Resubmissions
09-05-2024 12:59
240509-p8d4fsdf27 1009-05-2024 12:50
240509-p298badc26 1009-05-2024 12:45
240509-py7b9aab8t 809-05-2024 12:25
240509-plr2sscb99 10Analysis
-
max time kernel
16s -
max time network
123s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-05-2024 12:45
Static task
static1
General
-
Target
DevxExecutor.exe
-
Size
44.1MB
-
MD5
e4897ef7419e128b1f7473119ce0bd07
-
SHA1
5aad252412a5923438f30cb9c397731a9b020121
-
SHA256
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581
-
SHA512
db66ea2cb3f5f30934ab071e1dd2e7b41f6dc5c4be125f1d2d6aab627b3be8b6cf8fcbed517a414cdf037a068414b178176edba2e28de6419b65269e0abb162c
-
SSDEEP
786432:NCZkrrfdktmLX8t8lBBvUPlZIOPuOI64zlNWtVMoOIsuXzfVib4a9BWN:N4GlkcLMtUzilKUINzmtVkMfWo
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 5864 powershell.exe 6160 powershell.exe 6408 powershell.exe 5276 powershell.exe 6440 powershell.exe -
Contacts a large (925) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 31 IoCs
Processes:
cstealer.execstealer.execstealer.execstealer.execstealer.execstealer.exemain.exemain.execstealer.execstealer.execstealer.execstealer.execstealer.execstealer.exeBuild.execstealer.execstealer.execstealer.execstealer.exehacn.exehacn.exebased.exebased.execstealer.execstealer.exes.execstealer.execstealer.exemain.exesvchost.exesetup.exepid process 4072 cstealer.exe 2272 cstealer.exe 2896 cstealer.exe 2904 cstealer.exe 1956 cstealer.exe 3844 cstealer.exe 3512 main.exe 2948 main.exe 4352 cstealer.exe 1168 cstealer.exe 1624 cstealer.exe 3720 cstealer.exe 2360 cstealer.exe 900 cstealer.exe 4940 Build.exe 3624 cstealer.exe 400 cstealer.exe 3896 cstealer.exe 2236 cstealer.exe 3308 hacn.exe 3620 hacn.exe 1480 based.exe 3360 based.exe 5508 cstealer.exe 5812 cstealer.exe 6204 s.exe 6892 cstealer.exe 6692 cstealer.exe 5828 main.exe 4836 svchost.exe 7284 setup.exe -
Loads dropped DLL 64 IoCs
Processes:
cstealer.execstealer.execstealer.exemain.execstealer.exepid process 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2272 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 2904 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 3844 cstealer.exe 2948 main.exe 2948 main.exe 1168 cstealer.exe 1168 cstealer.exe 1168 cstealer.exe 1168 cstealer.exe 1168 cstealer.exe 1168 cstealer.exe 1168 cstealer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2948-156-0x00007FFB21870000-0x00007FFB21E58000-memory.dmp upx behavioral1/memory/2948-221-0x00007FFB21870000-0x00007FFB21E58000-memory.dmp upx behavioral1/memory/3360-321-0x00007FFB1CFE0000-0x00007FFB1D5C8000-memory.dmp upx behavioral1/memory/3360-323-0x00007FFB1CF80000-0x00007FFB1CF8F000-memory.dmp upx behavioral1/memory/3360-322-0x00007FFB1CF90000-0x00007FFB1CFB4000-memory.dmp upx behavioral1/memory/3360-383-0x00007FFB1CC70000-0x00007FFB1CC89000-memory.dmp upx behavioral1/memory/3360-384-0x00007FFB1CC60000-0x00007FFB1CC6D000-memory.dmp upx behavioral1/memory/3360-385-0x00007FFB1CC30000-0x00007FFB1CC5E000-memory.dmp upx behavioral1/memory/3360-380-0x00007FFB1CC90000-0x00007FFB1CE03000-memory.dmp upx behavioral1/memory/3360-371-0x00007FFB1CE10000-0x00007FFB1CE33000-memory.dmp upx behavioral1/memory/3360-388-0x00007FFB1CB70000-0x00007FFB1CC28000-memory.dmp upx behavioral1/memory/3360-369-0x00007FFB1CE40000-0x00007FFB1CE59000-memory.dmp upx behavioral1/memory/3360-368-0x00007FFB1CE60000-0x00007FFB1CE8D000-memory.dmp upx behavioral1/memory/3360-390-0x00007FFB1C7F0000-0x00007FFB1CB65000-memory.dmp upx behavioral1/memory/3360-397-0x00007FFB1C7C0000-0x00007FFB1C7CD000-memory.dmp upx behavioral1/memory/3360-396-0x00007FFB1C7D0000-0x00007FFB1C7E4000-memory.dmp upx behavioral1/memory/3360-407-0x00007FFB1C6A0000-0x00007FFB1C7BC000-memory.dmp upx behavioral1/memory/3360-406-0x00007FFB1CFE0000-0x00007FFB1D5C8000-memory.dmp upx behavioral1/memory/3360-2300-0x00007FFB1CF90000-0x00007FFB1CFB4000-memory.dmp upx behavioral1/memory/3360-2554-0x00007FFB1CE10000-0x00007FFB1CE33000-memory.dmp upx behavioral1/memory/3360-2669-0x00007FFB1C7D0000-0x00007FFB1C7E4000-memory.dmp upx behavioral1/memory/3360-2660-0x00007FFB1CF80000-0x00007FFB1CF8F000-memory.dmp upx behavioral1/memory/3360-2674-0x00007FFB1C6A0000-0x00007FFB1C7BC000-memory.dmp upx behavioral1/memory/3360-2673-0x00007FFB1C7C0000-0x00007FFB1C7CD000-memory.dmp upx behavioral1/memory/3360-2672-0x00007FFB1CFE0000-0x00007FFB1D5C8000-memory.dmp upx behavioral1/memory/3360-2668-0x00007FFB1CB70000-0x00007FFB1CC28000-memory.dmp upx behavioral1/memory/3360-2667-0x00007FFB1CC30000-0x00007FFB1CC5E000-memory.dmp upx behavioral1/memory/3360-2666-0x00007FFB1CC60000-0x00007FFB1CC6D000-memory.dmp upx behavioral1/memory/3360-2665-0x00007FFB1CC70000-0x00007FFB1CC89000-memory.dmp upx behavioral1/memory/3360-2664-0x00007FFB1CC90000-0x00007FFB1CE03000-memory.dmp upx behavioral1/memory/3360-2663-0x00007FFB1CE10000-0x00007FFB1CE33000-memory.dmp upx behavioral1/memory/3360-2662-0x00007FFB1CE40000-0x00007FFB1CE59000-memory.dmp upx behavioral1/memory/3360-2661-0x00007FFB1CE60000-0x00007FFB1CE8D000-memory.dmp upx behavioral1/memory/3360-2659-0x00007FFB1CF90000-0x00007FFB1CFB4000-memory.dmp upx behavioral1/memory/3360-2658-0x00007FFB1C7F0000-0x00007FFB1CB65000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
Processes:
flow ioc 87 raw.githubusercontent.com 147 discord.com 178 discord.com 9 discord.com 24 discord.com 38 raw.githubusercontent.com 40 raw.githubusercontent.com 74 discord.com 1 raw.githubusercontent.com 1 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 api.ipify.org 25 ip-api.com 42 api.ipify.org -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 14432 sc.exe 14492 sc.exe 6080 sc.exe 6164 sc.exe 14412 sc.exe 6448 sc.exe 1892 sc.exe 5500 sc.exe 8312 sc.exe 6452 sc.exe -
Detects Pyinstaller 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\cstealer.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\main.exe pyinstaller C:\ProgramData\Microsoft\hacn.exe pyinstaller C:\ProgramData\svchost.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 7240 schtasks.exe 14676 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 8068 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid process 5936 tasklist.exe 5900 tasklist.exe 7132 tasklist.exe 8172 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 5864 powershell.exe 5864 powershell.exe 4948 powershell.exe 4948 powershell.exe 6160 powershell.exe 6160 powershell.exe 7056 powershell.exe 7056 powershell.exe 5864 powershell.exe 5864 powershell.exe 6440 powershell.exe 6440 powershell.exe 6160 powershell.exe 4948 powershell.exe 7056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
Processes:
firefox.exetasklist.exetasklist.exepowershell.exepowershell.exepowershell.exeWMIC.exetasklist.exepowershell.exepowershell.exemain.exedescription pid process Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 5900 tasklist.exe Token: SeDebugPrivilege 5936 tasklist.exe Token: SeDebugPrivilege 5864 powershell.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeDebugPrivilege 6160 powershell.exe Token: SeIncreaseQuotaPrivilege 7124 WMIC.exe Token: SeSecurityPrivilege 7124 WMIC.exe Token: SeTakeOwnershipPrivilege 7124 WMIC.exe Token: SeLoadDriverPrivilege 7124 WMIC.exe Token: SeSystemProfilePrivilege 7124 WMIC.exe Token: SeSystemtimePrivilege 7124 WMIC.exe Token: SeProfSingleProcessPrivilege 7124 WMIC.exe Token: SeIncBasePriorityPrivilege 7124 WMIC.exe Token: SeCreatePagefilePrivilege 7124 WMIC.exe Token: SeBackupPrivilege 7124 WMIC.exe Token: SeRestorePrivilege 7124 WMIC.exe Token: SeShutdownPrivilege 7124 WMIC.exe Token: SeDebugPrivilege 7124 WMIC.exe Token: SeSystemEnvironmentPrivilege 7124 WMIC.exe Token: SeRemoteShutdownPrivilege 7124 WMIC.exe Token: SeUndockPrivilege 7124 WMIC.exe Token: SeManageVolumePrivilege 7124 WMIC.exe Token: 33 7124 WMIC.exe Token: 34 7124 WMIC.exe Token: 35 7124 WMIC.exe Token: 36 7124 WMIC.exe Token: SeDebugPrivilege 7132 tasklist.exe Token: SeDebugPrivilege 7056 powershell.exe Token: SeDebugPrivilege 6440 powershell.exe Token: SeIncreaseQuotaPrivilege 7124 WMIC.exe Token: SeSecurityPrivilege 7124 WMIC.exe Token: SeTakeOwnershipPrivilege 7124 WMIC.exe Token: SeLoadDriverPrivilege 7124 WMIC.exe Token: SeSystemProfilePrivilege 7124 WMIC.exe Token: SeSystemtimePrivilege 7124 WMIC.exe Token: SeProfSingleProcessPrivilege 7124 WMIC.exe Token: SeIncBasePriorityPrivilege 7124 WMIC.exe Token: SeCreatePagefilePrivilege 7124 WMIC.exe Token: SeBackupPrivilege 7124 WMIC.exe Token: SeRestorePrivilege 7124 WMIC.exe Token: SeShutdownPrivilege 7124 WMIC.exe Token: SeDebugPrivilege 7124 WMIC.exe Token: SeSystemEnvironmentPrivilege 7124 WMIC.exe Token: SeRemoteShutdownPrivilege 7124 WMIC.exe Token: SeUndockPrivilege 7124 WMIC.exe Token: SeManageVolumePrivilege 7124 WMIC.exe Token: 33 7124 WMIC.exe Token: 34 7124 WMIC.exe Token: 35 7124 WMIC.exe Token: 36 7124 WMIC.exe Token: SeDebugPrivilege 5828 main.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid process 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 1468 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
DevxExecutor.execstealer.execstealer.execmd.execstealer.execstealer.execmd.execstealer.execstealer.exemain.execmd.execstealer.execstealer.execmd.execstealer.exemain.execmd.execstealer.execmd.execstealer.execmd.execstealer.execstealer.exefirefox.execmd.execstealer.exedescription pid process target process PID 2444 wrote to memory of 4072 2444 DevxExecutor.exe cstealer.exe PID 2444 wrote to memory of 4072 2444 DevxExecutor.exe cstealer.exe PID 4072 wrote to memory of 2272 4072 cstealer.exe cstealer.exe PID 4072 wrote to memory of 2272 4072 cstealer.exe cstealer.exe PID 2272 wrote to memory of 4452 2272 cstealer.exe cmd.exe PID 2272 wrote to memory of 4452 2272 cstealer.exe cmd.exe PID 4452 wrote to memory of 2896 4452 cmd.exe cstealer.exe PID 4452 wrote to memory of 2896 4452 cmd.exe cstealer.exe PID 2896 wrote to memory of 2904 2896 cstealer.exe cstealer.exe PID 2896 wrote to memory of 2904 2896 cstealer.exe cstealer.exe PID 2904 wrote to memory of 2216 2904 cstealer.exe cmd.exe PID 2904 wrote to memory of 2216 2904 cstealer.exe cmd.exe PID 2216 wrote to memory of 1956 2216 cmd.exe cstealer.exe PID 2216 wrote to memory of 1956 2216 cmd.exe cstealer.exe PID 1956 wrote to memory of 3844 1956 cstealer.exe cstealer.exe PID 1956 wrote to memory of 3844 1956 cstealer.exe cstealer.exe PID 2444 wrote to memory of 3512 2444 DevxExecutor.exe main.exe PID 2444 wrote to memory of 3512 2444 DevxExecutor.exe main.exe PID 3844 wrote to memory of 2844 3844 cstealer.exe cmd.exe PID 3844 wrote to memory of 2844 3844 cstealer.exe cmd.exe PID 3512 wrote to memory of 2948 3512 main.exe main.exe PID 3512 wrote to memory of 2948 3512 main.exe main.exe PID 2844 wrote to memory of 4352 2844 cmd.exe cstealer.exe PID 2844 wrote to memory of 4352 2844 cmd.exe cstealer.exe PID 4352 wrote to memory of 1168 4352 cstealer.exe cstealer.exe PID 4352 wrote to memory of 1168 4352 cstealer.exe cstealer.exe PID 1168 wrote to memory of 1076 1168 cstealer.exe cmd.exe PID 1168 wrote to memory of 1076 1168 cstealer.exe cmd.exe PID 1076 wrote to memory of 1624 1076 cmd.exe cstealer.exe PID 1076 wrote to memory of 1624 1076 cmd.exe cstealer.exe PID 1624 wrote to memory of 3720 1624 cstealer.exe cstealer.exe PID 1624 wrote to memory of 3720 1624 cstealer.exe cstealer.exe PID 2948 wrote to memory of 4760 2948 main.exe cmd.exe PID 2948 wrote to memory of 4760 2948 main.exe cmd.exe PID 4936 wrote to memory of 2360 4936 cmd.exe cstealer.exe PID 4936 wrote to memory of 2360 4936 cmd.exe cstealer.exe PID 2360 wrote to memory of 900 2360 cstealer.exe cstealer.exe PID 2360 wrote to memory of 900 2360 cstealer.exe cstealer.exe PID 4760 wrote to memory of 4940 4760 cmd.exe Build.exe PID 4760 wrote to memory of 4940 4760 cmd.exe Build.exe PID 4760 wrote to memory of 4940 4760 cmd.exe Build.exe PID 900 wrote to memory of 2124 900 cstealer.exe cmd.exe PID 900 wrote to memory of 2124 900 cstealer.exe cmd.exe PID 2124 wrote to memory of 3624 2124 cmd.exe cstealer.exe PID 2124 wrote to memory of 3624 2124 cmd.exe cstealer.exe PID 3624 wrote to memory of 400 3624 cstealer.exe cstealer.exe PID 3624 wrote to memory of 400 3624 cstealer.exe cstealer.exe PID 400 wrote to memory of 2312 400 cstealer.exe cmd.exe PID 400 wrote to memory of 2312 400 cstealer.exe cmd.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2752 wrote to memory of 1468 2752 firefox.exe firefox.exe PID 2312 wrote to memory of 3896 2312 cmd.exe cstealer.exe PID 2312 wrote to memory of 3896 2312 cmd.exe cstealer.exe PID 3896 wrote to memory of 2236 3896 cstealer.exe cstealer.exe PID 3896 wrote to memory of 2236 3896 cstealer.exe cstealer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DevxExecutor.exe"C:\Users\Admin\AppData\Local\Temp\DevxExecutor.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"4⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"7⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"10⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"13⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet15⤵
- Executes dropped EXE
PID:3720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"16⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"19⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"22⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet24⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"25⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet26⤵
- Executes dropped EXE
PID:5508 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet27⤵
- Executes dropped EXE
PID:5812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"28⤵PID:6856
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet29⤵
- Executes dropped EXE
PID:6892 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet30⤵
- Executes dropped EXE
PID:6692 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"31⤵PID:7352
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet32⤵PID:7600
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet33⤵PID:7744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"34⤵PID:7684
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet35⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet36⤵PID:7092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"37⤵PID:6896
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet38⤵PID:7720
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet39⤵PID:8212
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"40⤵PID:8396
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet41⤵PID:8364
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet42⤵PID:8244
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"43⤵PID:8420
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet44⤵PID:8448
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet45⤵PID:8516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"46⤵PID:8596
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet47⤵PID:8660
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet48⤵PID:8740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"49⤵PID:9012
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet50⤵PID:8964
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet51⤵PID:9076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"52⤵PID:7912
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet53⤵PID:8144
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet54⤵PID:8052
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"55⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet56⤵PID:6708
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet57⤵PID:7636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"58⤵PID:6400
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet59⤵PID:7484
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet60⤵PID:6512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"61⤵PID:7536
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet62⤵PID:6268
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet63⤵PID:8404
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"64⤵PID:7916
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet65⤵PID:8272
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet66⤵PID:8700
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"67⤵PID:8856
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet68⤵PID:8944
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet69⤵PID:1988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"70⤵PID:5908
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet71⤵PID:7980
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet72⤵PID:8008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"73⤵PID:8032
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet74⤵PID:8000
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet75⤵PID:7180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"76⤵PID:7260
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet77⤵PID:6636
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet78⤵PID:4440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"79⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet80⤵PID:7076
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet81⤵PID:1472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"82⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet83⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet84⤵PID:7492
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"85⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet86⤵PID:7020
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet87⤵PID:5880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"88⤵PID:7844
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet89⤵PID:8492
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet90⤵PID:7360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"91⤵PID:8532
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet92⤵PID:8692
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet93⤵PID:8804
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"94⤵PID:8564
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet95⤵PID:8916
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet96⤵PID:5936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"97⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet98⤵PID:8012
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet99⤵PID:8044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"100⤵PID:9204
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet101⤵PID:8068
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet102⤵PID:6192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"103⤵PID:7524
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet104⤵PID:6580
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet105⤵PID:5156
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"106⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet107⤵PID:7488
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet108⤵PID:4724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"109⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet110⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet111⤵PID:5704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"112⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet113⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet114⤵PID:8512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"115⤵PID:8820
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet116⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet117⤵PID:7900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"118⤵PID:8616
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet119⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet120⤵PID:7192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"121⤵PID:9140
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet122⤵PID:8172
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-