Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_00402770 LoadLibraryA,LoadLibraryA,GetProcAddress,EncryptFileA,GetModuleHandleA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LdrFindResource_U,LdrAccessResource,LoadLibraryA,GetProcAddress,GetCurrentProcess,VirtualAllocExNuma,DialogBoxParamA, |
0_2_00402770 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_00402770 LoadLibraryA,LoadLibraryA,GetProcAddress,EncryptFileA,GetModuleHandleA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LdrFindResource_U,LdrAccessResource,LoadLibraryA,GetProcAddress,GetCurrentProcess,VirtualAllocExNuma,DialogBoxParamA, |
0_2_00402770 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_00402770 LoadLibraryA,LoadLibraryA,GetProcAddress,EncryptFileA,GetModuleHandleA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LdrFindResource_U,LdrAccessResource,LoadLibraryA,GetProcAddress,GetCurrentProcess,VirtualAllocExNuma,DialogBoxParamA, |
3_2_00402770 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_02172730 CryptAcquireContextW,CryptCreateHash,CryptImportKey,LocalFree,CryptDecodeObjectEx,CryptDecodeObjectEx,CryptGenKey, |
3_2_02172730 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_02172330 CryptGetHashParam,CryptExportKey,CryptDuplicateHash,GetProcessHeap,RtlAllocateHeap,CryptDestroyHash,CryptEncrypt,memcpy,GetProcessHeap,HeapFree, |
3_2_02172330 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_02172010 memcpy,CryptDestroyHash,CryptDuplicateHash,GetProcessHeap,RtlAllocateHeap,CryptDecrypt,CryptVerifySignatureW,GetProcessHeap,HeapFree, |
3_2_02172010 |
Source: dot3hc.exe, 00000003.00000002.484904618.00000000022D4000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/ |
Source: dot3hc.exe, 00000003.00000002.484904618.00000000022D4000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/# |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/2n |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/ILE |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/ata |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/ste |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/ |
Source: dot3hc.exe, 00000003.00000002.484989127.00000000022DD000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/- |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/5 |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/D |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/s |
Source: svchost.exe, 00000007.00000002.488170801.0000027E35600000.00000004.00000001.sdmp |
String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: svchost.exe, 00000007.00000002.488170801.0000027E35600000.00000004.00000001.sdmp |
String found in binary or memory: http://ocsp.digicert.com0: |
Source: svchost.exe, 00000007.00000002.488170801.0000027E35600000.00000004.00000001.sdmp |
String found in binary or memory: http://ocsp.msocsp.com0 |
Source: svchost.exe, 00000007.00000002.487810077.0000027E35490000.00000002.00000001.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. |
Source: svchost.exe, 0000000C.00000002.308182111.000001A004213000.00000004.00000001.sdmp |
String found in binary or memory: http://www.bingmapsportal.com |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://%s.dnet.xboxlive.com |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://%s.xboxlive.com |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://activity.windows.com |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://activity.windows.comr |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/ |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/ |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 0000000C.00000002.308238435.000001A00424E000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/ |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations |
Source: svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 0000000C.00000003.307826493.000001A004240000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 0000000C.00000003.307826493.000001A004240000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n= |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 0000000C.00000003.307826493.000001A004240000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.307787026.000001A004263000.00000004.00000001.sdmp, svchost.exe, 0000000C.00000003.307821900.000001A004245000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 0000000C.00000003.285967172.000001A004232000.00000004.00000001.sdmp |
String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 0000000C.00000002.308182111.000001A004213000.00000004.00000001.sdmp, svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.285967172.000001A004232000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.307821900.000001A004245000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.285967172.000001A004232000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.285967172.000001A004232000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 0000000C.00000002.308238435.000001A00424E000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen |
Source: dot3hc.exe, 00000003.00000002.484904618.00000000022D4000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/ |
Source: dot3hc.exe, 00000003.00000002.484904618.00000000022D4000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/# |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/2n |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/ILE |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/ata |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://152.32.75.74:443/e62xOOZ1/579L/jIWCf/ste |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/ |
Source: dot3hc.exe, 00000003.00000002.484989127.00000000022DD000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/- |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/5 |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/D |
Source: dot3hc.exe, 00000003.00000002.485120144.00000000022F1000.00000004.00000001.sdmp |
String found in binary or memory: http://91.121.200.35:8080/b077Ye/stpEDZ6RpK8mZBC0Wc/DVjA3U6/s |
Source: svchost.exe, 00000007.00000002.488170801.0000027E35600000.00000004.00000001.sdmp |
String found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0 |
Source: svchost.exe, 00000007.00000002.488170801.0000027E35600000.00000004.00000001.sdmp |
String found in binary or memory: http://ocsp.digicert.com0: |
Source: svchost.exe, 00000007.00000002.488170801.0000027E35600000.00000004.00000001.sdmp |
String found in binary or memory: http://ocsp.msocsp.com0 |
Source: svchost.exe, 00000007.00000002.487810077.0000027E35490000.00000002.00000001.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. |
Source: svchost.exe, 0000000C.00000002.308182111.000001A004213000.00000004.00000001.sdmp |
String found in binary or memory: http://www.bingmapsportal.com |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://%s.dnet.xboxlive.com |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://%s.xboxlive.com |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://activity.windows.com |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://activity.windows.comr |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 0000000A.00000002.482425733.000002200523E000.00000004.00000001.sdmp |
String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/ |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/ |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 0000000C.00000002.308238435.000001A00424E000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/ |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations |
Source: svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 0000000C.00000003.307826493.000001A004240000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 0000000C.00000003.307826493.000001A004240000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n= |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 0000000C.00000003.307826493.000001A004240000.00000004.00000001.sdmp |
String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.307808213.000001A00425A000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.307787026.000001A004263000.00000004.00000001.sdmp, svchost.exe, 0000000C.00000003.307821900.000001A004245000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 0000000C.00000003.307794742.000001A004261000.00000004.00000001.sdmp |
String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 0000000C.00000003.285967172.000001A004232000.00000004.00000001.sdmp |
String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v= |
Source: svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 0000000C.00000002.308182111.000001A004213000.00000004.00000001.sdmp, svchost.exe, 0000000C.00000002.308222451.000001A00423D000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.285967172.000001A004232000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.307821900.000001A004245000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.285967172.000001A004232000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= |
Source: svchost.exe, 0000000C.00000003.285967172.000001A004232000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 0000000C.00000002.308238435.000001A00424E000.00000004.00000001.sdmp |
String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen |
Source: unknown |
Process created: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe 'C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe' |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -p -s NgcSvc |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s NgcCtnrSvc |
|
Source: unknown |
Process created: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p |
|
Source: unknown |
Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
|
Source: unknown |
Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
|
Source: unknown |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Process created: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe 'C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe' |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -p -s NgcSvc |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s NgcCtnrSvc |
|
Source: unknown |
Process created: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p |
|
Source: unknown |
Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc |
|
Source: unknown |
Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p |
|
Source: unknown |
Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
|
Source: unknown |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Process created: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Process created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable |
Jump to behavior |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_00406030 push eax; ret |
0_2_0040604E |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_00408963 push ecx; ret |
0_2_00408973 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0040AB90 push eax; ret |
0_2_0040ABA4 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0040AB90 push eax; ret |
0_2_0040ABCC |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635E70 push ecx; mov dword ptr [esp], 00008D73h |
0_2_02635E71 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635E40 push ecx; mov dword ptr [esp], 0000AEA2h |
0_2_02635E41 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635EA0 push ecx; mov dword ptr [esp], 00007473h |
0_2_02635EA1 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635F70 push ecx; mov dword ptr [esp], 000084ADh |
0_2_02635F71 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635F20 push ecx; mov dword ptr [esp], 0000E2ADh |
0_2_02635F21 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635FB0 push ecx; mov dword ptr [esp], 0000460Eh |
0_2_02635FB1 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635D70 push ecx; mov dword ptr [esp], 00008067h |
0_2_02635D71 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635D30 push ecx; mov dword ptr [esp], 00002C7Ch |
0_2_02635D31 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635D00 push ecx; mov dword ptr [esp], 000021B4h |
0_2_02635D01 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635DE0 push ecx; mov dword ptr [esp], 000025AAh |
0_2_02635DE1 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635DA0 push ecx; mov dword ptr [esp], 000036B8h |
0_2_02635DA1 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127A0E push ecx; mov dword ptr [esp], 00008D73h |
0_2_02127A0F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127A3E push ecx; mov dword ptr [esp], 00007473h |
0_2_02127A3F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127ABE push ecx; mov dword ptr [esp], 0000E2ADh |
0_2_02127ABF |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127B0E push ecx; mov dword ptr [esp], 000084ADh |
0_2_02127B0F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127B4E push ecx; mov dword ptr [esp], 0000460Eh |
0_2_02127B4F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0212789E push ecx; mov dword ptr [esp], 000021B4h |
0_2_0212789F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_021278CE push ecx; mov dword ptr [esp], 00002C7Ch |
0_2_021278CF |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0212790E push ecx; mov dword ptr [esp], 00008067h |
0_2_0212790F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0212793E push ecx; mov dword ptr [esp], 000036B8h |
0_2_0212793F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0212797E push ecx; mov dword ptr [esp], 000025AAh |
0_2_0212797F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_021279DE push ecx; mov dword ptr [esp], 0000AEA2h |
0_2_021279DF |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_00406030 push eax; ret |
0_2_0040604E |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_00408963 push ecx; ret |
0_2_00408973 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0040AB90 push eax; ret |
0_2_0040ABA4 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0040AB90 push eax; ret |
0_2_0040ABCC |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635E70 push ecx; mov dword ptr [esp], 00008D73h |
0_2_02635E71 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635E40 push ecx; mov dword ptr [esp], 0000AEA2h |
0_2_02635E41 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635EA0 push ecx; mov dword ptr [esp], 00007473h |
0_2_02635EA1 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635F70 push ecx; mov dword ptr [esp], 000084ADh |
0_2_02635F71 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635F20 push ecx; mov dword ptr [esp], 0000E2ADh |
0_2_02635F21 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635FB0 push ecx; mov dword ptr [esp], 0000460Eh |
0_2_02635FB1 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635D70 push ecx; mov dword ptr [esp], 00008067h |
0_2_02635D71 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635D30 push ecx; mov dword ptr [esp], 00002C7Ch |
0_2_02635D31 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635D00 push ecx; mov dword ptr [esp], 000021B4h |
0_2_02635D01 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635DE0 push ecx; mov dword ptr [esp], 000025AAh |
0_2_02635DE1 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02635DA0 push ecx; mov dword ptr [esp], 000036B8h |
0_2_02635DA1 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127A0E push ecx; mov dword ptr [esp], 00008D73h |
0_2_02127A0F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127A3E push ecx; mov dword ptr [esp], 00007473h |
0_2_02127A3F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127ABE push ecx; mov dword ptr [esp], 0000E2ADh |
0_2_02127ABF |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127B0E push ecx; mov dword ptr [esp], 000084ADh |
0_2_02127B0F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_02127B4E push ecx; mov dword ptr [esp], 0000460Eh |
0_2_02127B4F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0212789E push ecx; mov dword ptr [esp], 000021B4h |
0_2_0212789F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_021278CE push ecx; mov dword ptr [esp], 00002C7Ch |
0_2_021278CF |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0212790E push ecx; mov dword ptr [esp], 00008067h |
0_2_0212790F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0212793E push ecx; mov dword ptr [esp], 000036B8h |
0_2_0212793F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_0212797E push ecx; mov dword ptr [esp], 000025AAh |
0_2_0212797F |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: 0_2_021279DE push ecx; mov dword ptr [esp], 0000AEA2h |
0_2_021279DF |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_00406030 push eax; ret |
3_2_0040604E |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_00408963 push ecx; ret |
3_2_00408973 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_0040AB90 push eax; ret |
3_2_0040ABA4 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_0040AB90 push eax; ret |
3_2_0040ABCC |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: 3_2_02175E40 push ecx; mov dword ptr [esp], 0000AEA2h |
3_2_02175E41 |
Source: svchost.exe, 00000005.00000002.236394856.000001FFC9140000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.292065099.0000028E9FF40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.486558632.0000022005F40000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.308764171.0000029699140000.00000002.00000001.sdmp |
Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: svchost.exe, 00000007.00000002.488474706.0000027E35662000.00000004.00000001.sdmp |
Binary or memory string: @Hyper-V RAW |
Source: svchost.exe, 00000006.00000002.481994541.000001F95C402000.00000004.00000001.sdmp |
Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService |
Source: dot3hc.exe, 00000003.00000002.484904618.00000000022D4000.00000004.00000001.sdmp, svchost.exe, 00000007.00000002.488445142.0000027E35655000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000005.00000002.236394856.000001FFC9140000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.292065099.0000028E9FF40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.486558632.0000022005F40000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.308764171.0000029699140000.00000002.00000001.sdmp |
Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: svchost.exe, 00000005.00000002.236394856.000001FFC9140000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.292065099.0000028E9FF40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.486558632.0000022005F40000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.308764171.0000029699140000.00000002.00000001.sdmp |
Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: svchost.exe, 00000007.00000002.483403302.0000027E2FE29000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW]f5~ |
Source: svchost.exe, 00000006.00000002.482120336.000001F95C429000.00000004.00000001.sdmp, svchost.exe, 0000000A.00000002.482526087.0000022005268000.00000004.00000001.sdmp, svchost.exe, 0000000B.00000002.482223226.000002088D829000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000005.00000002.236394856.000001FFC9140000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.292065099.0000028E9FF40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.486558632.0000022005F40000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.308764171.0000029699140000.00000002.00000001.sdmp |
Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: svchost.exe, 00000005.00000002.236394856.000001FFC9140000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.292065099.0000028E9FF40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.486558632.0000022005F40000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.308764171.0000029699140000.00000002.00000001.sdmp |
Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: svchost.exe, 00000007.00000002.488474706.0000027E35662000.00000004.00000001.sdmp |
Binary or memory string: @Hyper-V RAW |
Source: svchost.exe, 00000006.00000002.481994541.000001F95C402000.00000004.00000001.sdmp |
Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService |
Source: dot3hc.exe, 00000003.00000002.484904618.00000000022D4000.00000004.00000001.sdmp, svchost.exe, 00000007.00000002.488445142.0000027E35655000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW |
Source: svchost.exe, 00000005.00000002.236394856.000001FFC9140000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.292065099.0000028E9FF40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.486558632.0000022005F40000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.308764171.0000029699140000.00000002.00000001.sdmp |
Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: svchost.exe, 00000005.00000002.236394856.000001FFC9140000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.292065099.0000028E9FF40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.486558632.0000022005F40000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.308764171.0000029699140000.00000002.00000001.sdmp |
Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: svchost.exe, 00000007.00000002.483403302.0000027E2FE29000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW]f5~ |
Source: svchost.exe, 00000006.00000002.482120336.000001F95C429000.00000004.00000001.sdmp, svchost.exe, 0000000A.00000002.482526087.0000022005268000.00000004.00000001.sdmp, svchost.exe, 0000000B.00000002.482223226.000002088D829000.00000004.00000001.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: svchost.exe, 00000005.00000002.236394856.000001FFC9140000.00000002.00000001.sdmp, svchost.exe, 00000009.00000002.292065099.0000028E9FF40000.00000002.00000001.sdmp, svchost.exe, 0000000A.00000002.486558632.0000022005F40000.00000002.00000001.sdmp, svchost.exe, 0000000F.00000002.308764171.0000029699140000.00000002.00000001.sdmp |
Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoA, |
0_2_0040CC72 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar, |
0_2_0040F81E |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoA,MultiByteToWideChar, |
0_2_0040F8DA |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA, |
0_2_0040F94E |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: _strlen,_strlen,EnumSystemLocalesA, |
0_2_0040D1C8 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: _strlen,EnumSystemLocalesA, |
0_2_0040D191 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: _strlen,EnumSystemLocalesA, |
0_2_0040D24E |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoW,WideCharToMultiByte, |
0_2_0040FA01 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoA, |
0_2_0040D6A0 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoA,IsValidCodePage,IsValidLocale, |
0_2_0040D2A3 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoA, |
0_2_0040CC72 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar, |
0_2_0040F81E |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoA,MultiByteToWideChar, |
0_2_0040F8DA |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA, |
0_2_0040F94E |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: _strlen,_strlen,EnumSystemLocalesA, |
0_2_0040D1C8 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: _strlen,EnumSystemLocalesA, |
0_2_0040D191 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: _strlen,EnumSystemLocalesA, |
0_2_0040D24E |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoW,WideCharToMultiByte, |
0_2_0040FA01 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoA, |
0_2_0040D6A0 |
Source: C:\Users\user\Desktop\23cf697d5faf11a3ffdd271e1d301173.exe |
Code function: GetLocaleInfoA,IsValidCodePage,IsValidLocale, |
0_2_0040D2A3 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: GetLocaleInfoA, |
3_2_0040CC72 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar, |
3_2_0040F81E |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: GetLocaleInfoA,MultiByteToWideChar, |
3_2_0040F8DA |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,GetLocaleInfoA, |
3_2_0040F94E |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: _strlen,_strlen,EnumSystemLocalesA, |
3_2_0040D1C8 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: _strlen,EnumSystemLocalesA, |
3_2_0040D191 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: _strlen,EnumSystemLocalesA, |
3_2_0040D24E |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: GetLocaleInfoW,WideCharToMultiByte, |
3_2_0040FA01 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: GetLocaleInfoA, |
3_2_0040D6A0 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Code function: GetLocaleInfoA,IsValidCodePage,IsValidLocale, |
3_2_0040D2A3 |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcp VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcp VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcp VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\store.vol VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\store.jfm VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\store.vol VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\store.vol VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\tmp.edb VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\cleanmgr\dot3hc.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcp VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcp VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcp VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\store.vol VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\store.jfm VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\store.vol VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\store.vol VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\Users\user\AppData\Local\Comms\UnistoreDB\tmp.edb VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\svchost.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |