Resubmissions
09-05-2024 12:59
240509-p8d4fsdf27 1009-05-2024 12:50
240509-p298badc26 1009-05-2024 12:45
240509-py7b9aab8t 809-05-2024 12:25
240509-plr2sscb99 10Analysis
-
max time kernel
145s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
DevxExecutor.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
DevxExecutor.exe
Resource
win11-20240508-en
General
-
Target
DevxExecutor.exe
-
Size
44.1MB
-
MD5
e4897ef7419e128b1f7473119ce0bd07
-
SHA1
5aad252412a5923438f30cb9c397731a9b020121
-
SHA256
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581
-
SHA512
db66ea2cb3f5f30934ab071e1dd2e7b41f6dc5c4be125f1d2d6aab627b3be8b6cf8fcbed517a414cdf037a068414b178176edba2e28de6419b65269e0abb162c
-
SSDEEP
786432:NCZkrrfdktmLX8t8lBBvUPlZIOPuOI64zlNWtVMoOIsuXzfVib4a9BWN:N4GlkcLMtUzilKUINzmtVkMfWo
Malware Config
Signatures
-
pid Process 5440 powershell.exe 5288 powershell.exe 1400 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation DevxExecutor.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Build.exe -
Executes dropped EXE 64 IoCs
pid Process 436 cstealer.exe 4848 cstealer.exe 2940 cstealer.exe 736 main.exe 3932 cstealer.exe 4516 main.exe 3808 cstealer.exe 4204 cstealer.exe 2072 Build.exe 1932 cstealer.exe 3288 cstealer.exe 3188 cstealer.exe 3168 cstealer.exe 5028 hacn.exe 3164 based.exe 4604 based.exe 4348 hacn.exe 4040 cstealer.exe 944 cstealer.exe 1516 s.exe 4968 cstealer.exe 2124 cstealer.exe 5392 cstealer.exe 5812 cstealer.exe 6180 cstealer.exe 6316 cstealer.exe 6484 cstealer.exe 6712 cstealer.exe 6948 cstealer.exe 7064 cstealer.exe 6152 cstealer.exe 5156 cstealer.exe 6352 cstealer.exe 6448 cstealer.exe 6736 cstealer.exe 6884 cstealer.exe 6368 cstealer.exe 7008 cstealer.exe 5612 cstealer.exe 5288 cstealer.exe 5180 cstealer.exe 6204 cstealer.exe 5164 rar.exe 5472 cstealer.exe 5256 cstealer.exe 5568 cstealer.exe 5656 cstealer.exe 6632 cstealer.exe 5592 cstealer.exe 3096 cstealer.exe 3328 cstealer.exe 5744 cstealer.exe 5228 cstealer.exe 6164 cstealer.exe 6856 cstealer.exe 6172 cstealer.exe 6976 cstealer.exe 6980 cstealer.exe 6012 cstealer.exe 464 cstealer.exe 3028 cstealer.exe 6176 cstealer.exe 6608 cstealer.exe 3200 cstealer.exe -
Loads dropped DLL 64 IoCs
pid Process 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 4848 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 4516 main.exe 4516 main.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 3932 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 4204 cstealer.exe 3288 cstealer.exe 3288 cstealer.exe 3288 cstealer.exe 3288 cstealer.exe 3288 cstealer.exe 3288 cstealer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/4516-135-0x00007FF8CB9D0000-0x00007FF8CBFB8000-memory.dmp upx behavioral1/memory/4516-158-0x00007FF8CB9D0000-0x00007FF8CBFB8000-memory.dmp upx behavioral1/memory/4604-251-0x00007FF8C6630000-0x00007FF8C6C18000-memory.dmp upx behavioral1/memory/4604-273-0x00007FF8C8760000-0x00007FF8C876F000-memory.dmp upx behavioral1/memory/4604-272-0x00007FF8C8770000-0x00007FF8C8794000-memory.dmp upx behavioral1/memory/4604-282-0x00007FF8C64B0000-0x00007FF8C6623000-memory.dmp upx behavioral1/memory/4604-281-0x00007FF8C5A60000-0x00007FF8C5A83000-memory.dmp upx behavioral1/memory/4604-284-0x00007FF8C8360000-0x00007FF8C836D000-memory.dmp upx behavioral1/memory/4604-286-0x00007FF8C3640000-0x00007FF8C39B5000-memory.dmp upx behavioral1/memory/4604-287-0x00007FF8C63C0000-0x00007FF8C6478000-memory.dmp upx behavioral1/memory/4604-285-0x00007FF8C6480000-0x00007FF8C64AE000-memory.dmp upx behavioral1/memory/4604-314-0x00007FF8C6270000-0x00007FF8C638C000-memory.dmp upx behavioral1/memory/4604-307-0x00007FF8C6390000-0x00007FF8C639D000-memory.dmp upx behavioral1/memory/4604-306-0x00007FF8C6630000-0x00007FF8C6C18000-memory.dmp upx behavioral1/memory/4604-302-0x00007FF8C63A0000-0x00007FF8C63B4000-memory.dmp upx behavioral1/memory/4604-283-0x00007FF8C87A0000-0x00007FF8C87B9000-memory.dmp upx behavioral1/memory/4604-280-0x00007FF8C5A90000-0x00007FF8C5AA9000-memory.dmp upx behavioral1/memory/4604-279-0x00007FF8C5AB0000-0x00007FF8C5ADD000-memory.dmp upx behavioral1/memory/4604-558-0x00007FF8C8770000-0x00007FF8C8794000-memory.dmp upx behavioral1/memory/4604-836-0x00007FF8C6630000-0x00007FF8C6C18000-memory.dmp upx behavioral1/memory/4604-847-0x00007FF8C63C0000-0x00007FF8C6478000-memory.dmp upx behavioral1/memory/4604-846-0x00007FF8C3640000-0x00007FF8C39B5000-memory.dmp upx behavioral1/memory/4604-845-0x00007FF8C6480000-0x00007FF8C64AE000-memory.dmp upx behavioral1/memory/4604-843-0x00007FF8C87A0000-0x00007FF8C87B9000-memory.dmp upx behavioral1/memory/4604-842-0x00007FF8C64B0000-0x00007FF8C6623000-memory.dmp upx behavioral1/memory/4604-841-0x00007FF8C5A60000-0x00007FF8C5A83000-memory.dmp upx behavioral1/memory/4604-837-0x00007FF8C8770000-0x00007FF8C8794000-memory.dmp upx behavioral1/memory/4604-1178-0x00007FF8C6630000-0x00007FF8C6C18000-memory.dmp upx behavioral1/memory/4604-1585-0x00007FF8C8360000-0x00007FF8C836D000-memory.dmp upx behavioral1/memory/4604-1592-0x00007FF8C87A0000-0x00007FF8C87B9000-memory.dmp upx behavioral1/memory/4604-1591-0x00007FF8C64B0000-0x00007FF8C6623000-memory.dmp upx behavioral1/memory/4604-1590-0x00007FF8C5A60000-0x00007FF8C5A83000-memory.dmp upx behavioral1/memory/4604-1589-0x00007FF8C5AB0000-0x00007FF8C5ADD000-memory.dmp upx behavioral1/memory/4604-1588-0x00007FF8C5A90000-0x00007FF8C5AA9000-memory.dmp upx behavioral1/memory/4604-1587-0x00007FF8C8760000-0x00007FF8C876F000-memory.dmp upx behavioral1/memory/4604-1586-0x00007FF8C8770000-0x00007FF8C8794000-memory.dmp upx behavioral1/memory/4604-1595-0x00007FF8C3640000-0x00007FF8C39B5000-memory.dmp upx behavioral1/memory/4604-1593-0x00007FF8C6630000-0x00007FF8C6C18000-memory.dmp upx behavioral1/memory/4604-1594-0x00007FF8C6480000-0x00007FF8C64AE000-memory.dmp upx behavioral1/memory/4604-1599-0x00007FF8C6270000-0x00007FF8C638C000-memory.dmp upx behavioral1/memory/4604-1598-0x00007FF8C6390000-0x00007FF8C639D000-memory.dmp upx behavioral1/memory/4604-1597-0x00007FF8C63A0000-0x00007FF8C63B4000-memory.dmp upx behavioral1/memory/4604-1596-0x00007FF8C63C0000-0x00007FF8C6478000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 49 discord.com 50 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 ip-api.com -
Detects Pyinstaller 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023418-7.dat pyinstaller behavioral1/files/0x0007000000023433-63.dat pyinstaller behavioral1/files/0x0008000000023480-203.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5912 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 5164 tasklist.exe 5272 tasklist.exe 5860 tasklist.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5784 systeminfo.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1400 powershell.exe 1400 powershell.exe 5156 powershell.exe 5156 powershell.exe 5288 powershell.exe 5288 powershell.exe 1400 powershell.exe 1400 powershell.exe 5156 powershell.exe 5156 powershell.exe 5440 powershell.exe 5348 powershell.exe 5348 powershell.exe 5440 powershell.exe 5288 powershell.exe 5288 powershell.exe 5348 powershell.exe 5440 powershell.exe 6044 powershell.exe 6044 powershell.exe 6044 powershell.exe 6444 powershell.exe 6444 powershell.exe 6444 powershell.exe 5632 powershell.exe 5632 powershell.exe 5632 powershell.exe 2128 powershell.exe 2128 powershell.exe 2128 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5164 tasklist.exe Token: SeDebugPrivilege 1400 powershell.exe Token: SeDebugPrivilege 5156 powershell.exe Token: SeDebugPrivilege 5272 tasklist.exe Token: SeDebugPrivilege 5288 powershell.exe Token: SeIncreaseQuotaPrivilege 5824 WMIC.exe Token: SeSecurityPrivilege 5824 WMIC.exe Token: SeTakeOwnershipPrivilege 5824 WMIC.exe Token: SeLoadDriverPrivilege 5824 WMIC.exe Token: SeSystemProfilePrivilege 5824 WMIC.exe Token: SeSystemtimePrivilege 5824 WMIC.exe Token: SeProfSingleProcessPrivilege 5824 WMIC.exe Token: SeIncBasePriorityPrivilege 5824 WMIC.exe Token: SeCreatePagefilePrivilege 5824 WMIC.exe Token: SeBackupPrivilege 5824 WMIC.exe Token: SeRestorePrivilege 5824 WMIC.exe Token: SeShutdownPrivilege 5824 WMIC.exe Token: SeDebugPrivilege 5824 WMIC.exe Token: SeSystemEnvironmentPrivilege 5824 WMIC.exe Token: SeRemoteShutdownPrivilege 5824 WMIC.exe Token: SeUndockPrivilege 5824 WMIC.exe Token: SeManageVolumePrivilege 5824 WMIC.exe Token: 33 5824 WMIC.exe Token: 34 5824 WMIC.exe Token: 35 5824 WMIC.exe Token: 36 5824 WMIC.exe Token: SeDebugPrivilege 5440 powershell.exe Token: SeDebugPrivilege 5860 tasklist.exe Token: SeDebugPrivilege 5348 powershell.exe Token: SeIncreaseQuotaPrivilege 5824 WMIC.exe Token: SeSecurityPrivilege 5824 WMIC.exe Token: SeTakeOwnershipPrivilege 5824 WMIC.exe Token: SeLoadDriverPrivilege 5824 WMIC.exe Token: SeSystemProfilePrivilege 5824 WMIC.exe Token: SeSystemtimePrivilege 5824 WMIC.exe Token: SeProfSingleProcessPrivilege 5824 WMIC.exe Token: SeIncBasePriorityPrivilege 5824 WMIC.exe Token: SeCreatePagefilePrivilege 5824 WMIC.exe Token: SeBackupPrivilege 5824 WMIC.exe Token: SeRestorePrivilege 5824 WMIC.exe Token: SeShutdownPrivilege 5824 WMIC.exe Token: SeDebugPrivilege 5824 WMIC.exe Token: SeSystemEnvironmentPrivilege 5824 WMIC.exe Token: SeRemoteShutdownPrivilege 5824 WMIC.exe Token: SeUndockPrivilege 5824 WMIC.exe Token: SeManageVolumePrivilege 5824 WMIC.exe Token: 33 5824 WMIC.exe Token: 34 5824 WMIC.exe Token: 35 5824 WMIC.exe Token: 36 5824 WMIC.exe Token: SeDebugPrivilege 6044 powershell.exe Token: SeDebugPrivilege 6444 powershell.exe Token: SeIncreaseQuotaPrivilege 5520 WMIC.exe Token: SeSecurityPrivilege 5520 WMIC.exe Token: SeTakeOwnershipPrivilege 5520 WMIC.exe Token: SeLoadDriverPrivilege 5520 WMIC.exe Token: SeSystemProfilePrivilege 5520 WMIC.exe Token: SeSystemtimePrivilege 5520 WMIC.exe Token: SeProfSingleProcessPrivilege 5520 WMIC.exe Token: SeIncBasePriorityPrivilege 5520 WMIC.exe Token: SeCreatePagefilePrivilege 5520 WMIC.exe Token: SeBackupPrivilege 5520 WMIC.exe Token: SeRestorePrivilege 5520 WMIC.exe Token: SeShutdownPrivilege 5520 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 544 wrote to memory of 436 544 DevxExecutor.exe 89 PID 544 wrote to memory of 436 544 DevxExecutor.exe 89 PID 436 wrote to memory of 4848 436 cstealer.exe 91 PID 436 wrote to memory of 4848 436 cstealer.exe 91 PID 4848 wrote to memory of 2204 4848 cstealer.exe 94 PID 4848 wrote to memory of 2204 4848 cstealer.exe 94 PID 2204 wrote to memory of 2940 2204 cmd.exe 96 PID 2204 wrote to memory of 2940 2204 cmd.exe 96 PID 544 wrote to memory of 736 544 DevxExecutor.exe 93 PID 544 wrote to memory of 736 544 DevxExecutor.exe 93 PID 2940 wrote to memory of 3932 2940 cstealer.exe 97 PID 2940 wrote to memory of 3932 2940 cstealer.exe 97 PID 736 wrote to memory of 4516 736 main.exe 98 PID 736 wrote to memory of 4516 736 main.exe 98 PID 4516 wrote to memory of 1068 4516 main.exe 100 PID 4516 wrote to memory of 1068 4516 main.exe 100 PID 3932 wrote to memory of 4304 3932 cstealer.exe 102 PID 3932 wrote to memory of 4304 3932 cstealer.exe 102 PID 4304 wrote to memory of 3808 4304 cmd.exe 104 PID 4304 wrote to memory of 3808 4304 cmd.exe 104 PID 3808 wrote to memory of 4204 3808 cstealer.exe 106 PID 3808 wrote to memory of 4204 3808 cstealer.exe 106 PID 1068 wrote to memory of 2072 1068 cmd.exe 105 PID 1068 wrote to memory of 2072 1068 cmd.exe 105 PID 1068 wrote to memory of 2072 1068 cmd.exe 105 PID 4204 wrote to memory of 3692 4204 cstealer.exe 108 PID 4204 wrote to memory of 3692 4204 cstealer.exe 108 PID 3692 wrote to memory of 1932 3692 cmd.exe 110 PID 3692 wrote to memory of 1932 3692 cmd.exe 110 PID 1932 wrote to memory of 3288 1932 cstealer.exe 111 PID 1932 wrote to memory of 3288 1932 cstealer.exe 111 PID 3288 wrote to memory of 4956 3288 cstealer.exe 112 PID 3288 wrote to memory of 4956 3288 cstealer.exe 112 PID 4956 wrote to memory of 3188 4956 cmd.exe 114 PID 4956 wrote to memory of 3188 4956 cmd.exe 114 PID 3188 wrote to memory of 3168 3188 cstealer.exe 116 PID 3188 wrote to memory of 3168 3188 cstealer.exe 116 PID 2072 wrote to memory of 5028 2072 Build.exe 115 PID 2072 wrote to memory of 5028 2072 Build.exe 115 PID 3168 wrote to memory of 1572 3168 cstealer.exe 119 PID 3168 wrote to memory of 1572 3168 cstealer.exe 119 PID 2072 wrote to memory of 3164 2072 Build.exe 118 PID 2072 wrote to memory of 3164 2072 Build.exe 118 PID 3164 wrote to memory of 4604 3164 based.exe 121 PID 3164 wrote to memory of 4604 3164 based.exe 121 PID 5028 wrote to memory of 4348 5028 hacn.exe 122 PID 5028 wrote to memory of 4348 5028 hacn.exe 122 PID 1572 wrote to memory of 4040 1572 cmd.exe 123 PID 1572 wrote to memory of 4040 1572 cmd.exe 123 PID 4348 wrote to memory of 372 4348 hacn.exe 124 PID 4348 wrote to memory of 372 4348 hacn.exe 124 PID 4040 wrote to memory of 944 4040 cstealer.exe 126 PID 4040 wrote to memory of 944 4040 cstealer.exe 126 PID 944 wrote to memory of 2432 944 cstealer.exe 128 PID 944 wrote to memory of 2432 944 cstealer.exe 128 PID 372 wrote to memory of 1516 372 cmd.exe 127 PID 372 wrote to memory of 1516 372 cmd.exe 127 PID 372 wrote to memory of 1516 372 cmd.exe 127 PID 2432 wrote to memory of 4968 2432 cmd.exe 130 PID 2432 wrote to memory of 4968 2432 cmd.exe 130 PID 4604 wrote to memory of 912 4604 based.exe 131 PID 4604 wrote to memory of 912 4604 based.exe 131 PID 4604 wrote to memory of 2928 4604 based.exe 132 PID 4604 wrote to memory of 2928 4604 based.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\DevxExecutor.exe"C:\Users\Admin\AppData\Local\Temp\DevxExecutor.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"4⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"7⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"10⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"13⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"16⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"19⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet20⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet21⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"22⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet23⤵
- Executes dropped EXE
PID:5392 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet24⤵
- Executes dropped EXE
PID:5812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"25⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet26⤵
- Executes dropped EXE
PID:6180 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet27⤵
- Executes dropped EXE
PID:6316 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"28⤵PID:6360
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet29⤵
- Executes dropped EXE
PID:6484 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet30⤵
- Executes dropped EXE
PID:6712 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"31⤵PID:6892
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet32⤵
- Executes dropped EXE
PID:6948 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet33⤵
- Executes dropped EXE
PID:7064 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"34⤵PID:7132
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet35⤵
- Executes dropped EXE
PID:6152 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet36⤵
- Executes dropped EXE
PID:5156 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"37⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet38⤵
- Executes dropped EXE
PID:6352 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet39⤵
- Executes dropped EXE
PID:6448 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"40⤵PID:6708
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet41⤵
- Executes dropped EXE
PID:6736 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet42⤵
- Executes dropped EXE
PID:6884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"43⤵PID:5688
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet44⤵
- Executes dropped EXE
PID:6368 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet45⤵
- Executes dropped EXE
PID:7008 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"46⤵PID:5324
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet47⤵
- Executes dropped EXE
PID:5612 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet48⤵
- Executes dropped EXE
PID:5288 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"49⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet50⤵
- Executes dropped EXE
PID:5180 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet51⤵
- Executes dropped EXE
PID:6204 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"52⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet53⤵
- Executes dropped EXE
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet54⤵
- Executes dropped EXE
PID:5256 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"55⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet56⤵
- Executes dropped EXE
PID:5568 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet57⤵
- Executes dropped EXE
PID:5656 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"58⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet59⤵
- Executes dropped EXE
PID:6632 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet60⤵
- Executes dropped EXE
PID:5592 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"61⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet62⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet63⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"64⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet65⤵
- Executes dropped EXE
PID:5744 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet66⤵
- Executes dropped EXE
PID:5228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"67⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet68⤵
- Executes dropped EXE
PID:6164 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet69⤵
- Executes dropped EXE
PID:6856 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"70⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet71⤵
- Executes dropped EXE
PID:6172 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet72⤵
- Executes dropped EXE
PID:6976 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"73⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet74⤵
- Executes dropped EXE
PID:6980 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet75⤵
- Executes dropped EXE
PID:6012 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"76⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet77⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet78⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"79⤵PID:5728
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV180⤵PID:7036
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet80⤵
- Executes dropped EXE
PID:6176 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet81⤵
- Executes dropped EXE
PID:6608 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"82⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet83⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet84⤵PID:5440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"85⤵PID:6788
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet86⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet87⤵PID:6812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"88⤵PID:6520
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet89⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet90⤵PID:4556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"91⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet92⤵PID:6212
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet93⤵PID:6108
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"94⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet95⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet96⤵PID:6440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"97⤵PID:5772
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet98⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet99⤵PID:5620
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"100⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet101⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet102⤵PID:7112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"103⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet104⤵PID:5556
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet105⤵PID:6800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"106⤵PID:6828
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet107⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet108⤵PID:3472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"109⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet110⤵PID:5876
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet111⤵PID:3604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"112⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet113⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet114⤵PID:3200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"115⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet116⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet117⤵PID:5516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"118⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet119⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet120⤵PID:5432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"121⤵PID:6468
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet122⤵PID:2932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-