Source: Client.exe, type: SAMPLE | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: Client.exe, type: SAMPLE | Matched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen |
Source: Client.exe, type: SAMPLE | Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: Client.exe, type: SAMPLE | Matched rule: Detects executables containing the string DcRatBy Author: ditekSHen |
Source: 0.0.Client.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 0.0.Client.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen |
Source: 0.0.Client.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: 0.0.Client.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing the string DcRatBy Author: ditekSHen |
Source: 0.2.Client.exe.2db31b0.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 0.2.Client.exe.2db31b0.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen |
Source: 0.2.Client.exe.2db31b0.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: 0.2.Client.exe.2db31b0.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing the string DcRatBy Author: ditekSHen |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing the string DcRatBy Author: ditekSHen |
Source: 00000000.00000002.1674383433.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000000.00000000.1645252925.0000000000582000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000008.00000002.1718869838.000000000066C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000007.00000002.2912950876.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000000.00000002.1673920516.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000007.00000002.2911936077.0000000000B60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000007.00000002.2912950876.0000000002CED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000000.00000002.1674383433.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: 00000008.00000002.1719419411.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: Process Memory Space: Client.exe PID: 7308, type: MEMORYSTR | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: Process Memory Space: WindowsDefender.exe PID: 7528, type: MEMORYSTR | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: Process Memory Space: WindowsDefender.exe PID: 7552, type: MEMORYSTR | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe, type: DROPPED | Matched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe, type: DROPPED | Matched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe, type: DROPPED | Matched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe, type: DROPPED | Matched rule: Detects executables containing the string DcRatBy Author: ditekSHen |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\schtasks.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\schtasks.exe | Section loaded: taskschd.dll | Jump to behavior |
Source: C:\Windows\System32\schtasks.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\schtasks.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\timeout.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: Client.exe, type: SAMPLE | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: Client.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. |
Source: Client.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: Client.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy |
Source: 0.0.Client.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 0.0.Client.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. |
Source: 0.0.Client.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: 0.0.Client.exe.580000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy |
Source: 0.2.Client.exe.2db31b0.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 0.2.Client.exe.2db31b0.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. |
Source: 0.2.Client.exe.2db31b0.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: 0.2.Client.exe.2db31b0.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy |
Source: 00000000.00000002.1674383433.0000000002DB3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000000.00000000.1645252925.0000000000582000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000008.00000002.1718869838.000000000066C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000007.00000002.2912950876.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000000.00000002.1673920516.0000000000BDB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000007.00000002.2911936077.0000000000B60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000007.00000002.2912950876.0000000002CED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000000.00000002.1674383433.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: 00000008.00000002.1719419411.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: Process Memory Space: Client.exe PID: 7308, type: MEMORYSTR | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: Process Memory Space: WindowsDefender.exe PID: 7528, type: MEMORYSTR | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: Process Memory Space: WindowsDefender.exe PID: 7552, type: MEMORYSTR | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe, type: DROPPED | Matched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12 |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe, type: DROPPED | Matched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe, type: DROPPED | Matched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe, type: DROPPED | Matched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy |
Source: Client.exe, Settings.cs | Base64 encoded string: 'iRy9eetP9vA+mAVFHnKtwdw1J0BeZQ/7ZnbPj1i2gcg/CaraNQ9P2ZeSlYe7XvCDUwwQT8sV9mGDLAU+q2F2Xw==', 'pfbVhE1H/ODJ5UCbf2rVECW5Mrdwg5pRJ55qgRYMxFitY41YMNRrmhhuKrcbjohBXmicO3zRaLN+AvXUoyRPTGRoXbN/Y3SAL/u26BmZZlo=', 'TWC6nJEl6GEDESMbY2s4aTfHxmbIqV00+U/dc/nyNZNDL/woynPNEGYoxCP+ZQPzxujjQvN+sciwGW0i8/xk+Q==', 'TENy8+9t/lGmmjILf0drwFqz9Znwolx1zzO8U1rAjsQ175yf/pRyprsQ4Y82SGMmuf0sC4BrrL9CJOY05PxnU9Ef5EQY/8ZAY48mmnD0uheQYEjkbAGhKDiENKMNRZURQIQQJHVKSdgF19CLHxAWK4huFjfG1q3/KPdDtoJKbDQKl6Z1y5PZbokOAfH9oIei68XqppLfrlJCZavP9hK8Y4epTtXe+w5fAnouvGAy7eNDbnt6oUrp5b2H9fKdTTZd9gKqZdUSdsaL2u6hA3l6WlD/QdwMmKXj0kxJJoffp7+nkt5ttWg8x++OWE7TWILFjTe41sD3sZ2fnDOOOmRY5be57DuyxFewaoZ/kT5YsKMvZHuKlFYuTuevEuOg/4yNlMuZifKYCofYFKhhn47ZoFfmm+ByGVujjQkw8NINkSUJUcqSFs1ZR6vyOt4ikc/U+DPYomGPBfCtQealiNrGQYnOlOd0Cx6I12avagtC2BHNnyKTOun7Me1BJMgwfwfOkqucQSSlzG4554pZ4DRvzNONtDqEKdljnI1ORTp+F98udgEwlRAsuBBMXCwbOwcStkyKBTJiutlBLhphsnoQOFXapKmCSV7lENgnNemggVwWu6M6GKlZKBlS64F83CjeTRR00c6wLCWLMBgsaT7joQ1tqUpQjn3bwMmW4gzuENzXGp+LYW6WEByMTdiBna8moXCU+joeZsKWe4Le8zaGWPRt4inFKA6UUrsVXRDOj1odQ9CYRb3GjIAUnileRl3q6l7Yi/yllR1oS6zEZ77POe0l9+UByPDou3P3zUynVXqYGqSd6WiTplQJkaEJoQPU6lQxpEUsXFI6SA8wqEdkFG6aSPR3OItQvIT+yE36QeZvRZtAyWHcmzF1df9PZweHScnEE2SDMNVM0tC4jBYxLjcdVuk6tLVNAX9rUxd+7tqwJhBRyZ+bD57BoUl2FsARgY6EaVFvVagMaRONhg0naqIfVarhzAcetEjiNXlNH09YtOEvIsGyMBfiiG6elT3jMetT3LYN956czP+F+oNNJHcOsjt9T0CyKrz7VfQCGA/e7FP6zG2o+CfORXc+vD4n', 'Hz5uGiF0cgonLiwXm8vQcHPU3nNRvQlr43NQiYZqpilzf6VdZ570Z67vVz0Mrw91DwPLaZ5uTLEwqp/7HczzNQ==', '++IIHVPELGbnp3xBcb6A808zu+1KkWxAH5qCo8gItu+yBOv98TwjytC/JQkWW2RgEXDABQLBCJjIkUgEEKaP/A==' |
Source: Client.exe, NormalStartup.cs | Base64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==' |
Source: WindowsDefender.exe.0.dr, Settings.cs | Base64 encoded string: 'iRy9eetP9vA+mAVFHnKtwdw1J0BeZQ/7ZnbPj1i2gcg/CaraNQ9P2ZeSlYe7XvCDUwwQT8sV9mGDLAU+q2F2Xw==', 'pfbVhE1H/ODJ5UCbf2rVECW5Mrdwg5pRJ55qgRYMxFitY41YMNRrmhhuKrcbjohBXmicO3zRaLN+AvXUoyRPTGRoXbN/Y3SAL/u26BmZZlo=', 'TWC6nJEl6GEDESMbY2s4aTfHxmbIqV00+U/dc/nyNZNDL/woynPNEGYoxCP+ZQPzxujjQvN+sciwGW0i8/xk+Q==', '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', 'Hz5uGiF0cgonLiwXm8vQcHPU3nNRvQlr43NQiYZqpilzf6VdZ570Z67vVz0Mrw91DwPLaZ5uTLEwqp/7HczzNQ==', '++IIHVPELGbnp3xBcb6A808zu+1KkWxAH5qCo8gItu+yBOv98TwjytC/JQkWW2RgEXDABQLBCJjIkUgEEKaP/A==' |
Source: WindowsDefender.exe.0.dr, NormalStartup.cs | Base64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==' |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, Settings.cs | Base64 encoded string: 'iRy9eetP9vA+mAVFHnKtwdw1J0BeZQ/7ZnbPj1i2gcg/CaraNQ9P2ZeSlYe7XvCDUwwQT8sV9mGDLAU+q2F2Xw==', 'pfbVhE1H/ODJ5UCbf2rVECW5Mrdwg5pRJ55qgRYMxFitY41YMNRrmhhuKrcbjohBXmicO3zRaLN+AvXUoyRPTGRoXbN/Y3SAL/u26BmZZlo=', 'TWC6nJEl6GEDESMbY2s4aTfHxmbIqV00+U/dc/nyNZNDL/woynPNEGYoxCP+ZQPzxujjQvN+sciwGW0i8/xk+Q==', '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', 'Hz5uGiF0cgonLiwXm8vQcHPU3nNRvQlr43NQiYZqpilzf6VdZ570Z67vVz0Mrw91DwPLaZ5uTLEwqp/7HczzNQ==', '++IIHVPELGbnp3xBcb6A808zu+1KkWxAH5qCo8gItu+yBOv98TwjytC/JQkWW2RgEXDABQLBCJjIkUgEEKaP/A==' |
Source: 0.2.Client.exe.2db31b0.1.raw.unpack, NormalStartup.cs | Base64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==' |
Source: unknown | Process created: C:\Users\user\Desktop\Client.exe C:\Users\user\Desktop\Client.exe | |
Source: C:\Users\user\Desktop\Client.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\user\AppData\Roaming\WindowsDefender.exe"' & exit | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\Client.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpB214.tmp.bat"" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\user\AppData\Roaming\WindowsDefender.exe"' | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout 3 | |
Source: unknown | Process created: C:\Users\user\AppData\Roaming\WindowsDefender.exe C:\Users\user\AppData\Roaming\WindowsDefender.exe | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\user\AppData\Roaming\WindowsDefender.exe "C:\Users\user\AppData\Roaming\WindowsDefender.exe" | |
Source: C:\Users\user\Desktop\Client.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\user\AppData\Roaming\WindowsDefender.exe"' & exit | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpB214.tmp.bat"" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\user\AppData\Roaming\WindowsDefender.exe"' | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\timeout.exe timeout 3 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Users\user\AppData\Roaming\WindowsDefender.exe "C:\Users\user\AppData\Roaming\WindowsDefender.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Client.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\WindowsDefender.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |