |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF7740 |
Source: unknown | Process created: C:\Users\user\Desktop\5e8fYZ8TM6.exe 'C:\Users\user\Desktop\5e8fYZ8TM6.exe' |
Source: unknown | Process created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288 |
Source: unknown | Process created: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p |
Source: unknown | Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc |
Source: unknown | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process created: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Source: unknown | Process created: C:\Users\user\Desktop\5e8fYZ8TM6.exe 'C:\Users\user\Desktop\5e8fYZ8TM6.exe' |
Source: unknown | Process created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288 |
Source: unknown | Process created: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p |
Source: unknown | Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc |
Source: unknown | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288 |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process created: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_0040C8B4 push es; retf |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_0040C915 push ds; iretd |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5E10 push ecx; mov dword ptr [esp], 0000F5B3h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5EA0 push ecx; mov dword ptr [esp], 0000A3FDh |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5EF0 push ecx; mov dword ptr [esp], 0000669Ch |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5F20 push ecx; mov dword ptr [esp], 0000E36Ch |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5CD0 push ecx; mov dword ptr [esp], 00001CE1h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5D20 push ecx; mov dword ptr [esp], 0000C5A1h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5D00 push ecx; mov dword ptr [esp], 00001F9Eh |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5D50 push ecx; mov dword ptr [esp], 00006847h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5D90 push ecx; mov dword ptr [esp], 0000B2E0h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5DF0 push ecx; mov dword ptr [esp], 0000AAF5h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5DC0 push ecx; mov dword ptr [esp], 000089FAh |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_0040C8B4 push es; retf |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_0040C915 push ds; iretd |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5E10 push ecx; mov dword ptr [esp], 0000F5B3h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5EA0 push ecx; mov dword ptr [esp], 0000A3FDh |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5EF0 push ecx; mov dword ptr [esp], 0000669Ch |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5F20 push ecx; mov dword ptr [esp], 0000E36Ch |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5CD0 push ecx; mov dword ptr [esp], 00001CE1h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5D20 push ecx; mov dword ptr [esp], 0000C5A1h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5D00 push ecx; mov dword ptr [esp], 00001F9Eh |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5D50 push ecx; mov dword ptr [esp], 00006847h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5D90 push ecx; mov dword ptr [esp], 0000B2E0h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5DF0 push ecx; mov dword ptr [esp], 0000AAF5h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Code function: 0_2_022A5DC0 push ecx; mov dword ptr [esp], 000089FAh |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5EA0 push ecx; mov dword ptr [esp], 0000A3FDh |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5D90 push ecx; mov dword ptr [esp], 0000B2E0h |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5DF0 push ecx; mov dword ptr [esp], 0000AAF5h |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5EF0 push ecx; mov dword ptr [esp], 0000669Ch |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5DC0 push ecx; mov dword ptr [esp], 000089FAh |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5CD0 push ecx; mov dword ptr [esp], 00001CE1h |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5D20 push ecx; mov dword ptr [esp], 0000C5A1h |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5F20 push ecx; mov dword ptr [esp], 0000E36Ch |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5D00 push ecx; mov dword ptr [esp], 00001F9Eh |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5E10 push ecx; mov dword ptr [esp], 0000F5B3h |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Code function: 2_2_02AF5D50 push ecx; mov dword ptr [esp], 00006847h |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\System32\svchost.exe | Process information set: NOOPENFILEERRORBOX |
Source: svchost.exe, 00000003.00000002.484675123.0000028B6F660000.00000004.00000001.sdmp | Binary or memory string: "@Hyper-V RAW |
Source: svchost.exe, 00000005.00000002.280073858.0000022EC5E60000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.293855513.0000025973A60000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.483871525.0000026801340000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: svchost.exe, 00000003.00000002.482245435.0000028B6A029000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW ofo |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000003.341262791.0000000003627000.00000004.00000001.sdmp, svchost.exe, 00000003.00000002.484638353.0000028B6F653000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000007.00000002.482240713.000001E91B602000.00000004.00000001.sdmp | Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000002.486279195.0000000003616000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAWHfa |
Source: svchost.exe, 00000005.00000002.280073858.0000022EC5E60000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.293855513.0000025973A60000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.483871525.0000026801340000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: svchost.exe, 00000005.00000002.280073858.0000022EC5E60000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.293855513.0000025973A60000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.483871525.0000026801340000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: svchost.exe, 00000007.00000002.482320514.000001E91B640000.00000004.00000001.sdmp, svchost.exe, 00000008.00000002.481981398.0000026800668000.00000004.00000001.sdmp, svchost.exe, 0000000A.00000002.482362022.0000029E4AE29000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000005.00000002.280073858.0000022EC5E60000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.293855513.0000025973A60000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.483871525.0000026801340000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: svchost.exe, 00000003.00000002.484675123.0000028B6F660000.00000004.00000001.sdmp | Binary or memory string: "@Hyper-V RAW |
Source: svchost.exe, 00000005.00000002.280073858.0000022EC5E60000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.293855513.0000025973A60000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.483871525.0000026801340000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: svchost.exe, 00000003.00000002.482245435.0000028B6A029000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW ofo |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000003.341262791.0000000003627000.00000004.00000001.sdmp, svchost.exe, 00000003.00000002.484638353.0000028B6F653000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000007.00000002.482240713.000001E91B602000.00000004.00000001.sdmp | Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService |
Source: SystemPropertiesDataExecutionPrevention.exe, 00000002.00000002.486279195.0000000003616000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAWHfa |
Source: svchost.exe, 00000005.00000002.280073858.0000022EC5E60000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.293855513.0000025973A60000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.483871525.0000026801340000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: svchost.exe, 00000005.00000002.280073858.0000022EC5E60000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.293855513.0000025973A60000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.483871525.0000026801340000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: svchost.exe, 00000007.00000002.482320514.000001E91B640000.00000004.00000001.sdmp, svchost.exe, 00000008.00000002.481981398.0000026800668000.00000004.00000001.sdmp, svchost.exe, 0000000A.00000002.482362022.0000029E4AE29000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000005.00000002.280073858.0000022EC5E60000.00000002.00000001.sdmp, svchost.exe, 00000006.00000002.293855513.0000025973A60000.00000002.00000001.sdmp, svchost.exe, 00000008.00000002.483871525.0000026801340000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Users\user\Desktop\5e8fYZ8TM6.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\SysWOW64\unenrollhook\SystemPropertiesDataExecutionPrevention.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation |
Source: C:\Windows\System32\svchost.exe | Queries volume information: C:\ VolumeInformation |