Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $SANDBOXIERPCSS.EXETA |
Source: ujsvTrVlol.exe, 00000000.00000002.1733413761.000001E800C45000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TCPDUMP.EXEZ1Y)H |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: NETSNIFFER.EXE# |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: QEMU-GA.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: XENSERVICE.EXE3 |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLLYDBG.EXEQ |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SBIESVC.EXE& |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: X64DBG.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SBIECTRL.EXEC |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $APIMONITOR-X86.EXEURES\Q |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDBG.EXE= |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: IMPORTREC.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $FAKEHTTPSERVER.EXEU+ |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WIRESHARK.EXE[ |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $BEHAVIORDUMPER.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WINDUMP.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733413761.000001E800C45000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE?1QD- |
Source: ujsvTrVlol.exe, 00000000.00000002.1733413761.000001E800C45000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE> |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: REGMON.EXEG |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SYSANALYZER.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VMUSRVC.EXE0 |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: XENSERVICE.EXEV |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PROCMON.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CFF EXPLORER.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNSC.EXE9 |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNS.EXES\PICTURES\\{ |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: .SANDBOXIEDCOMLAUNCH.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: :FRIDA-WINJECTOR-HELPER-64.EXELOL.EXE\WINDOWS\INETCACHE\\ |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "PROC_ANALYZER.EXEG |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: PETOOLS.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: FIDDLER.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000002.1733413761.000001E800C45000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: TCPDUMP.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SNIFF_HIT.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: XENSERVICE.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: HOOKEXPLORER.EXEK |
Source: ujsvTrVlol.exe, 00000000.00000002.1733413761.000001E800C45000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNSC.EXE91PC- |
Source: ujsvTrVlol.exe, 00000000.00000002.1733736527.000001E802A60000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000002.1733413761.000001E800C45000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: DUMPCAP.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: "PROCESSHACKER.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: WIRESHARK.EXE |
Source: ujsvTrVlol.exe, 00000000.00000002.1733792396.000001E802AC9000.00000004.00000020.00020000.00000000.sdmp, ujsvTrVlol.exe, 00000000.00000003.1729303397.000001E802AC4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AUTORUNSC.EXEC |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 2012 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 11 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: #Windows 10 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8.1 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 11 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 2016 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733962235.000001E803070000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmicheartbeatfaceY |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8.1 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 11 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: (Windows 2012 R2 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 11 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 6Windows 2012 R2 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 R2 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 10 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmwareuser.exe |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 0Windows 8 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 6Windows 8.1 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vmwareVBoxService.exe |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: vmware |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 4Windows 8 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2016 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmtools |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: qemu-ga! |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 2Windows 8 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: "Windows 8 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 11 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 10 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 R2 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmwaretray.exeO |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 11 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733962235.000001E803070000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OLEAUT32.dllager.dllHhyper-v m |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8.1 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmwaretray.exeW |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmwareuser.exe>1qe- |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 R2 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Hyper-V (guest) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmwaretray.exe>1qe- |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 10 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmwareuser.exe< |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2016 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: /Windows 2012 R2 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 11 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: )Windows 8 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 11 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmsrvc.exeM |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 11 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmusrvc.exe0 |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: %Windows 2012 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: $Windows 8.1 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: ,Windows 2012 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxservice |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 10 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxtray.exe>1qe- |
Source: ujsvTrVlol.exe, 00000000.00000003.1728764942.000001E803176000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Exchange ServicevmickvpexchangeHyper-V Heartbeat ServicevmicheartbeatHyper-V Gue |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxservice.exe( |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: qemu-ga.exe |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 10 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8.1 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 10 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxtray.exe5 |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 7Windows 2012 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2016 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2016 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8.1 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: %Windows 2016 Microsoft Hyper-V Server |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 10 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 11 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 7Windows 2016 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: +Windows 8.1 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000003.1728764942.000001E803176000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: l Direct ServicevmicvmsessionHyper-V Time Synchronization ServicevmictimesyncHyp |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmmemctl.exec |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2016 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 10 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 11 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxservice.exe] |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 11 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Fvmware physical disk helper servicee\windows\inetcache\ |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxservice.exe |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 2Windows 8 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 10 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 10 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: :Windows 2012 R2 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 11 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2016 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxservice.exe>1qe- |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmwaretray.exe |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000003.1728764942.000001E803176000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: hutdown ServicevmicshutdownHyper-V Remote Desktop Virtualization ServicevmicrdvH |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 5Windows 10 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmscsi.exe |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vmtoolsd.exeC |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 3Windows 10 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8.1 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: qemu-ga@ |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: *Windows 11 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 R2 Essential Server Solutions without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: ,Windows 2016 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8.1 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2016 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2016 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1733602494.000001E8026A0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxtray.exe{ |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VBoxService.exe |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 8.1 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: *Windows 10 Server Standard without Hyper-V |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 1Windows 11 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 1Windows 10 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 2012 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMWare |
Source: ujsvTrVlol.exe, 00000000.00000003.1728764942.000001E803176000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: meW32TimeVolume Shadow CopyVSSHyper-V Volume Shadow Copy RequestorvmicvssHyper |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (core) |
Source: ujsvTrVlol.exe, ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Windows 10 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 2Windows 8.1 Server Standard without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 2Windows 8 Server Datacenter without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (core) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734103431.000001E803486000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: vboxtray.exe^ |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: 2Windows 8 Server Enterprise without Hyper-V (full) |
Source: ujsvTrVlol.exe, 00000000.00000002.1734318346.00007FF7F5A16000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: #Windows 11 Microsoft Hyper-V Server |