Analysis
-
max time kernel
105s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
DevxExecutor.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DevxExecutor.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
DevxExecutor.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
DevxExecutor.exe
Resource
win11-20240426-en
General
-
Target
DevxExecutor.exe
-
Size
44.1MB
-
MD5
e4897ef7419e128b1f7473119ce0bd07
-
SHA1
5aad252412a5923438f30cb9c397731a9b020121
-
SHA256
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581
-
SHA512
db66ea2cb3f5f30934ab071e1dd2e7b41f6dc5c4be125f1d2d6aab627b3be8b6cf8fcbed517a414cdf037a068414b178176edba2e28de6419b65269e0abb162c
-
SSDEEP
786432:NCZkrrfdktmLX8t8lBBvUPlZIOPuOI64zlNWtVMoOIsuXzfVib4a9BWN:N4GlkcLMtUzilKUINzmtVkMfWo
Malware Config
Signatures
-
pid Process 6280 powershell.exe 6832 powershell.exe 4884 powershell.exe 5936 powershell.exe 5256 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation DevxExecutor.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation s.exe -
Executes dropped EXE 58 IoCs
pid Process 2680 cstealer.exe 2072 cstealer.exe 1688 main.exe 1292 main.exe 1836 cstealer.exe 2108 cstealer.exe 1300 cstealer.exe 2524 cstealer.exe 4196 Build.exe 4624 cstealer.exe 4224 cstealer.exe 2852 cstealer.exe 1868 cstealer.exe 3360 cstealer.exe 2292 cstealer.exe 3212 cstealer.exe 4728 cstealer.exe 824 cstealer.exe 1184 cstealer.exe 1668 cstealer.exe 900 cstealer.exe 2712 cstealer.exe 2856 cstealer.exe 3780 cstealer.exe 2880 cstealer.exe 456 cstealer.exe 4372 cstealer.exe 1992 cstealer.exe 628 cstealer.exe 4316 cstealer.exe 376 cstealer.exe 1528 cstealer.exe 3156 cstealer.exe 3260 cstealer.exe 4336 cstealer.exe 3312 cstealer.exe 3544 cstealer.exe 5160 cstealer.exe 5264 cstealer.exe 5396 cstealer.exe 5496 cstealer.exe 5592 cstealer.exe 5704 cstealer.exe 5540 hacn.exe 5848 based.exe 5888 cstealer.exe 6012 cstealer.exe 5176 based.exe 5212 hacn.exe 5472 cstealer.exe 5420 s.exe 6080 cstealer.exe 6304 cstealer.exe 6452 cstealer.exe 6528 main.exe 6772 svchost.exe 6200 setup.exe 7132 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 2072 cstealer.exe 1292 main.exe 2072 cstealer.exe 1292 main.exe 2072 cstealer.exe 2072 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2108 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 2524 cstealer.exe 4224 cstealer.exe 4224 cstealer.exe 4224 cstealer.exe 4224 cstealer.exe 4224 cstealer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/files/0x0007000000023281-88.dat upx behavioral3/memory/1292-97-0x00007FFE6D5A0000-0x00007FFE6DB88000-memory.dmp upx behavioral3/files/0x000700000002327e-108.dat upx behavioral3/files/0x000700000002327d-107.dat upx behavioral3/files/0x000700000002327c-106.dat upx behavioral3/files/0x000700000002327b-105.dat upx behavioral3/files/0x000700000002327a-104.dat upx behavioral3/files/0x0007000000023283-103.dat upx behavioral3/files/0x0007000000023282-102.dat upx behavioral3/files/0x0007000000023280-101.dat upx behavioral3/memory/1292-153-0x00007FFE6D5A0000-0x00007FFE6DB88000-memory.dmp upx behavioral3/memory/1292-158-0x00007FFE6D5A0000-0x00007FFE6DB88000-memory.dmp upx behavioral3/memory/5176-588-0x00007FFE4A8A0000-0x00007FFE4AE88000-memory.dmp upx behavioral3/memory/5176-592-0x00007FFE4A7E0000-0x00007FFE4A804000-memory.dmp upx behavioral3/memory/5176-593-0x00007FFE4A7D0000-0x00007FFE4A7DF000-memory.dmp upx behavioral3/memory/5176-598-0x00007FFE49D30000-0x00007FFE49D5D000-memory.dmp upx behavioral3/memory/5176-599-0x00007FFE49BA0000-0x00007FFE49BB9000-memory.dmp upx behavioral3/memory/5176-601-0x00007FFE49B70000-0x00007FFE49B93000-memory.dmp upx behavioral3/memory/5176-605-0x00007FFE499F0000-0x00007FFE49B63000-memory.dmp upx behavioral3/memory/5176-615-0x00007FFE499D0000-0x00007FFE499E9000-memory.dmp upx behavioral3/memory/5176-617-0x00007FFE499C0000-0x00007FFE499CD000-memory.dmp upx behavioral3/memory/5176-621-0x00007FFE4A790000-0x00007FFE4A7BE000-memory.dmp upx behavioral3/memory/5176-624-0x00007FFE49900000-0x00007FFE499B8000-memory.dmp upx behavioral3/memory/5176-623-0x00007FFE4A410000-0x00007FFE4A785000-memory.dmp upx behavioral3/memory/5176-631-0x00007FFE4A3C0000-0x00007FFE4A3CD000-memory.dmp upx behavioral3/memory/5176-630-0x00007FFE4A7E0000-0x00007FFE4A804000-memory.dmp upx behavioral3/memory/5176-629-0x00007FFE4A3D0000-0x00007FFE4A3E4000-memory.dmp upx behavioral3/memory/5176-628-0x00007FFE4A8A0000-0x00007FFE4AE88000-memory.dmp upx behavioral3/memory/5176-634-0x00007FFE491E0000-0x00007FFE492FC000-memory.dmp upx behavioral3/memory/5176-2205-0x00007FFE49B70000-0x00007FFE49B93000-memory.dmp upx behavioral3/memory/5176-2220-0x00007FFE499F0000-0x00007FFE49B63000-memory.dmp upx behavioral3/memory/5176-2380-0x00007FFE499D0000-0x00007FFE499E9000-memory.dmp upx behavioral3/memory/5176-3412-0x00007FFE4A410000-0x00007FFE4A785000-memory.dmp upx behavioral3/memory/5176-3411-0x00007FFE4A790000-0x00007FFE4A7BE000-memory.dmp upx behavioral3/memory/5176-3413-0x00007FFE49900000-0x00007FFE499B8000-memory.dmp upx behavioral3/memory/5176-4160-0x00007FFE491E0000-0x00007FFE492FC000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 66 raw.githubusercontent.com 147 raw.githubusercontent.com 304 raw.githubusercontent.com 65 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 72 api.ipify.org 69 ip-api.com 71 api.ipify.org -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6732 sc.exe 6164 sc.exe 7956 sc.exe 7364 sc.exe 2980 sc.exe -
Detects Pyinstaller 4 IoCs
resource yara_rule behavioral3/files/0x0008000000023259-7.dat pyinstaller behavioral3/files/0x0007000000023275-38.dat pyinstaller behavioral3/files/0x00030000000219e9-484.dat pyinstaller behavioral3/files/0x0008000000023406-700.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3988 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 6180 timeout.exe 4912 timeout.exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 5248 tasklist.exe 8532 tasklist.exe 7112 tasklist.exe 6560 tasklist.exe 6332 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 7016 systeminfo.exe -
Kills process with taskkill 7 IoCs
pid Process 7884 taskkill.exe 7740 taskkill.exe 2604 taskkill.exe 8288 taskkill.exe 8356 taskkill.exe 8416 taskkill.exe 6408 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 8236 reg.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 5924 powershell.exe 5924 powershell.exe 5936 powershell.exe 5936 powershell.exe 5256 powershell.exe 5256 powershell.exe 5924 powershell.exe 5936 powershell.exe 5256 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5924 powershell.exe Token: SeDebugPrivilege 5936 powershell.exe Token: SeDebugPrivilege 5256 powershell.exe Token: SeDebugPrivilege 6560 tasklist.exe Token: SeDebugPrivilege 7112 tasklist.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 2680 4748 DevxExecutor.exe 90 PID 4748 wrote to memory of 2680 4748 DevxExecutor.exe 90 PID 2680 wrote to memory of 2072 2680 cstealer.exe 91 PID 2680 wrote to memory of 2072 2680 cstealer.exe 91 PID 4748 wrote to memory of 1688 4748 DevxExecutor.exe 92 PID 4748 wrote to memory of 1688 4748 DevxExecutor.exe 92 PID 1688 wrote to memory of 1292 1688 main.exe 93 PID 1688 wrote to memory of 1292 1688 main.exe 93 PID 1292 wrote to memory of 4568 1292 main.exe 94 PID 1292 wrote to memory of 4568 1292 main.exe 94 PID 2072 wrote to memory of 4316 2072 cstealer.exe 96 PID 2072 wrote to memory of 4316 2072 cstealer.exe 96 PID 4316 wrote to memory of 1836 4316 cmd.exe 98 PID 4316 wrote to memory of 1836 4316 cmd.exe 98 PID 1836 wrote to memory of 2108 1836 cstealer.exe 99 PID 1836 wrote to memory of 2108 1836 cstealer.exe 99 PID 2108 wrote to memory of 3936 2108 cstealer.exe 101 PID 2108 wrote to memory of 3936 2108 cstealer.exe 101 PID 3936 wrote to memory of 1300 3936 cmd.exe 103 PID 3936 wrote to memory of 1300 3936 cmd.exe 103 PID 1300 wrote to memory of 2524 1300 cstealer.exe 104 PID 1300 wrote to memory of 2524 1300 cstealer.exe 104 PID 4568 wrote to memory of 4196 4568 cmd.exe 100 PID 4568 wrote to memory of 4196 4568 cmd.exe 100 PID 4568 wrote to memory of 4196 4568 cmd.exe 100 PID 2524 wrote to memory of 3792 2524 cstealer.exe 105 PID 2524 wrote to memory of 3792 2524 cstealer.exe 105 PID 3792 wrote to memory of 4624 3792 cmd.exe 107 PID 3792 wrote to memory of 4624 3792 cmd.exe 107 PID 4624 wrote to memory of 4224 4624 cstealer.exe 108 PID 4624 wrote to memory of 4224 4624 cstealer.exe 108 PID 4224 wrote to memory of 488 4224 cstealer.exe 111 PID 4224 wrote to memory of 488 4224 cstealer.exe 111 PID 488 wrote to memory of 2852 488 cmd.exe 113 PID 488 wrote to memory of 2852 488 cmd.exe 113 PID 2852 wrote to memory of 1868 2852 cstealer.exe 114 PID 2852 wrote to memory of 1868 2852 cstealer.exe 114 PID 1868 wrote to memory of 4988 1868 cstealer.exe 116 PID 1868 wrote to memory of 4988 1868 cstealer.exe 116 PID 4988 wrote to memory of 3360 4988 cmd.exe 118 PID 4988 wrote to memory of 3360 4988 cmd.exe 118 PID 3360 wrote to memory of 2292 3360 cstealer.exe 119 PID 3360 wrote to memory of 2292 3360 cstealer.exe 119 PID 2292 wrote to memory of 4456 2292 cstealer.exe 121 PID 2292 wrote to memory of 4456 2292 cstealer.exe 121 PID 4456 wrote to memory of 3212 4456 cmd.exe 123 PID 4456 wrote to memory of 3212 4456 cmd.exe 123 PID 3212 wrote to memory of 4728 3212 cstealer.exe 124 PID 3212 wrote to memory of 4728 3212 cstealer.exe 124 PID 4728 wrote to memory of 1080 4728 cstealer.exe 125 PID 4728 wrote to memory of 1080 4728 cstealer.exe 125 PID 1080 wrote to memory of 824 1080 cmd.exe 127 PID 1080 wrote to memory of 824 1080 cmd.exe 127 PID 824 wrote to memory of 1184 824 cstealer.exe 128 PID 824 wrote to memory of 1184 824 cstealer.exe 128 PID 1184 wrote to memory of 4692 1184 cstealer.exe 129 PID 1184 wrote to memory of 4692 1184 cstealer.exe 129 PID 4692 wrote to memory of 1668 4692 cmd.exe 131 PID 4692 wrote to memory of 1668 4692 cmd.exe 131 PID 1668 wrote to memory of 900 1668 cstealer.exe 132 PID 1668 wrote to memory of 900 1668 cstealer.exe 132 PID 900 wrote to memory of 4896 900 cstealer.exe 136 PID 900 wrote to memory of 4896 900 cstealer.exe 136 PID 4896 wrote to memory of 2712 4896 cmd.exe 138
Processes
-
C:\Users\Admin\AppData\Local\Temp\DevxExecutor.exe"C:\Users\Admin\AppData\Local\Temp\DevxExecutor.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"4⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"7⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"10⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"13⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"16⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"19⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"22⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet24⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"25⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet26⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet27⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"28⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet29⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet30⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"31⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet32⤵
- Executes dropped EXE
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet33⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"34⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet35⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet36⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"37⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet38⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet39⤵
- Executes dropped EXE
PID:628 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"40⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet41⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet42⤵
- Executes dropped EXE
PID:376 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"43⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet44⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet45⤵
- Executes dropped EXE
PID:3156 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"46⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet47⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet48⤵
- Executes dropped EXE
PID:4336 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"49⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet50⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet51⤵
- Executes dropped EXE
PID:3544 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"52⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet53⤵
- Executes dropped EXE
PID:5160 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet54⤵
- Executes dropped EXE
PID:5264 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"55⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet56⤵
- Executes dropped EXE
PID:5396 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet57⤵
- Executes dropped EXE
PID:5496 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"58⤵PID:5548
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet59⤵
- Executes dropped EXE
PID:5592 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet60⤵
- Executes dropped EXE
PID:5704 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"61⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet62⤵
- Executes dropped EXE
PID:5888 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet63⤵
- Executes dropped EXE
PID:6012 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"64⤵PID:5412
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet65⤵
- Executes dropped EXE
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet66⤵
- Executes dropped EXE
PID:6080 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"67⤵PID:6092
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet68⤵
- Executes dropped EXE
PID:6304 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet69⤵
- Executes dropped EXE
PID:6452 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"70⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet71⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet72⤵PID:4544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"73⤵PID:9084
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet74⤵PID:8992
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet75⤵PID:1336
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"76⤵PID:7680
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet77⤵PID:7732
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet78⤵PID:7284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"79⤵PID:7596
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet80⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet81⤵PID:8720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"82⤵PID:7376
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet83⤵PID:9152
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet84⤵PID:5220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"85⤵PID:8140
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet86⤵PID:6716
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet87⤵PID:3832
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"88⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet89⤵PID:7628
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet90⤵PID:940
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"91⤵PID:7216
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet92⤵PID:6448
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet93⤵PID:8948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"94⤵PID:9000
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet95⤵PID:7952
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet96⤵PID:8280
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"97⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet98⤵PID:7844
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet99⤵PID:6900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"100⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet101⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet102⤵PID:672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"103⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet104⤵PID:7476
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet105⤵PID:5240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"106⤵PID:5960
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet107⤵PID:8696
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet108⤵PID:7020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"109⤵PID:7936
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet110⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet111⤵PID:2724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"112⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet113⤵PID:8188
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet114⤵PID:8776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"115⤵PID:7516
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet116⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet117⤵PID:5248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"118⤵PID:9088
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet119⤵PID:7772
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet120⤵PID:1816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"121⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet122⤵PID:5824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-