Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0042860E __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_004328E6 lstrlenA,FindFirstFileA,FindClose, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02233A10 _snwprintf,FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindClose,FindClose, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0042860E __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_004328E6 lstrlenA,FindFirstFileA,FindClose, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02233A10 _snwprintf,FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindClose,FindClose, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0042860E __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_004328E6 lstrlenA,FindFirstFileA,FindClose, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02253A10 _snwprintf,FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindClose,FindClose, |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp | String found in binary or memory: http://27.78.27.110:443/gy1rDFFGDGn1U/LzMTsGmA7K7RtJX/lsng6PZCgl3MlTI6Z/GenKfTjtUAV1UAC/ |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp | String found in binary or memory: http://27.78.27.110:443/gy1rDFFGDGn1U/LzMTsGmA7K7RtJX/lsng6PZCgl3MlTI6Z/GenKfTjtUAV1UAC/77) |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp, unlodctr.exe, 00000001.00000003.375609039.0000000002A11000.00000004.00000001.sdmp, unlodctr.exe, 00000001.00000002.498179084.00000000007DA000.00000004.00000020.sdmp | String found in binary or memory: http://81.241.22.161:20/Igbzc/hxbKn/ |
Source: unlodctr.exe, 00000001.00000002.498179084.00000000007DA000.00000004.00000020.sdmp | String found in binary or memory: http://81.241.22.161:20/Igbzc/hxbKn/a |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp | String found in binary or memory: http://81.241.22.161:20/Igbzc/hxbKn/em32 |
Source: unlodctr.exe, 00000001.00000002.498179084.00000000007DA000.00000004.00000020.sdmp | String found in binary or memory: http://81.241.22.161:20/Igbzc/hxbKn/n |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp | String found in binary or memory: http://91.121.200.35:8080/dj9ZibfO3/1NNVyM47rh3S61LsG96/xa4elho/w8zZgooXX/ |
Source: unlodctr.exe, 00000001.00000002.498767993.0000000002484000.00000004.00000001.sdmp | String found in binary or memory: http://91.121.200.35:8080/dj9ZibfO3/1NNVyM47rh3S61LsG96/xa4elho/w8zZgooXX/% |
Source: unlodctr.exe, 00000001.00000002.498767993.0000000002484000.00000004.00000001.sdmp | String found in binary or memory: http://91.121.200.35:8080/dj9ZibfO3/1NNVyM47rh3S61LsG96/xa4elho/w8zZgooXX/u |
Source: svchost.exe, 00000002.00000002.499478784.0000021D13414000.00000004.00000001.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: svchost.exe, 00000002.00000002.499478784.0000021D13414000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: svchost.exe, 00000002.00000002.499478784.0000021D13414000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: svchost.exe, 00000002.00000002.499728768.0000021D13630000.00000002.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. |
Source: svchost.exe, 00000007.00000002.306458625.0000019634013000.00000004.00000001.sdmp | String found in binary or memory: http://www.bingmapsportal.com |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://%s.dnet.xboxlive.com |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://%s.xboxlive.com |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://activity.windows.com |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 00000007.00000003.306126697.0000019634049000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 00000007.00000002.306497289.0000019634052000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 00000007.00000003.306152917.0000019634040000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 00000007.00000003.306152917.0000019634040000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n= |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 00000007.00000003.306152917.0000019634040000.00000004.00000001.sdmp, svchost.exe, 00000007.00000002.306531931.000001963405C000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 00000007.00000003.306126697.0000019634049000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000007.00000002.306531931.000001963405C000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000007.00000002.306531931.000001963405C000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000007.00000002.306497289.0000019634052000.00000004.00000001.sdmp, svchost.exe, 00000007.00000003.306126697.0000019634049000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000007.00000003.283845753.0000019634031000.00000004.00000001.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 00000007.00000002.306458625.0000019634013000.00000004.00000001.sdmp, svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000007.00000003.306145388.0000019634045000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000007.00000003.306145388.0000019634045000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000007.00000003.283845753.0000019634031000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= |
Source: svchost.exe, 00000007.00000002.306481032.000001963403A000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 00000007.00000002.306497289.0000019634052000.00000004.00000001.sdmp | String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp | String found in binary or memory: http://27.78.27.110:443/gy1rDFFGDGn1U/LzMTsGmA7K7RtJX/lsng6PZCgl3MlTI6Z/GenKfTjtUAV1UAC/ |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp | String found in binary or memory: http://27.78.27.110:443/gy1rDFFGDGn1U/LzMTsGmA7K7RtJX/lsng6PZCgl3MlTI6Z/GenKfTjtUAV1UAC/77) |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp, unlodctr.exe, 00000001.00000003.375609039.0000000002A11000.00000004.00000001.sdmp, unlodctr.exe, 00000001.00000002.498179084.00000000007DA000.00000004.00000020.sdmp | String found in binary or memory: http://81.241.22.161:20/Igbzc/hxbKn/ |
Source: unlodctr.exe, 00000001.00000002.498179084.00000000007DA000.00000004.00000020.sdmp | String found in binary or memory: http://81.241.22.161:20/Igbzc/hxbKn/a |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp | String found in binary or memory: http://81.241.22.161:20/Igbzc/hxbKn/em32 |
Source: unlodctr.exe, 00000001.00000002.498179084.00000000007DA000.00000004.00000020.sdmp | String found in binary or memory: http://81.241.22.161:20/Igbzc/hxbKn/n |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp | String found in binary or memory: http://91.121.200.35:8080/dj9ZibfO3/1NNVyM47rh3S61LsG96/xa4elho/w8zZgooXX/ |
Source: unlodctr.exe, 00000001.00000002.498767993.0000000002484000.00000004.00000001.sdmp | String found in binary or memory: http://91.121.200.35:8080/dj9ZibfO3/1NNVyM47rh3S61LsG96/xa4elho/w8zZgooXX/% |
Source: unlodctr.exe, 00000001.00000002.498767993.0000000002484000.00000004.00000001.sdmp | String found in binary or memory: http://91.121.200.35:8080/dj9ZibfO3/1NNVyM47rh3S61LsG96/xa4elho/w8zZgooXX/u |
Source: svchost.exe, 00000002.00000002.499478784.0000021D13414000.00000004.00000001.sdmp | String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: svchost.exe, 00000002.00000002.499478784.0000021D13414000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.digicert.com0: |
Source: svchost.exe, 00000002.00000002.499478784.0000021D13414000.00000004.00000001.sdmp | String found in binary or memory: http://ocsp.msocsp.com0 |
Source: svchost.exe, 00000002.00000002.499728768.0000021D13630000.00000002.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. |
Source: svchost.exe, 00000007.00000002.306458625.0000019634013000.00000004.00000001.sdmp | String found in binary or memory: http://www.bingmapsportal.com |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://%s.dnet.xboxlive.com |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://%s.xboxlive.com |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://activity.windows.com |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp | String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 00000007.00000003.306126697.0000019634049000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 00000007.00000002.306497289.0000019634052000.00000004.00000001.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 00000007.00000003.306152917.0000019634040000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 00000007.00000003.306152917.0000019634040000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n= |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 00000007.00000003.306152917.0000019634040000.00000004.00000001.sdmp, svchost.exe, 00000007.00000002.306531931.000001963405C000.00000004.00000001.sdmp | String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 00000007.00000003.306126697.0000019634049000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000007.00000002.306531931.000001963405C000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000007.00000002.306531931.000001963405C000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000007.00000002.306497289.0000019634052000.00000004.00000001.sdmp, svchost.exe, 00000007.00000003.306126697.0000019634049000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 00000007.00000003.306115795.000001963405F000.00000004.00000001.sdmp | String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000007.00000003.283845753.0000019634031000.00000004.00000001.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 00000007.00000002.306458625.0000019634013000.00000004.00000001.sdmp, svchost.exe, 00000007.00000002.306485018.000001963403D000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000007.00000003.306145388.0000019634045000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000007.00000003.306145388.0000019634045000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000007.00000003.283845753.0000019634031000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= |
Source: svchost.exe, 00000007.00000002.306481032.000001963403A000.00000004.00000001.sdmp | String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 00000007.00000002.306497289.0000019634052000.00000004.00000001.sdmp | String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00424554 GetKeyState,GetKeyState,GetKeyState, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0040AAE1 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00439719 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageA,ScreenToClient,GetCursorPos,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetWindowPos,SendMessageA,SendMessageA,GetParent, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0040589A SendMessageA,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00423E75 ScreenToClient,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00424554 GetKeyState,GetKeyState,GetKeyState, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0040AAE1 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00439719 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageA,ScreenToClient,GetCursorPos,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetWindowPos,SendMessageA,SendMessageA,GetParent, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0040589A SendMessageA,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00423E75 ScreenToClient,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_00424554 GetKeyState,GetKeyState,GetKeyState, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0040AAE1 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_00439719 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageA,ScreenToClient,GetCursorPos,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetWindowPos,SendMessageA,SendMessageA,GetParent, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0040589A SendMessageA,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageA, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_00423E75 ScreenToClient,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043E223 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0044E361 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0040C634 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043EA03 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0044CAE5 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043EE23 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0044D1DD |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0044360B |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043DD4E |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02238180 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02237590 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02231C70 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043E223 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0044E361 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0040C634 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043EA03 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0044CAE5 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043EE23 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0044D1DD |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0044360B |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043DD4E |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02238180 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02237590 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02231C70 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0043E223 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0044E361 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0040C634 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0043EA03 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0044CAE5 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0043EE23 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0044D1DD |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0044360B |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0043DD4E |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02258180 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02257590 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02251C70 |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0078912E |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0078380E |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_00789D1E |
Source: unknown | Process created: C:\Users\user\Desktop\WZ1j9bqSlV.exe 'C:\Users\user\Desktop\WZ1j9bqSlV.exe' |
Source: unknown | Process created: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p |
Source: unknown | Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
Source: unknown | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Process created: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Source: unknown | Process created: C:\Users\user\Desktop\WZ1j9bqSlV.exe 'C:\Users\user\Desktop\WZ1j9bqSlV.exe' |
Source: unknown | Process created: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p |
Source: unknown | Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe |
Source: unknown | Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc |
Source: unknown | Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
Source: unknown | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Process created: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe |
Source: C:\Windows\System32\svchost.exe | Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043D241 push ecx; ret |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043D5D3 push ecx; ret |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235E70 push ecx; mov dword ptr [esp], 00008D73h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235E40 push ecx; mov dword ptr [esp], 0000AEA2h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235EA0 push ecx; mov dword ptr [esp], 00007473h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235F20 push ecx; mov dword ptr [esp], 0000E2ADh |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235F70 push ecx; mov dword ptr [esp], 000084ADh |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235FB0 push ecx; mov dword ptr [esp], 0000460Eh |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235D30 push ecx; mov dword ptr [esp], 00002C7Ch |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235D00 push ecx; mov dword ptr [esp], 000021B4h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235D70 push ecx; mov dword ptr [esp], 00008067h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235DA0 push ecx; mov dword ptr [esp], 000036B8h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235DE0 push ecx; mov dword ptr [esp], 000025AAh |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043D241 push ecx; ret |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0043D5D3 push ecx; ret |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235E70 push ecx; mov dword ptr [esp], 00008D73h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235E40 push ecx; mov dword ptr [esp], 0000AEA2h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235EA0 push ecx; mov dword ptr [esp], 00007473h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235F20 push ecx; mov dword ptr [esp], 0000E2ADh |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235F70 push ecx; mov dword ptr [esp], 000084ADh |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235FB0 push ecx; mov dword ptr [esp], 0000460Eh |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235D30 push ecx; mov dword ptr [esp], 00002C7Ch |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235D00 push ecx; mov dword ptr [esp], 000021B4h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235D70 push ecx; mov dword ptr [esp], 00008067h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235DA0 push ecx; mov dword ptr [esp], 000036B8h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02235DE0 push ecx; mov dword ptr [esp], 000025AAh |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0043D241 push ecx; ret |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0043D5D3 push ecx; ret |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255E70 push ecx; mov dword ptr [esp], 00008D73h |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255E40 push ecx; mov dword ptr [esp], 0000AEA2h |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255EA0 push ecx; mov dword ptr [esp], 00007473h |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255F20 push ecx; mov dword ptr [esp], 0000E2ADh |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255F70 push ecx; mov dword ptr [esp], 000084ADh |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255FB0 push ecx; mov dword ptr [esp], 0000460Eh |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255D30 push ecx; mov dword ptr [esp], 00002C7Ch |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255D00 push ecx; mov dword ptr [esp], 000021B4h |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255D70 push ecx; mov dword ptr [esp], 00008067h |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255DA0 push ecx; mov dword ptr [esp], 000036B8h |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02255DE0 push ecx; mov dword ptr [esp], 000025AAh |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_007878CE push ecx; mov dword ptr [esp], 00002C7Ch |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0078789E push ecx; mov dword ptr [esp], 000021B4h |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0078797E push ecx; mov dword ptr [esp], 000025AAh |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0078793E push ecx; mov dword ptr [esp], 000036B8h |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0078790E push ecx; mov dword ptr [esp], 00008067h |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00406091 IsWindowVisible,IsIconic, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0041C7BA GetParent,GetParent,IsIconic,GetParent, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_004274CC __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z,IsIconic,SetForegroundWindow,SendMessageA,PostMessageA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00407C2E IsIconic,GetWindowPlacement,GetWindowRect, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00406091 IsWindowVisible,IsIconic, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0041C7BA GetParent,GetParent,IsIconic,GetParent, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_004274CC __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z,IsIconic,SetForegroundWindow,SendMessageA,PostMessageA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_00407C2E IsIconic,GetWindowPlacement,GetWindowRect, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_00406091 IsWindowVisible,IsIconic, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0041C7BA GetParent,GetParent,IsIconic,GetParent, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_004274CC __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z,IsIconic,SetForegroundWindow,SendMessageA,PostMessageA, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_00407C2E IsIconic,GetWindowPlacement,GetWindowRect, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0042860E __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_004328E6 lstrlenA,FindFirstFileA,FindClose, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02233A10 _snwprintf,FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindClose,FindClose, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_0042860E __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_004328E6 lstrlenA,FindFirstFileA,FindClose, |
Source: C:\Users\user\Desktop\WZ1j9bqSlV.exe | Code function: 0_2_02233A10 _snwprintf,FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindClose,FindClose, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_0042860E __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_004328E6 lstrlenA,FindFirstFileA,FindClose, |
Source: C:\Windows\SysWOW64\NetCfgNotifyObjectHost\unlodctr.exe | Code function: 1_2_02253A10 _snwprintf,FindNextFileW,FindNextFileW,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindClose,FindClose, |
Source: svchost.exe, 00000004.00000002.290500060.000001F8AACC0000.00000002.00000001.sdmp, svchost.exe, 00000005.00000002.499171317.00000205F8D40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.305093993.000001EC5A080000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: svchost.exe, 00000002.00000002.499576636.0000021D13460000.00000004.00000001.sdmp | Binary or memory string: (@Hyper-V RAW |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp, svchost.exe, 00000002.00000002.499561895.0000021D13453000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000004.00000002.290500060.000001F8AACC0000.00000002.00000001.sdmp, svchost.exe, 00000005.00000002.499171317.00000205F8D40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.305093993.000001EC5A080000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: svchost.exe, 00000004.00000002.290500060.000001F8AACC0000.00000002.00000001.sdmp, svchost.exe, 00000005.00000002.499171317.00000205F8D40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.305093993.000001EC5A080000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: svchost.exe, 00000002.00000002.498003505.0000021D0DE29000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW]F |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp, svchost.exe, 00000006.00000002.497830166.000001C87DC2A000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000004.00000002.290500060.000001F8AACC0000.00000002.00000001.sdmp, svchost.exe, 00000005.00000002.499171317.00000205F8D40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.305093993.000001EC5A080000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: svchost.exe, 00000004.00000002.290500060.000001F8AACC0000.00000002.00000001.sdmp, svchost.exe, 00000005.00000002.499171317.00000205F8D40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.305093993.000001EC5A080000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: svchost.exe, 00000002.00000002.499576636.0000021D13460000.00000004.00000001.sdmp | Binary or memory string: (@Hyper-V RAW |
Source: unlodctr.exe, 00000001.00000002.500181787.0000000002A00000.00000004.00000001.sdmp, svchost.exe, 00000002.00000002.499561895.0000021D13453000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000004.00000002.290500060.000001F8AACC0000.00000002.00000001.sdmp, svchost.exe, 00000005.00000002.499171317.00000205F8D40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.305093993.000001EC5A080000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: svchost.exe, 00000004.00000002.290500060.000001F8AACC0000.00000002.00000001.sdmp, svchost.exe, 00000005.00000002.499171317.00000205F8D40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.305093993.000001EC5A080000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: svchost.exe, 00000002.00000002.498003505.0000021D0DE29000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW]F |
Source: svchost.exe, 00000005.00000002.497716730.00000205F8043000.00000004.00000001.sdmp, svchost.exe, 00000006.00000002.497830166.000001C87DC2A000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000004.00000002.290500060.000001F8AACC0000.00000002.00000001.sdmp, svchost.exe, 00000005.00000002.499171317.00000205F8D40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.305093993.000001EC5A080000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |