Analysis
-
max time kernel
85s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe
Resource
win10v2004-20240508-en
General
-
Target
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe
-
Size
44.1MB
-
MD5
e4897ef7419e128b1f7473119ce0bd07
-
SHA1
5aad252412a5923438f30cb9c397731a9b020121
-
SHA256
6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581
-
SHA512
db66ea2cb3f5f30934ab071e1dd2e7b41f6dc5c4be125f1d2d6aab627b3be8b6cf8fcbed517a414cdf037a068414b178176edba2e28de6419b65269e0abb162c
-
SSDEEP
786432:NCZkrrfdktmLX8t8lBBvUPlZIOPuOI64zlNWtVMoOIsuXzfVib4a9BWN:N4GlkcLMtUzilKUINzmtVkMfWo
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 10872 created 1020 10872 WerFault.exe 13 -
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 5764 created 3556 5764 setup.exe 56 PID 5764 created 3556 5764 setup.exe 56 PID 5764 created 3556 5764 setup.exe 56 PID 5764 created 3556 5764 setup.exe 56 PID 5764 created 3556 5764 setup.exe 56 PID 5764 created 3556 5764 setup.exe 56 PID 7864 created 3556 7864 updater.exe 56 PID 7864 created 3556 7864 updater.exe 56 PID 7864 created 3556 7864 updater.exe 56 PID 7864 created 3556 7864 updater.exe 56 PID 7864 created 3556 7864 updater.exe 56 PID 12544 created 1020 12544 svchost.exe 13 -
pid Process 3232 powershell.exe 7020 powershell.exe 6184 powershell.exe 2420 powershell.exe 5356 powershell.exe -
Contacts a large (1167) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation s.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation main.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 64 IoCs
pid Process 3548 cstealer.exe 2256 cstealer.exe 4600 cstealer.exe 2404 cstealer.exe 4156 cstealer.exe 372 cstealer.exe 4720 cstealer.exe 1304 cstealer.exe 1240 cstealer.exe 5032 cstealer.exe 4852 main.exe 3712 main.exe 740 cstealer.exe 3640 cstealer.exe 4552 Build.exe 3424 cstealer.exe 1620 cstealer.exe 1716 cstealer.exe 3284 cstealer.exe 3964 cstealer.exe 4232 hacn.exe 1456 cstealer.exe 2676 based.exe 3076 hacn.exe 5012 based.exe 4184 cstealer.exe 2688 s.exe 5024 cstealer.exe 3344 cstealer.exe 2324 cstealer.exe 2948 main.exe 5256 svchost.exe 5764 setup.exe 5904 cstealer.exe 5952 svchost.exe 1348 cstealer.exe 7264 cstealer.exe 7420 cstealer.exe 7712 cstealer.exe 7888 cstealer.exe 6828 cstealer.exe 8228 cstealer.exe 8300 cstealer.exe 8408 cstealer.exe 6716 cstealer.exe 8868 cstealer.exe 9200 cstealer.exe 6040 cstealer.exe 6184 rar.exe 6360 cstealer.exe 6456 cstealer.exe 7064 cstealer.exe 6760 cstealer.exe 6640 cstealer.exe 5660 cstealer.exe 5220 cstealer.exe 7468 Update.exe 7672 cstealer.exe 7944 cstealer.exe 8136 cstealer.exe 5844 cstealer.exe 5620 cstealer.exe 5760 cstealer.exe 2396 cstealer.exe -
Loads dropped DLL 64 IoCs
pid Process 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2256 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 2404 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 372 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe 1304 cstealer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3712-197-0x00007FF8E3B90000-0x00007FF8E4178000-memory.dmp upx behavioral2/memory/3712-221-0x00007FF8E3B90000-0x00007FF8E4178000-memory.dmp upx behavioral2/memory/5012-335-0x00007FF8EB570000-0x00007FF8EBB58000-memory.dmp upx behavioral2/memory/5012-336-0x00007FF8EAF50000-0x00007FF8EAF74000-memory.dmp upx behavioral2/memory/5012-337-0x00007FF8EADD0000-0x00007FF8EADDF000-memory.dmp upx behavioral2/memory/5012-363-0x00007FF8E7020000-0x00007FF8E704D000-memory.dmp upx behavioral2/memory/5012-366-0x00007FF8E5200000-0x00007FF8E5373000-memory.dmp upx behavioral2/memory/5012-368-0x00007FF8E73C0000-0x00007FF8E73CD000-memory.dmp upx behavioral2/memory/5012-367-0x00007FF8E6EA0000-0x00007FF8E6EB9000-memory.dmp upx behavioral2/memory/5012-370-0x00007FF8E6A30000-0x00007FF8E6AE8000-memory.dmp upx behavioral2/memory/5012-369-0x00007FF8E6E70000-0x00007FF8E6E9E000-memory.dmp upx behavioral2/memory/5012-372-0x00007FF8E3C90000-0x00007FF8E4005000-memory.dmp upx behavioral2/memory/5012-365-0x00007FF8E6EE0000-0x00007FF8E6F03000-memory.dmp upx behavioral2/memory/5012-364-0x00007FF8E7000000-0x00007FF8E7019000-memory.dmp upx behavioral2/memory/5012-379-0x00007FF8E50E0000-0x00007FF8E51FC000-memory.dmp upx behavioral2/memory/5012-380-0x00007FF8E6FF0000-0x00007FF8E6FFD000-memory.dmp upx behavioral2/memory/5012-378-0x00007FF8E6E50000-0x00007FF8E6E64000-memory.dmp upx behavioral2/memory/5012-377-0x00007FF8EB570000-0x00007FF8EBB58000-memory.dmp upx behavioral2/memory/5012-1975-0x00007FF8EAF50000-0x00007FF8EAF74000-memory.dmp upx behavioral2/memory/5012-2625-0x00007FF8E5200000-0x00007FF8E5373000-memory.dmp upx behavioral2/memory/5012-2623-0x00007FF8E6EE0000-0x00007FF8E6F03000-memory.dmp upx behavioral2/memory/5012-2833-0x00007FF8E6EA0000-0x00007FF8E6EB9000-memory.dmp upx behavioral2/memory/5012-3870-0x00007FF8E50E0000-0x00007FF8E51FC000-memory.dmp upx behavioral2/memory/5012-3876-0x00007FF8EB570000-0x00007FF8EBB58000-memory.dmp upx behavioral2/memory/5012-3869-0x00007FF8E6E50000-0x00007FF8E6E64000-memory.dmp upx behavioral2/memory/5012-3868-0x00007FF8E6A30000-0x00007FF8E6AE8000-memory.dmp upx behavioral2/memory/5012-3867-0x00007FF8E6FF0000-0x00007FF8E6FFD000-memory.dmp upx behavioral2/memory/5012-3866-0x00007FF8E6E70000-0x00007FF8E6E9E000-memory.dmp upx behavioral2/memory/5012-3865-0x00007FF8E73C0000-0x00007FF8E73CD000-memory.dmp upx behavioral2/memory/5012-3864-0x00007FF8E6EA0000-0x00007FF8E6EB9000-memory.dmp upx behavioral2/memory/5012-3863-0x00007FF8E5200000-0x00007FF8E5373000-memory.dmp upx behavioral2/memory/5012-3859-0x00007FF8E6EE0000-0x00007FF8E6F03000-memory.dmp upx behavioral2/memory/5012-3858-0x00007FF8E7000000-0x00007FF8E7019000-memory.dmp upx behavioral2/memory/5012-3857-0x00007FF8E7020000-0x00007FF8E704D000-memory.dmp upx behavioral2/memory/5012-3856-0x00007FF8EADD0000-0x00007FF8EADDF000-memory.dmp upx behavioral2/memory/5012-3854-0x00007FF8EAF50000-0x00007FF8EAF74000-memory.dmp upx behavioral2/memory/5012-3853-0x00007FF8E3C90000-0x00007FF8E4005000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\кокершмидт = "C:\\ProgramData\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 21 raw.githubusercontent.com 24 raw.githubusercontent.com 90 raw.githubusercontent.com 93 discord.com 95 discord.com 20 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com 29 api.ipify.org 30 api.ipify.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5952 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5764 set thread context of 7816 5764 setup.exe 353 PID 7864 set thread context of 11108 7864 updater.exe 508 PID 7864 set thread context of 12028 7864 updater.exe 527 PID 7864 set thread context of 12600 7864 updater.exe 530 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe setup.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5688 sc.exe 7428 sc.exe 10332 sc.exe 7480 sc.exe 1876 sc.exe 5000 sc.exe 10412 sc.exe 10512 sc.exe 10732 sc.exe 10792 sc.exe -
Detects Pyinstaller 4 IoCs
resource yara_rule behavioral2/files/0x0005000000022ab6-7.dat pyinstaller behavioral2/files/0x0007000000023495-182.dat pyinstaller behavioral2/files/0x00080000000234cb-270.dat pyinstaller behavioral2/files/0x00080000000234ef-469.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7724 schtasks.exe 11480 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6436 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 7456 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 4456 tasklist.exe 3496 tasklist.exe 6048 tasklist.exe 5184 tasklist.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5924 systeminfo.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\MostRecentlyUsed RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\CurrentWorkingDirectory RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\PersistedStorageItemTable\ManagedByApp RuntimeBroker.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 8836 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 powershell.exe 2420 powershell.exe 5244 powershell.exe 5244 powershell.exe 5356 powershell.exe 5356 powershell.exe 5820 powershell.exe 5820 powershell.exe 2420 powershell.exe 2420 powershell.exe 3232 powershell.exe 3232 powershell.exe 5244 powershell.exe 5244 powershell.exe 5820 powershell.exe 3232 powershell.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 2948 main.exe 5356 powershell.exe 8780 powershell.exe 8780 powershell.exe 8780 powershell.exe 9028 powershell.exe 9028 powershell.exe 9028 powershell.exe 7184 powershell.exe 7184 powershell.exe 7184 powershell.exe 7772 powershell.exe 7772 powershell.exe 7772 powershell.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe 7468 Update.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3556 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4456 tasklist.exe Token: SeDebugPrivilege 3496 tasklist.exe Token: SeDebugPrivilege 2948 main.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 5244 powershell.exe Token: SeDebugPrivilege 5356 powershell.exe Token: SeIncreaseQuotaPrivilege 6016 WMIC.exe Token: SeSecurityPrivilege 6016 WMIC.exe Token: SeTakeOwnershipPrivilege 6016 WMIC.exe Token: SeLoadDriverPrivilege 6016 WMIC.exe Token: SeSystemProfilePrivilege 6016 WMIC.exe Token: SeSystemtimePrivilege 6016 WMIC.exe Token: SeProfSingleProcessPrivilege 6016 WMIC.exe Token: SeIncBasePriorityPrivilege 6016 WMIC.exe Token: SeCreatePagefilePrivilege 6016 WMIC.exe Token: SeBackupPrivilege 6016 WMIC.exe Token: SeRestorePrivilege 6016 WMIC.exe Token: SeShutdownPrivilege 6016 WMIC.exe Token: SeDebugPrivilege 6016 WMIC.exe Token: SeSystemEnvironmentPrivilege 6016 WMIC.exe Token: SeRemoteShutdownPrivilege 6016 WMIC.exe Token: SeUndockPrivilege 6016 WMIC.exe Token: SeManageVolumePrivilege 6016 WMIC.exe Token: 33 6016 WMIC.exe Token: 34 6016 WMIC.exe Token: 35 6016 WMIC.exe Token: 36 6016 WMIC.exe Token: SeDebugPrivilege 6048 tasklist.exe Token: SeDebugPrivilege 5820 powershell.exe Token: SeDebugPrivilege 3232 powershell.exe Token: SeIncreaseQuotaPrivilege 6016 WMIC.exe Token: SeSecurityPrivilege 6016 WMIC.exe Token: SeTakeOwnershipPrivilege 6016 WMIC.exe Token: SeLoadDriverPrivilege 6016 WMIC.exe Token: SeSystemProfilePrivilege 6016 WMIC.exe Token: SeSystemtimePrivilege 6016 WMIC.exe Token: SeProfSingleProcessPrivilege 6016 WMIC.exe Token: SeIncBasePriorityPrivilege 6016 WMIC.exe Token: SeCreatePagefilePrivilege 6016 WMIC.exe Token: SeBackupPrivilege 6016 WMIC.exe Token: SeRestorePrivilege 6016 WMIC.exe Token: SeShutdownPrivilege 6016 WMIC.exe Token: SeDebugPrivilege 6016 WMIC.exe Token: SeSystemEnvironmentPrivilege 6016 WMIC.exe Token: SeRemoteShutdownPrivilege 6016 WMIC.exe Token: SeUndockPrivilege 6016 WMIC.exe Token: SeManageVolumePrivilege 6016 WMIC.exe Token: 33 6016 WMIC.exe Token: 34 6016 WMIC.exe Token: 35 6016 WMIC.exe Token: 36 6016 WMIC.exe Token: SeDebugPrivilege 8780 powershell.exe Token: SeDebugPrivilege 9028 powershell.exe Token: SeDebugPrivilege 5184 tasklist.exe Token: SeIncreaseQuotaPrivilege 6520 WMIC.exe Token: SeSecurityPrivilege 6520 WMIC.exe Token: SeTakeOwnershipPrivilege 6520 WMIC.exe Token: SeLoadDriverPrivilege 6520 WMIC.exe Token: SeSystemProfilePrivilege 6520 WMIC.exe Token: SeSystemtimePrivilege 6520 WMIC.exe Token: SeProfSingleProcessPrivilege 6520 WMIC.exe Token: SeIncBasePriorityPrivilege 6520 WMIC.exe Token: SeCreatePagefilePrivilege 6520 WMIC.exe Token: SeBackupPrivilege 6520 WMIC.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE 3556 Explorer.EXE -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 7468 Update.exe 9468 Conhost.exe 8848 Conhost.exe 8368 Conhost.exe 7960 Conhost.exe 6188 Conhost.exe 9444 Conhost.exe 5680 Conhost.exe 10096 Conhost.exe 9356 Conhost.exe 9092 Conhost.exe 6180 Conhost.exe 2568 Conhost.exe 9428 Conhost.exe 8196 Conhost.exe 10532 Conhost.exe 10932 Conhost.exe 10472 Conhost.exe 11516 Conhost.exe 11768 Conhost.exe 11536 Conhost.exe 11668 Conhost.exe 11292 Conhost.exe 12116 Conhost.exe 11756 Conhost.exe 12968 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 3548 1804 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe 86 PID 1804 wrote to memory of 3548 1804 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe 86 PID 3548 wrote to memory of 2256 3548 cstealer.exe 87 PID 3548 wrote to memory of 2256 3548 cstealer.exe 87 PID 2256 wrote to memory of 2280 2256 cstealer.exe 88 PID 2256 wrote to memory of 2280 2256 cstealer.exe 88 PID 2280 wrote to memory of 4600 2280 cmd.exe 90 PID 2280 wrote to memory of 4600 2280 cmd.exe 90 PID 4600 wrote to memory of 2404 4600 cstealer.exe 91 PID 4600 wrote to memory of 2404 4600 cstealer.exe 91 PID 2404 wrote to memory of 3568 2404 cstealer.exe 92 PID 2404 wrote to memory of 3568 2404 cstealer.exe 92 PID 3568 wrote to memory of 4156 3568 cmd.exe 94 PID 3568 wrote to memory of 4156 3568 cmd.exe 94 PID 4156 wrote to memory of 372 4156 cstealer.exe 95 PID 4156 wrote to memory of 372 4156 cstealer.exe 95 PID 372 wrote to memory of 1248 372 cstealer.exe 96 PID 372 wrote to memory of 1248 372 cstealer.exe 96 PID 1248 wrote to memory of 4720 1248 cmd.exe 98 PID 1248 wrote to memory of 4720 1248 cmd.exe 98 PID 4720 wrote to memory of 1304 4720 cstealer.exe 99 PID 4720 wrote to memory of 1304 4720 cstealer.exe 99 PID 1304 wrote to memory of 1520 1304 cstealer.exe 100 PID 1304 wrote to memory of 1520 1304 cstealer.exe 100 PID 1520 wrote to memory of 1240 1520 cmd.exe 102 PID 1520 wrote to memory of 1240 1520 cmd.exe 102 PID 1240 wrote to memory of 5032 1240 cstealer.exe 103 PID 1240 wrote to memory of 5032 1240 cstealer.exe 103 PID 1804 wrote to memory of 4852 1804 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe 104 PID 1804 wrote to memory of 4852 1804 6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe 104 PID 4852 wrote to memory of 3712 4852 main.exe 105 PID 4852 wrote to memory of 3712 4852 main.exe 105 PID 5032 wrote to memory of 4152 5032 cstealer.exe 106 PID 5032 wrote to memory of 4152 5032 cstealer.exe 106 PID 3712 wrote to memory of 4444 3712 main.exe 108 PID 3712 wrote to memory of 4444 3712 main.exe 108 PID 4152 wrote to memory of 740 4152 cmd.exe 110 PID 4152 wrote to memory of 740 4152 cmd.exe 110 PID 740 wrote to memory of 3640 740 cstealer.exe 111 PID 740 wrote to memory of 3640 740 cstealer.exe 111 PID 3640 wrote to memory of 2760 3640 cstealer.exe 113 PID 3640 wrote to memory of 2760 3640 cstealer.exe 113 PID 4444 wrote to memory of 4552 4444 cmd.exe 112 PID 4444 wrote to memory of 4552 4444 cmd.exe 112 PID 4444 wrote to memory of 4552 4444 cmd.exe 112 PID 2760 wrote to memory of 3424 2760 cmd.exe 115 PID 2760 wrote to memory of 3424 2760 cmd.exe 115 PID 3424 wrote to memory of 1620 3424 cstealer.exe 116 PID 3424 wrote to memory of 1620 3424 cstealer.exe 116 PID 1620 wrote to memory of 4780 1620 cstealer.exe 117 PID 1620 wrote to memory of 4780 1620 cstealer.exe 117 PID 4780 wrote to memory of 1716 4780 cmd.exe 119 PID 4780 wrote to memory of 1716 4780 cmd.exe 119 PID 1716 wrote to memory of 3284 1716 cstealer.exe 120 PID 1716 wrote to memory of 3284 1716 cstealer.exe 120 PID 4552 wrote to memory of 4232 4552 Build.exe 121 PID 4552 wrote to memory of 4232 4552 Build.exe 121 PID 3284 wrote to memory of 2876 3284 cstealer.exe 123 PID 3284 wrote to memory of 2876 3284 cstealer.exe 123 PID 2876 wrote to memory of 3964 2876 cmd.exe 125 PID 2876 wrote to memory of 3964 2876 cmd.exe 125 PID 4552 wrote to memory of 2676 4552 Build.exe 126 PID 4552 wrote to memory of 2676 4552 Build.exe 126 PID 3964 wrote to memory of 1456 3964 cstealer.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1020
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1020 -s 30803⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:11960
-
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:10728
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1096
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2900
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:7864 -
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\yntnomxcupkb.xml"3⤵
- Creates scheduled task(s)
PID:11480
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1400
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2580
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1892
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2176
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2272
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2828
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2888
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2952
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3452
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe"C:\Users\Admin\AppData\Local\Temp\6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"5⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"8⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"11⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"14⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"17⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"20⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV121⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"23⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV124⤵PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet24⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet25⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"26⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet27⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet28⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"29⤵PID:4884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV130⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet30⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet31⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"32⤵PID:4204
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV133⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet33⤵
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet34⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"35⤵PID:412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV136⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet36⤵
- Executes dropped EXE
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet37⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"38⤵PID:5136
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet39⤵
- Executes dropped EXE
PID:7264 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet40⤵
- Executes dropped EXE
PID:7420 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"41⤵PID:7608
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV142⤵PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet42⤵
- Executes dropped EXE
PID:7712 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet43⤵
- Executes dropped EXE
PID:7888 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"44⤵PID:5860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:5856
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet45⤵
- Executes dropped EXE
PID:6828 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet46⤵
- Executes dropped EXE
PID:8228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"47⤵PID:8244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV148⤵PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet48⤵
- Executes dropped EXE
PID:8300 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet49⤵
- Executes dropped EXE
PID:8408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"50⤵PID:8588
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:8580
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet51⤵
- Executes dropped EXE
PID:6716 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet52⤵
- Executes dropped EXE
PID:8868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"53⤵PID:9132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV154⤵PID:9140
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet54⤵
- Executes dropped EXE
PID:9200 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet55⤵
- Executes dropped EXE
PID:6040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"56⤵PID:6304
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:6320
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet57⤵
- Executes dropped EXE
PID:6360 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet58⤵
- Executes dropped EXE
PID:6456 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"59⤵PID:6604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV160⤵PID:6596
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet60⤵
- Executes dropped EXE
PID:7064 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet61⤵
- Executes dropped EXE
PID:6760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"62⤵PID:7160
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:7152
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet63⤵
- Executes dropped EXE
PID:6640 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet64⤵
- Executes dropped EXE
PID:5660 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"65⤵PID:7232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV166⤵PID:7528
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet66⤵
- Executes dropped EXE
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet67⤵
- Executes dropped EXE
PID:7672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"68⤵PID:7852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:7696
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet69⤵
- Executes dropped EXE
PID:7944 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet70⤵
- Executes dropped EXE
PID:8136 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"71⤵PID:5236
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV172⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet72⤵
- Executes dropped EXE
PID:5844 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet73⤵
- Executes dropped EXE
PID:5620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"74⤵PID:5416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet75⤵
- Executes dropped EXE
PID:5760 -
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet76⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"77⤵PID:380
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV178⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet78⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet79⤵PID:8212
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"80⤵PID:5200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:8316
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet81⤵PID:8336
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet82⤵PID:3496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"83⤵PID:3316
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV184⤵PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet84⤵PID:8480
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet85⤵PID:3068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"86⤵PID:2060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet87⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet88⤵PID:8744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"89⤵PID:8932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV190⤵PID:8596
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet90⤵PID:8960
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet91⤵PID:6084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"92⤵PID:3712
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet93⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet94⤵PID:3352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"95⤵PID:6172
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV196⤵PID:6148
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet96⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet97⤵PID:6444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"98⤵PID:5692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:6156
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet99⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet100⤵PID:7008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"101⤵PID:6788
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1102⤵PID:7004
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet102⤵PID:6556
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet103⤵PID:7028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"104⤵PID:6740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:7012
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet105⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet106⤵PID:7080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"107⤵PID:5228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1108⤵PID:5512
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet108⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet109⤵PID:2988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"110⤵PID:7996
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:7968
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet111⤵PID:7780
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet112⤵PID:4896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"113⤵PID:972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1114⤵PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet114⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet115⤵PID:5252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"116⤵PID:4908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵
- Suspicious use of SetWindowsHookEx
PID:9468
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet117⤵PID:9164
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet118⤵PID:6508
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"119⤵PID:6208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1120⤵PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet120⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\cstealer.exe"C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet121⤵PID:8948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cstealer.exe" -m pip install pycryptodome --quiet"122⤵PID:8040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-