Resubmissions
11/11/2023, 21:54
231111-1sgeesbg5t 811/11/2023, 21:52
231111-1rakgsbg3y 711/11/2023, 21:24
231111-z81mkabf5v 711/11/2023, 21:20
231111-z62f3scd27 711/11/2023, 21:19
231111-z6csqacd25 711/11/2023, 21:18
231111-z5pqwscc99 711/11/2023, 21:13
231111-z22laabf3w 911/11/2023, 21:10
231111-z1cwjacc82 711/11/2023, 20:08
231111-ywskracb37 7Analysis
-
max time kernel
1803s -
max time network
1807s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
888Rat.exe
Resource
win10v2004-20231020-en
General
-
Target
888Rat.exe
-
Size
93.6MB
-
MD5
553951bbbde6c6001ade88f3a06a9b9a
-
SHA1
28cd84b4533433cc925123f106e4efbbddd3c2ca
-
SHA256
4870376811dd3c5eabe924c793079629d13a7813bf1a3014b5333b132be50365
-
SHA512
e9cf57ca2cd87fa2b3c05c0003ae11fc51d4139072d028ba52d665de57fffcb9c279cbe19ede001cc56ac464212ab8f6cbb8e7023c7ca567835a7b540a58521d
-
SSDEEP
1572864:ST0EdFgdUIGfkS0H4HHDXLYrXatfLllR3Rbop0+xXlMSyCXsRuG0CPb0V+8VM5km:ST0I1IGfr0H4HbLYrXajRPcl0issnM4s
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 36 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 888RAT.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation SERVERS.EXE Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Process not Found -
Executes dropped EXE 31 IoCs
pid Process 3044 SERVERS.EXE 3280 SERVERS.EXE 2788 Process not Found 4744 Process not Found 3020 Process not Found 3968 Process not Found 2032 Process not Found 116 SERVERS.EXE 5056 Process not Found 3552 Process not Found 1652 Process not Found 464 SERVERS.EXE 2676 888RAT.EXE 3872 Process not Found 3816 Process not Found 4328 Process not Found 1816 Process not Found 1196 Process not Found 4084 Process not Found 4240 Process not Found 3492 Process not Found 3916 Process not Found 496 Process not Found 400 Process not Found 572 Process not Found 1148 Process not Found 4640 888RAT.EXE 4988 Process not Found 5052 Process not Found 3800 Process not Found 1104 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GeForce = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\SERVERS.EXE\"" SERVERS.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3044 SERVERS.EXE 3044 SERVERS.EXE 3044 SERVERS.EXE 3044 SERVERS.EXE 3044 SERVERS.EXE 3044 SERVERS.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 SERVERS.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3044 SERVERS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 4920 1196 Process not Found 659 PID 1196 wrote to memory of 4920 1196 Process not Found 659 PID 1196 wrote to memory of 4920 1196 Process not Found 659 PID 1196 wrote to memory of 3044 1196 Process not Found 95 PID 1196 wrote to memory of 3044 1196 Process not Found 95 PID 4920 wrote to memory of 4964 4920 SERVERS.EXE 94 PID 4920 wrote to memory of 4964 4920 SERVERS.EXE 94 PID 4920 wrote to memory of 4964 4920 SERVERS.EXE 94 PID 4920 wrote to memory of 3280 4920 Process not Found 92 PID 4920 wrote to memory of 3280 4920 Process not Found 92 PID 4964 wrote to memory of 3596 4964 888RAT.EXE 1587 PID 4964 wrote to memory of 3596 4964 888RAT.EXE 1587 PID 4964 wrote to memory of 3596 4964 888RAT.EXE 1587 PID 4964 wrote to memory of 2788 4964 888RAT.EXE 1981 PID 4964 wrote to memory of 2788 4964 888RAT.EXE 1981 PID 3596 wrote to memory of 1920 3596 Process not Found 1879 PID 3596 wrote to memory of 1920 3596 Process not Found 1879 PID 3596 wrote to memory of 1920 3596 Process not Found 1879 PID 3596 wrote to memory of 4744 3596 Process not Found 1719 PID 3596 wrote to memory of 4744 3596 Process not Found 1719 PID 1920 wrote to memory of 464 1920 Process not Found 118 PID 1920 wrote to memory of 464 1920 Process not Found 118 PID 1920 wrote to memory of 464 1920 Process not Found 118 PID 1920 wrote to memory of 3020 1920 Process not Found 1693 PID 1920 wrote to memory of 3020 1920 Process not Found 1693 PID 464 wrote to memory of 656 464 SERVERS.EXE 1296 PID 464 wrote to memory of 656 464 SERVERS.EXE 1296 PID 464 wrote to memory of 656 464 SERVERS.EXE 1296 PID 464 wrote to memory of 3968 464 SERVERS.EXE 2203 PID 464 wrote to memory of 3968 464 SERVERS.EXE 2203 PID 656 wrote to memory of 4796 656 Process not Found 2053 PID 656 wrote to memory of 4796 656 Process not Found 2053 PID 656 wrote to memory of 4796 656 Process not Found 2053 PID 656 wrote to memory of 2032 656 Process not Found 2311 PID 656 wrote to memory of 2032 656 Process not Found 2311 PID 4796 wrote to memory of 1404 4796 Process not Found 2221 PID 4796 wrote to memory of 1404 4796 Process not Found 2221 PID 4796 wrote to memory of 1404 4796 Process not Found 2221 PID 4796 wrote to memory of 116 4796 Process not Found 309 PID 4796 wrote to memory of 116 4796 Process not Found 309 PID 1404 wrote to memory of 4184 1404 Process not Found 1480 PID 1404 wrote to memory of 4184 1404 Process not Found 1480 PID 1404 wrote to memory of 4184 1404 Process not Found 1480 PID 1404 wrote to memory of 5056 1404 Process not Found 2399 PID 1404 wrote to memory of 5056 1404 Process not Found 2399 PID 3044 wrote to memory of 3908 3044 SERVERS.EXE 2395 PID 3044 wrote to memory of 3908 3044 SERVERS.EXE 2395 PID 4184 wrote to memory of 4512 4184 Process not Found 1035 PID 4184 wrote to memory of 4512 4184 Process not Found 1035 PID 4184 wrote to memory of 4512 4184 Process not Found 1035 PID 4184 wrote to memory of 3552 4184 Process not Found 2488 PID 4184 wrote to memory of 3552 4184 Process not Found 2488 PID 4512 wrote to memory of 4824 4512 SERVERS.EXE 2378 PID 4512 wrote to memory of 4824 4512 SERVERS.EXE 2378 PID 4512 wrote to memory of 4824 4512 SERVERS.EXE 2378 PID 4512 wrote to memory of 1652 4512 SERVERS.EXE 2387 PID 4512 wrote to memory of 1652 4512 SERVERS.EXE 2387 PID 4824 wrote to memory of 4008 4824 Process not Found 3066 PID 4824 wrote to memory of 4008 4824 Process not Found 3066 PID 4824 wrote to memory of 4008 4824 Process not Found 3066 PID 4824 wrote to memory of 464 4824 Process not Found 118 PID 4824 wrote to memory of 464 4824 Process not Found 118 PID 4008 wrote to memory of 3104 4008 Process not Found 1746 PID 4008 wrote to memory of 3104 4008 Process not Found 1746 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\888Rat.exe"C:\Users\Admin\AppData\Local\Temp\888Rat.exe"1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "WINDOWSSYSTEMHOST" /tr "C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE" /sc MINUTE /MO 13⤵
- Creates scheduled task(s)
PID:3908
-
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"2⤵PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"1⤵
- Executes dropped EXE
PID:3280
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"2⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"3⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"4⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"5⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"6⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"7⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"8⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"9⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"10⤵PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"10⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"11⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"12⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"12⤵PID:3104
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"9⤵PID:3552
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"8⤵PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"7⤵PID:116
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"6⤵PID:2032
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"5⤵PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"4⤵PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"3⤵PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"2⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"2⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"3⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"4⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"4⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"5⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"6⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"7⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"8⤵
- Checks computer location settings
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"9⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"10⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"11⤵PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"11⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"12⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"13⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"14⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"15⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"16⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"17⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"18⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"19⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"20⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"20⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"21⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"22⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"23⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"23⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"24⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"25⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"26⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"27⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"28⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"29⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"30⤵PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"30⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"31⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"32⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"33⤵PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"33⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"34⤵PID:412
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"34⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"35⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"36⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"36⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"37⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"37⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"38⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"39⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"40⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"40⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"41⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"42⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"43⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"44⤵PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"44⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"45⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"46⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"47⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"48⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"49⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"50⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"51⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"52⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"53⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"54⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"54⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"55⤵PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"55⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"56⤵PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"56⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"57⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"58⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"59⤵PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"59⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"60⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"61⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"62⤵PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"62⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"63⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"64⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"65⤵PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"65⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"66⤵PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"66⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"67⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"68⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"69⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"70⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"71⤵PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"71⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"72⤵PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"72⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"73⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"74⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"75⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"76⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"77⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"78⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"79⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"80⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"81⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"82⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"83⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"84⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"85⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"86⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"87⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"88⤵PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"88⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"89⤵PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"89⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"90⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"91⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"91⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"92⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"93⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"94⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"95⤵PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"95⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"96⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"97⤵PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"97⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"98⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"99⤵PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"99⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"100⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"101⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"102⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"103⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"104⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"105⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"106⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"107⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"108⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"109⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"110⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"111⤵PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"111⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"112⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"113⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"114⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"115⤵PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"115⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"116⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"117⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"118⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"118⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"C:\Users\Admin\AppData\Local\Temp\SERVERS.EXE"119⤵PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"119⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"120⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"121⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"C:\Users\Admin\AppData\Local\Temp\888RAT.EXE"122⤵PID:5056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-