Resubmissions
11/11/2023, 21:54
231111-1sgeesbg5t 811/11/2023, 21:52
231111-1rakgsbg3y 711/11/2023, 21:24
231111-z81mkabf5v 711/11/2023, 21:20
231111-z62f3scd27 711/11/2023, 21:19
231111-z6csqacd25 711/11/2023, 21:18
231111-z5pqwscc99 711/11/2023, 21:13
231111-z22laabf3w 911/11/2023, 21:10
231111-z1cwjacc82 711/11/2023, 20:08
231111-ywskracb37 7Analysis
-
max time kernel
5s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
11/11/2023, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
888Rat.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
888Rat.exe
Resource
win10-20231020-en
Behavioral task
behavioral3
Sample
888Rat.exe
Resource
win10v2004-20231023-en
General
-
Target
888Rat.exe
-
Size
93.6MB
-
MD5
553951bbbde6c6001ade88f3a06a9b9a
-
SHA1
28cd84b4533433cc925123f106e4efbbddd3c2ca
-
SHA256
4870376811dd3c5eabe924c793079629d13a7813bf1a3014b5333b132be50365
-
SHA512
e9cf57ca2cd87fa2b3c05c0003ae11fc51d4139072d028ba52d665de57fffcb9c279cbe19ede001cc56ac464212ab8f6cbb8e7023c7ca567835a7b540a58521d
-
SSDEEP
1572864:ST0EdFgdUIGfkS0H4HHDXLYrXatfLllR3Rbop0+xXlMSyCXsRuG0CPb0V+8VM5km:ST0I1IGfr0H4HbLYrXajRPcl0issnM4s
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 484 SERVERS.EXE 4804 SERVERS.EXE 3620 888RAT.EXE 3956 SERVERS.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 916 schtasks.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3152 2980 888Rat.exe 70 PID 2980 wrote to memory of 3152 2980 888Rat.exe 70 PID 2980 wrote to memory of 3152 2980 888Rat.exe 70 PID 2980 wrote to memory of 484 2980 888Rat.exe 71 PID 2980 wrote to memory of 484 2980 888Rat.exe 71 PID 3152 wrote to memory of 2724 3152 888RAT.EXE 72 PID 3152 wrote to memory of 2724 3152 888RAT.EXE 72 PID 3152 wrote to memory of 2724 3152 888RAT.EXE 72 PID 3152 wrote to memory of 4804 3152 888RAT.EXE 73 PID 3152 wrote to memory of 4804 3152 888RAT.EXE 73 PID 2724 wrote to memory of 288 2724 888RAT.EXE 160 PID 2724 wrote to memory of 288 2724 888RAT.EXE 160 PID 2724 wrote to memory of 288 2724 888RAT.EXE 160 PID 2724 wrote to memory of 3620 2724 SERVERS.EXE 252 PID 2724 wrote to memory of 3620 2724 SERVERS.EXE 252 PID 288 wrote to memory of 2408 288 888RAT.EXE 289 PID 288 wrote to memory of 2408 288 888RAT.EXE 289 PID 288 wrote to memory of 2408 288 888RAT.EXE 289 PID 288 wrote to memory of 3956 288 888RAT.EXE 76 PID 288 wrote to memory of 3956 288 888RAT.EXE 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\888Rat.exe"C:\Users\Admin\AppData\Local\Temp\888Rat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"2⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"3⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"4⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"4⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"5⤵
- Executes dropped EXE
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"5⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"6⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"6⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"7⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"7⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"8⤵PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"8⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"9⤵PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"9⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"10⤵PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"10⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"11⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"11⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"12⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"13⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"14⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"14⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"15⤵PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"15⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"16⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"17⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"18⤵PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"18⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"19⤵PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"19⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"20⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"21⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"21⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"22⤵PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"22⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"23⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"23⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"24⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"25⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"26⤵PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"26⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"27⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"28⤵PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"28⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"29⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"29⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"30⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"31⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"31⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"32⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"32⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"33⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"34⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"34⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"35⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"35⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"36⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"37⤵PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"37⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"38⤵PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"38⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"39⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"39⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"40⤵PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"40⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"41⤵PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"41⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"42⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"43⤵PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"43⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"44⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"44⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"45⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"46⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"46⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"47⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"47⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"48⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"48⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"49⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"50⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"50⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"51⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"51⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"52⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"53⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"54⤵PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"54⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"55⤵PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"55⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"56⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"56⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"57⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"58⤵PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"58⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"59⤵PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"59⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"60⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"61⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"61⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"62⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"62⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"63⤵PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"63⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"64⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"64⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"65⤵PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"65⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"66⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"66⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"67⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"68⤵PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"68⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"69⤵PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"69⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"70⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"71⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"71⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"72⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"72⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"73⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"74⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"74⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"75⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"76⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"77⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"77⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"78⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"79⤵PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"79⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"80⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"80⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"81⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"82⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"82⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"83⤵PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"83⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"84⤵PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"84⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"85⤵PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"85⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"86⤵PID:592
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"86⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"87⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"87⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"88⤵PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"88⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"89⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"89⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"90⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"90⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"91⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"92⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"93⤵PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"93⤵PID:504
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"94⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"95⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"95⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"96⤵PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"96⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"97⤵PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"97⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"98⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"98⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"99⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"99⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"100⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"100⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"101⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"102⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"103⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"103⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"104⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"104⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"105⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"106⤵PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"106⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"107⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"108⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"109⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"110⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"110⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"111⤵PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"111⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"112⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"113⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"114⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"114⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"115⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"115⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"116⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"116⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"117⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"118⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"119⤵PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"119⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"120⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"120⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"121⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"122⤵PID:2388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-