Malware Analysis Report

2024-11-13 15:06

Sample ID 231211-z68kdshfal
Target GOBLIN SERVICES.exe
SHA256 2a1a8f4f8a42ed7fb7bcc3dcc4fde0acd6db267784cbc3431852b2882c4c6ae1
Tags
evasion persistence spyware stealer upx pyinstaller pysilon
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2a1a8f4f8a42ed7fb7bcc3dcc4fde0acd6db267784cbc3431852b2882c4c6ae1

Threat Level: Known bad

The file GOBLIN SERVICES.exe was found to be: Known bad.

Malicious Activity Summary

evasion persistence spyware stealer upx pyinstaller pysilon

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Stops running service(s)

Creates new service(s)

Sets file to hidden

Executes dropped EXE

Reads user/profile data of web browsers

UPX packed file

Loads dropped DLL

Looks up external IP address via web service

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Drops file in System32 directory

Suspicious use of SetThreadContext

Launches sc.exe

Detects Pyinstaller

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Suspicious behavior: GetForegroundWindowSpam

Kills process with taskkill

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Gathers system information

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Views/modifies file attributes

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-11 21:21

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win10v2004-20231127-en

Max time kernel

127s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\BunniBot\BunniBot.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\BunniBot\BunniBot.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A

Creates new service(s)

persistence

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Stops running service(s)

evasion

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BunniBot = "C:\\Users\\Admin\\BunniBot\\BunniBot.exe" C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A ident.me N/A N/A
N/A ident.me N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\MRT.exe C:\Users\Admin\BunniBot\hijacker.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3848 set thread context of 4400 N/A C:\Users\Admin\BunniBot\hijacker.exe C:\Windows\system32\dialer.exe

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A

Gathers system information

Description Indicator Process Target
N/A N/A C:\Windows\system32\systeminfo.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
N/A N/A C:\Users\Admin\BunniBot\hijacker.exe N/A
N/A N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\BunniBot\hijacker.exe N/A
N/A N/A C:\Users\Admin\BunniBot\hijacker.exe N/A
N/A N/A C:\Users\Admin\BunniBot\hijacker.exe N/A
N/A N/A C:\Windows\system32\dialer.exe N/A
N/A N/A C:\Windows\system32\dialer.exe N/A
N/A N/A C:\Windows\system32\dialer.exe N/A
N/A N/A C:\Windows\system32\dialer.exe N/A
N/A N/A C:\Users\Admin\BunniBot\hijacker.exe N/A
N/A N/A C:\Users\Admin\BunniBot\hijacker.exe N/A
N/A N/A C:\Users\Admin\BunniBot\hijacker.exe N/A
N/A N/A C:\ProgramData\xdysmkmuiiiw\gtetmwssznfx.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\dialer.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\BunniBot\BunniBot.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2256 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe
PID 2256 wrote to memory of 2960 N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe
PID 2960 wrote to memory of 960 N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe C:\Windows\system32\cmd.exe
PID 2960 wrote to memory of 960 N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe C:\Windows\system32\cmd.exe
PID 2960 wrote to memory of 3272 N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2960 wrote to memory of 3272 N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2960 wrote to memory of 3912 N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe C:\Windows\system32\cmd.exe
PID 2960 wrote to memory of 3912 N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe C:\Windows\system32\cmd.exe
PID 3912 wrote to memory of 972 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 3912 wrote to memory of 972 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 3912 wrote to memory of 1736 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\BunniBot\BunniBot.exe
PID 3912 wrote to memory of 1736 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\BunniBot\BunniBot.exe
PID 3912 wrote to memory of 1384 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 3912 wrote to memory of 1384 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 1736 wrote to memory of 2180 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Users\Admin\BunniBot\BunniBot.exe
PID 1736 wrote to memory of 2180 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Users\Admin\BunniBot\BunniBot.exe
PID 2180 wrote to memory of 3868 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 3868 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 4840 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2180 wrote to memory of 4840 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2180 wrote to memory of 720 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 720 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 720 wrote to memory of 4620 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 720 wrote to memory of 4620 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2180 wrote to memory of 4264 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 4264 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 4264 wrote to memory of 4940 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\systeminfo.exe
PID 4264 wrote to memory of 4940 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\systeminfo.exe
PID 2180 wrote to memory of 2720 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 2720 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 3192 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 3192 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 2692 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 2692 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2692 wrote to memory of 3848 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\BunniBot\hijacker.exe
PID 2692 wrote to memory of 3848 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\BunniBot\hijacker.exe
PID 2180 wrote to memory of 1688 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 1688 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 3876 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 2180 wrote to memory of 3876 N/A C:\Users\Admin\BunniBot\BunniBot.exe C:\Windows\system32\cmd.exe
PID 3848 wrote to memory of 4400 N/A C:\Users\Admin\BunniBot\hijacker.exe C:\Windows\system32\dialer.exe
PID 3848 wrote to memory of 4400 N/A C:\Users\Admin\BunniBot\hijacker.exe C:\Windows\system32\dialer.exe
PID 3848 wrote to memory of 4400 N/A C:\Users\Admin\BunniBot\hijacker.exe C:\Windows\system32\dialer.exe
PID 3848 wrote to memory of 4400 N/A C:\Users\Admin\BunniBot\hijacker.exe C:\Windows\system32\dialer.exe
PID 3848 wrote to memory of 4400 N/A C:\Users\Admin\BunniBot\hijacker.exe C:\Windows\system32\dialer.exe
PID 3848 wrote to memory of 4400 N/A C:\Users\Admin\BunniBot\hijacker.exe C:\Windows\system32\dialer.exe
PID 3848 wrote to memory of 4400 N/A C:\Users\Admin\BunniBot\hijacker.exe C:\Windows\system32\dialer.exe
PID 1988 wrote to memory of 2704 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wusa.exe
PID 1988 wrote to memory of 2704 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wusa.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe

"C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe"

C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe

"C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x404 0x4e4

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\BunniBot\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\BunniBot\activate.bat

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\BunniBot\BunniBot.exe

"BunniBot.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "GOBLIN SERVICES.exe"

C:\Users\Admin\BunniBot\BunniBot.exe

"BunniBot.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\BunniBot\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "systeminfo"

C:\Windows\system32\systeminfo.exe

systeminfo

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del C:\Users\Admin\BunniBot\ss.png"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del C:\Users\Admin\cookies.txt"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "start "" "C:/Users/Admin/BunniBot/hijacker.exe""

C:\Users\Admin\BunniBot\hijacker.exe

"C:/Users/Admin/BunniBot/hijacker.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del ss.png"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del C:\Users\Admin\BunniBot\ss.png"

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\dialer.exe

C:\Windows\system32\dialer.exe

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe delete "service32.exe"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe create "service32.exe" binpath= "C:\ProgramData\xdysmkmuiiiw\gtetmwssznfx.exe" start= "auto"

C:\Windows\system32\wusa.exe

wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe start "service32.exe"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop eventlog

C:\ProgramData\xdysmkmuiiiw\gtetmwssznfx.exe

C:\ProgramData\xdysmkmuiiiw\gtetmwssznfx.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force

Network

Country Destination Domain Proto
US 8.8.8.8:53 18.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 193.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.135.232:443 discord.com tcp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.134.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 234.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 ident.me udp
DE 49.12.234.183:443 ident.me tcp
US 8.8.8.8:53 183.234.12.49.in-addr.arpa udp
US 8.8.8.8:53 ipv4.lafibre.info udp
NL 51.158.154.169:443 ipv4.lafibre.info tcp
US 8.8.8.8:53 169.154.158.51.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 162.159.135.232:443 discord.com tcp
N/A 127.0.0.1:51801 tcp
US 162.159.135.232:443 discord.com tcp
US 8.8.8.8:53 204.178.17.96.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.130.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 233.130.159.162.in-addr.arpa udp
US 162.159.135.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI22562\python311.dll

MD5 7798b8be9a95513a2faa26884d035a80
SHA1 934b7a90697c10ef07eb6d680cfb01a5f9f1198a
SHA256 10092fd829fcbc22f66896520e93ac6e7825f24761450c3193a788e7deb2fc92
SHA512 2459bf8531d70d510acfbbe5598c7affff8c18adff6a9118498d8d156990e84b13d9a16bbdd323a799e8b9f0a9e4cdcb02aecc92a59d92fe77fc37e9f55e19e0

C:\Users\Admin\AppData\Local\Temp\_MEI22562\python311.dll

MD5 68c051deda8979571d68d793486c60db
SHA1 24ac80d871e7aef0792471520ffe8c3cdc84993b
SHA256 66a2d91288778bf70181ffc78810870485da28dbc179ab9ecd855a55bf0b47b3
SHA512 82a885164c85bbae8fc350508f996543e202527d2f0b51b2aba2d89c19d232d8d4b0f2b948e47f56ea92b5879ede92903cc477fc9d57fce088a35c1d68758819

C:\Users\Admin\AppData\Local\Temp\_MEI22562\VCRUNTIME140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

memory/2960-1264-0x00007FF8C38B0000-0x00007FF8C3E98000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI22562\base_library.zip

MD5 645538056657f1e062016971ccdf4122
SHA1 fe2855ffe188dd85bec6e9fb55f097ca95f92015
SHA256 8af0f67d8b4bc3e06c9cde3c6d484aeb4c0a4874babde8956a8eefba540ff56b
SHA512 d70e62dce12fc69c79ee858c45f5056a0f4da87971f62f0afa7100922e0f26cb4859f21d78c2babc0490e45842f95bc2fa9767f84da4f265f4bc9d5e3351212a

C:\Users\Admin\AppData\Local\Temp\_MEI22562\python3.dll

MD5 34e49bb1dfddf6037f0001d9aefe7d61
SHA1 a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA256 4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512 edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_ctypes.pyd

MD5 e7ec734581f37a065e54b55515222897
SHA1 9205e3030ea43027cba202b4c968447927d3dc0d
SHA256 9e619adf436228c1c87e7909ca58575a02ef069d71045785b102e2a0f833b6a3
SHA512 281a16075a10ab4465ff1ab49c5639e982961b5029dc36f4b9657f32b9c29ff1bd39c2d6a3f793d7f93fd10802f5d1356bee9e54fa6eb67780a6275094e4fef3

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_bz2.pyd

MD5 c33370fc6631725aec3102b955b5e4bf
SHA1 0fce43642e54cd9db1eb48bbfd7661b8a4613e0d
SHA256 6c41a618b4dec812f5cd434375f33052daada9f49c6d472e82bdec27c407cfc5
SHA512 1de939ccb2b6349eaefcf12f37fb00b2b5dafff07930d52bfededcdfe6a234c0da75030596f544adfea09c786dc576fc5a88056ec614d2059a1a9e182925a021

memory/2960-1275-0x00007FF8D37A0000-0x00007FF8D37AF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_lzma.pyd

MD5 49a6a6127ad0a70a2d60f193254ba710
SHA1 eb9f1f5a0b264d6c2c477562b9331a798b9a1909
SHA256 4ad51dac78f9192831ee9c6959ad3d67e0f66869bded3a91688b08c4ff2103f7
SHA512 e5064d0536361fd193b1855fcb4173cace51094d8c8827dfca893d49734200156847987124ded14d75aa0c61f1204cc00eaf4ee81d84406e17ad216bf17003ca

memory/2960-1279-0x00007FF8C4DA0000-0x00007FF8C4DCD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_uuid.pyd

MD5 4c8ffc5c3b8bb6e969e8c80a132a1cf7
SHA1 fef1d1a9b17571fb885aa7f224cc9473b0b9adfe
SHA256 b73fd8206c709f352dd26850d181a8ba8b14bad3b3494f61038f45044a3a2d85
SHA512 6eca26f968f124f0bac60dd2a184be56cee4f8e74e4fef20c5f3e920d50651f7772d49ed43d4024da6aed11b25be0018ccdb87506ac96e3346ce2d72c4cb223e

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libcrypto-1_1.dll

MD5 af92375662f2480bad91b72d8d3ff2c4
SHA1 228bb673ec65d8019e85d2f5e8d20abec63167d1
SHA256 0896c2692203e5866968dcb16422fdbd94d14ee8b53807d30699f73a881f6627
SHA512 b300a6252bc1b439b6b33e7a555221fe06372571e9351fec860a2a9c4e5c5480bb8be7e3e158a217d6af28ca8ebb797c7d5dcf369860108b94c2472ffa1cc67b

memory/2960-1322-0x00007FF8C3500000-0x00007FF8C3875000-memory.dmp

memory/2960-1323-0x00007FF8C4D80000-0x00007FF8C4D94000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_hashlib.pyd

MD5 d27d3f54914b9b3b4dbf947a216b0e11
SHA1 36a4905e2ca457f241d6f2fc61d11c2a7986e802
SHA256 ed5433134675839cf0ac3d55006e87c3e8b74bb622168d83fa7e00c9dec1b844
SHA512 e3bf3df3c0202eb19830985ae5e9f6d4d03bedbc0b8371dcefa6d08bf2ce47dce211957c9c36bee8c57889d29084a08ff3d3fe2cd643e3420ca0c030585adef9

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_socket.pyd

MD5 38c567e91d5bd0ea66f57528319e6487
SHA1 98029c6c35886b9ab94c5bbaa4fbb54de9f45dc2
SHA256 502212dbed204b73f8b18b9b13c0ea158c9dd2cfffae2d7cafedf7b042264fbb
SHA512 d2f03faf7faaa1b82dd14130a85b203e86de96777209d47ec459c5a1efbbbd0ac6754d53ff9618744ad57c3b800b6fa6f8850c716dacce3828264eef265543b0

C:\Users\Admin\AppData\Local\Temp\_MEI22562\select.pyd

MD5 5159aab3342e8e811454849c5543d0fe
SHA1 992b1aa55aa3a9ddc12857ec576c3d85ba5176d8
SHA256 2051c44e5704b8800145905058425b9fd829c1be6106ef632ef78fd574f513c1
SHA512 36437f1f4b6431c35074c13f9c791be5e041a8c4861878c254115398f5f3249afef1548a554eb7b06fc9de5271d6a98a0c026b951fa04ad312aa3f56b20774d0

memory/2960-1327-0x00007FF8D3790000-0x00007FF8D379D000-memory.dmp

memory/2960-1330-0x00007FF8C31B0000-0x00007FF8C3268000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libssl-1_1.dll

MD5 9fd778d7c24b584dbae802d5ffb7aeb9
SHA1 a2d368fb3ee967b4178da21a55ddafdca48971b9
SHA256 0ee8c14b1c4a4d6b2e303a9a7ee526e4fc83614150defc74c04d3440fb67a788
SHA512 16e5e0b0534031e0babf898d20d0826ae2d7870a9233f6bcff2eee4afc903a32584703037d2dc94a577148676726636c270c17af1c00fdc5ebefef769eac4837

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_ssl.pyd

MD5 e77ee0cd7cab90dabbaea0f8abd7e1c8
SHA1 8b7f712eac536e9932c2bfde828624c34870e4d5
SHA256 c8359a4e0991f6604666004bac39b9c290195d64af47b263a85f663d89822b11
SHA512 4f0461b803d214e798be061829103fe20d12a14d88e365c186b3081b695138ae68b64083626431c9105d5609f36193fd8891f6e8968392b42709e6c198bd9c2f

C:\Users\Admin\AppData\Local\Temp\_MEI22562\charset_normalizer\md.cp311-win_amd64.pyd

MD5 347c9de8147ee24d980ca5f0da25ca1c
SHA1 e19c268579521d20ecfdf07179ee8aa2b4f4e936
SHA256 b6c3e565d152392aa2f1ea5a73952ae2a2b80e7d337759fce0ab32cd03c44287
SHA512 977a6e6e374e46b8bf699f285496dbb9777c8488bb16d61c0d46002ae4fcf5b2f9cd8cd8fa0e35ca442c43c9c286250edc10ef6eb1d2ef56578bcaac580f9fbb

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_queue.pyd

MD5 3b901ff0137dc2460d2f90b0a43a9482
SHA1 bd89b85b8ca525b9370fc105b5009e45ab95131a
SHA256 9982fad71df27eaeaac9521e25a300dfe5810aa723fafd56667b09a9bef26594
SHA512 c1fa7d0b4af3421f288cb2773fa35bbe6efe86160de48787da998f155f6880df535f075bbec531a5c5a9c210c239d4e926d86b486bc68f41a7e1ef97ac095dcd

memory/2960-1333-0x00007FF8CB630000-0x00007FF8CB63D000-memory.dmp

memory/2960-1336-0x00007FF8C3180000-0x00007FF8C31A6000-memory.dmp

memory/2960-1337-0x00007FF8C3060000-0x00007FF8C317C000-memory.dmp

memory/2960-1338-0x00007FF8C38B0000-0x00007FF8C3E98000-memory.dmp

memory/2960-1339-0x00007FF8C4D70000-0x00007FF8C4D7B000-memory.dmp

memory/2960-1340-0x00007FF8C3020000-0x00007FF8C3058000-memory.dmp

memory/2960-1331-0x00007FF8C34D0000-0x00007FF8C34FE000-memory.dmp

memory/2960-1346-0x00007FF8C2F90000-0x00007FF8C2F9E000-memory.dmp

memory/2960-1348-0x00007FF8C2F70000-0x00007FF8C2F7C000-memory.dmp

memory/2960-1349-0x00007FF8C2F60000-0x00007FF8C2F6B000-memory.dmp

memory/2960-1350-0x00007FF8C2F50000-0x00007FF8C2F5B000-memory.dmp

memory/2960-1355-0x00007FF8C2EA0000-0x00007FF8C2EB5000-memory.dmp

memory/2960-1356-0x00007FF8C2E80000-0x00007FF8C2E92000-memory.dmp

memory/2960-1358-0x00007FF8C2CC0000-0x00007FF8C2D0A000-memory.dmp

memory/2960-1362-0x00007FF8C2FD0000-0x00007FF8C2FDC000-memory.dmp

memory/2960-1366-0x00007FF8C2D30000-0x00007FF8C2D47000-memory.dmp

memory/2960-1365-0x00007FF8C2E60000-0x00007FF8C2E74000-memory.dmp

memory/2960-1368-0x00007FF8C2CA0000-0x00007FF8C2CB1000-memory.dmp

memory/2960-1371-0x00007FF8CAF20000-0x00007FF8CAF44000-memory.dmp

memory/2960-1373-0x00007FF8C2BA0000-0x00007FF8C2BCE000-memory.dmp

memory/2960-1374-0x00007FF8C4DA0000-0x00007FF8C4DCD000-memory.dmp

memory/2960-1375-0x00007FF8C29F0000-0x00007FF8C2B63000-memory.dmp

memory/2960-1376-0x00007FF8C3500000-0x00007FF8C3875000-memory.dmp

memory/2960-1378-0x00007FF8C29B0000-0x00007FF8C29BB000-memory.dmp

memory/2960-1386-0x00007FF8C2920000-0x00007FF8C292C000-memory.dmp

memory/2960-1385-0x00007FF8C2930000-0x00007FF8C293C000-memory.dmp

memory/2960-1384-0x00007FF8C2950000-0x00007FF8C295D000-memory.dmp

memory/2960-1387-0x00007FF8C2910000-0x00007FF8C291B000-memory.dmp

memory/2960-1383-0x00007FF8C2960000-0x00007FF8C296C000-memory.dmp

memory/2960-1382-0x00007FF8C2970000-0x00007FF8C297B000-memory.dmp

memory/2960-1380-0x00007FF8C2990000-0x00007FF8C299B000-memory.dmp

memory/2960-1381-0x00007FF8C2980000-0x00007FF8C298C000-memory.dmp

memory/2960-1379-0x00007FF8C29A0000-0x00007FF8C29AC000-memory.dmp

memory/2960-1377-0x00007FF8C29D0000-0x00007FF8C29E8000-memory.dmp

memory/2960-1372-0x00007FF8C2BE0000-0x00007FF8C2C09000-memory.dmp

memory/2960-1370-0x00007FF8C2B70000-0x00007FF8C2B93000-memory.dmp

memory/2960-1369-0x00007FF8C2C10000-0x00007FF8C2C6D000-memory.dmp

memory/2960-1367-0x00007FF8C2D10000-0x00007FF8C2D29000-memory.dmp

memory/2960-1364-0x00007FF8C2F30000-0x00007FF8C2F3C000-memory.dmp

memory/2960-1363-0x00007FF8C2FC0000-0x00007FF8C2FCB000-memory.dmp

memory/2960-1361-0x00007FF8C3010000-0x00007FF8C301B000-memory.dmp

memory/2960-1360-0x00007FF8C2C70000-0x00007FF8C2C8C000-memory.dmp

memory/2960-1359-0x00007FF8C2C90000-0x00007FF8C2C9A000-memory.dmp

memory/2960-1357-0x00007FF8C2E30000-0x00007FF8C2E52000-memory.dmp

memory/2960-1354-0x00007FF8C2EC0000-0x00007FF8C2ECC000-memory.dmp

memory/2960-1353-0x00007FF8C2ED0000-0x00007FF8C2EE2000-memory.dmp

memory/2960-1352-0x00007FF8C2EF0000-0x00007FF8C2EFD000-memory.dmp

memory/2960-1351-0x00007FF8C2F40000-0x00007FF8C2F4C000-memory.dmp

memory/2960-1347-0x00007FF8C2F80000-0x00007FF8C2F8C000-memory.dmp

memory/2960-1345-0x00007FF8C2FA0000-0x00007FF8C2FAD000-memory.dmp

memory/2960-1344-0x00007FF8C2FB0000-0x00007FF8C2FBC000-memory.dmp

memory/2960-1343-0x00007FF8C2FE0000-0x00007FF8C2FEB000-memory.dmp

memory/2960-1342-0x00007FF8C2FF0000-0x00007FF8C2FFC000-memory.dmp

memory/2960-1341-0x00007FF8C3000000-0x00007FF8C300B000-memory.dmp

memory/2960-1325-0x00007FF8C3890000-0x00007FF8C38A9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_tkinter.pyd

MD5 a7d7c6f515f5b49b1204d1376f7621cc
SHA1 42000eee9d23ac678103ad3067edfccd5043219f
SHA256 3b816042f0c47279b39a2d04347e115404fffbb01de35134fd7db279f55296bc
SHA512 f54a3d79ac6a1f0bf88562c7cd004055d29f6bc05beb408e856fc5305f59f061b7a17556e008a549dd12aa9399c99e7fe2321cd5ec7324ab7ce3151b0454e9b8

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_sqlite3.pyd

MD5 0b71fb4c0dba8beca2b950b5d0df24e9
SHA1 af710f7604da0777b35fde62115214f029e0db26
SHA256 8ecf7eabe204218b672660e52b539040183cf346ca630ff3de552a22111ecb3d
SHA512 784ff22dd62b398378bba276b386280d7e0930bf5611a5ca7fcdf894c352be5aaeabec2f419092cfa17791f61b725f37b44bb6e861dba2e5322b87078952c660

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_overlapped.pyd

MD5 96d75944d280f39eb0f8e435511f3222
SHA1 0d74eefaf62c80c969bfe2f5e32fc269073527f3
SHA256 bfac2d1b1c5b948f6cd70de2e2edbe85f535ace879dbbaa04a71065ea11ef280
SHA512 724be702596604d173a542526b2049f268f611c204f03ef642ccf5e946441973704dca6e601bc5fd6dc3cc9a35b8cfd392571fe3228c59e277259097f53b2bf3

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_multiprocessing.pyd

MD5 b5979368da73ffe9213dd49c0e5d6270
SHA1 5cf6ab2e801899cde24f3b356f8c1bff9d935528
SHA256 020602164b9891cb1c304d9f70dd8083c7e1a9a42caa9cfd67a5bbc0728029b9
SHA512 191823e56c4a3ea8bd211745111861d140899263ebed9b1988d2be37e1ba073195b55548266d6c536793edf49ef82b19064be96992b7bea9171424e789c83352

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_elementtree.pyd

MD5 dda8f0cc660c5e8170e37f37394f53ad
SHA1 6fea7006e44d0ee320499034e61f0cd99247abda
SHA256 58fc4868d87f7e05a387fb39646110307b993757b3e23e52d4489e7cea653dcc
SHA512 13cda3936c3b7eace74aed66282a13aa3d63e9da9b761a7fc8d6d0f215b61fc44ef4c4d60bbb0cb8d52689ed1ac05993965f5498da41ee95d6299d4f9a4bf4f5

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_decimal.pyd

MD5 c21d61753b2a62fe70311aaa50e75a64
SHA1 39cc382ae3fbcb6b80974ece0e020cdcbec8f57a
SHA256 0ef0b881c15d88a443a1bfc898d0011dab50500ee4a86e0f35c3076ed70cce49
SHA512 059c7c7f35c939ab615b4dc1d3e9da69a66b0ed4a30931115971898c63f24ff960bb544f2ff9db7ce990c36a4d1e6307864d0f1ec5fbf354983473268c9500e4

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_cffi_backend.cp311-win_amd64.pyd

MD5 cdc182dc9761dbad548061af8ed0bacb
SHA1 646c648471552ab5abb49ed07d0bdc9e88a26d75
SHA256 213a68dface36e70bfc33d9b5932f01aab69010d50397f909b6721bfa42bf9dd
SHA512 968f518dbc5dd60c56e71cf7ca0331e1ebdab3c4ebb7614a2a8cbdee8d1e143e5103e37ec7fbb9d710bd0eca3cbda018564cfc08450178cf448086b1b5b86c1e

C:\Users\Admin\AppData\Local\Temp\_MEI22562\_asyncio.pyd

MD5 e6307d02076151c6fc9b78b1f346068f
SHA1 336cb5b3fc88ff4d9cc021f858ff33b0eb96c881
SHA256 fdb2a227d646b420de9877bb569b96369b6175e322f6ef81bc3f372eed08c10b
SHA512 7a22e2c293a067502a0d1e4ccc9fcb81dd7bd7faf56a1fd4a6cebc56c5ce4e8bf6c7157e19fe779ed70722d559da61ab5ca1f9b1e1b3df8a2b83728fbac2564c

C:\Users\Admin\AppData\Local\Temp\_MEI22562\zlib1.dll

MD5 ee06185c239216ad4c70f74e7c011aa6
SHA1 40e66b92ff38c9b1216511d5b1119fe9da6c2703
SHA256 0391066f3e6385a9c0fe7218c38f7bd0b3e0da0f15a98ebb07f1ac38d6175466
SHA512 baae562a53d491e19dbf7ee2cff4c13d42de6833036bfdaed9ed441bcbf004b68e4088bd453b7413d60faaf1b334aee71241ba468437d49050b8ccfa9232425d

C:\Users\Admin\AppData\Local\Temp\_MEI22562\VCRUNTIME140_1.dll

MD5 75e78e4bf561031d39f86143753400ff
SHA1 324c2a99e39f8992459495182677e91656a05206
SHA256 1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
SHA512 ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

C:\Users\Admin\AppData\Local\Temp\_MEI22562\unicodedata.pyd

MD5 5c05df2afd90a54d6378ff869d774b33
SHA1 38e2d685cd131ef1fff235ed180016c083bf2965
SHA256 0f631b1f12c8b0aded13ee5a50ff11eb2bcf9c47b535270a8a88fdfee4709ac6
SHA512 7d4712cdf0d27f66f33070ec4d1b4e6c51d3857edf01c4db94ce71eb8ed5b7780f5e3e05593e53d1dd51bc00d14dacdb234f02d391569b5e7ec136c00c10b145

C:\Users\Admin\AppData\Local\Temp\_MEI22562\tk86t.dll

MD5 7d85f7480f2d8389f562723090be1370
SHA1 edfa05dc669a8486977e983173ec61cc5097bbb0
SHA256 aaeda7b65e1e33c74a807109360435a6b63a2994243c437e0cdaa69d2b8c6ac5
SHA512 a886475aeea6c4003dd35e518a0833574742b62cdbbbe5b098a5c0f74e89795ebddac31c4107dae6edee8fc476addaa34253af560d33bed8b9df9192c3e7f084

C:\Users\Admin\AppData\Local\Temp\_MEI22562\tcl86t.dll

MD5 755bec8838059147b46f8e297d05fba2
SHA1 9ff0665cddcf1eb7ff8de015b10cc9fcceb49753
SHA256 744a13c384e136f373f9dc7f7c2eb2536591ec89304e3fa064cac0f0bf135130
SHA512 e61dc700975d28b2257da99b81d135aa7d284c6084877fe81b3cc7b42ac180728f79f4c1663e375680a26f5194ab641c4a40e09f8dbdeb99e1dfa1a57d6f9b34

C:\Users\Admin\AppData\Local\Temp\_MEI22562\sqlite3.dll

MD5 aa2a7bd0e84498719405008b996a38ec
SHA1 0cb0962b02324067a715559c64fcbe3c1e798d03
SHA256 cacbebf5a19a14d3aaf59fd71a79ed38638c61f80994a292f16193d52d91832a
SHA512 d39f093eb5ad7ed489e10f6db405eaf0d0844a5e3eed1deff4202f1cf316293535e46d87d5aff1d210bacf53a65a08c397eacc919787da8133614951d77d85e6

C:\Users\Admin\AppData\Local\Temp\_MEI22562\SDL2_ttf.dll

MD5 eb0ce62f775f8bd6209bde245a8d0b93
SHA1 5a5d039e0c2a9d763bb65082e09f64c8f3696a71
SHA256 74591aab94bb87fc9a2c45264930439bbc0d1525bf2571025cd9804e5a1cd11a
SHA512 34993240f14a89179ac95c461353b102ea74e4180f52c206250bb42c4c8427a019ea804b09a6903674ac00ab2a3c4c686a86334e483110e79733696aa17f4eb6

C:\Users\Admin\AppData\Local\Temp\_MEI22562\SDL2_mixer.dll

MD5 b7b45f61e3bb00ccd4ca92b2a003e3a3
SHA1 5018a7c95dc6d01ba6e3a7e77dd26c2c74fd69bc
SHA256 1327f84e3509f3ccefeef1c12578faf04e9921c145233687710253bf903ba095
SHA512 d3449019824124f3edbda57b3b578713e9c9915e173d31566cd8e4d18f307ac0f710250fe6a906dd53e748db14bfa76ec1b58a6aef7d074c913679a47c5fdbe7

C:\Users\Admin\AppData\Local\Temp\_MEI22562\SDL2_image.dll

MD5 25e2a737dcda9b99666da75e945227ea
SHA1 d38e086a6a0bacbce095db79411c50739f3acea4
SHA256 22b27380d4f1f217f0e5d5c767e5c244256386cd9d87f8ddf303baaf9239fc4c
SHA512 63de988387047c17fd028a894465286fd8f6f8bd3a1321b104c0ceb5473e3e0b923153b4999143efbdd28684329a33a5b468e43f25214037f6cddd4d1884adb8

C:\Users\Admin\AppData\Local\Temp\_MEI22562\SDL2.dll

MD5 2b13a3f2fc8f9cdb3161374c4bc85f86
SHA1 9039a90804dba7d6abb2bcf3068647ba8cab8901
SHA256 110567f1e5008c6d453732083b568b6a8d8da8077b9cb859f57b550fd3b05fb6
SHA512 2ee8e35624cb8d78baefafd6878c862b510200974bef265a9856e399578610362c7c46121a9f44d7ece6715e68475db6513e96bea3e26cdccbd333b0e14ccfd8

C:\Users\Admin\AppData\Local\Temp\_MEI22562\pyexpat.pyd

MD5 a655fa42e31e30cf60f452b70c01a1a4
SHA1 e38b435347a65d39dd2ff8518b75070e6038fb47
SHA256 83feb05e74d002110bf8d032c3ad2ffb636ae0ba4300e1ba84ce4add8f0554ec
SHA512 e54b38011ea94565ddf88120b8a3718b9cfcb79ca4b4900da1f9338b59795162534dbd2d5bfd67a81d9a29a6675ffdb2dc8772f583ee5bf2de547136334c8831

C:\Users\Admin\AppData\Local\Temp\_MEI22562\portmidi.dll

MD5 0df0699727e9d2179f7fd85a61c58bdf
SHA1 82397ee85472c355725955257c0da207fa19bf59
SHA256 97a53e8de3f1b2512f0295b5de98fa7a23023a0e4c4008ae534acdba54110c61
SHA512 196e41a34a60de83cb24caa5fc95820fd36371719487350bc2768354edf39eeb6c7860ff3fd9ecf570abb4288523d7ab934e86e85202b9753b135d07180678cd

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libwebp-7.dll

MD5 b0dd211ec05b441767ea7f65a6f87235
SHA1 280f45a676c40bd85ed5541ceb4bafc94d7895f3
SHA256 fc06b8f92e86b848a17eaf7ed93464f54ed1f129a869868a74a75105ff8ce56e
SHA512 eaeb83e46c8ca261e79b3432ec2199f163c44f180eb483d66a71ad530ba488eb4cdbd911633e34696a4ccc035e238bc250a8247f318aa2f0cd9759cad4f90fff

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libtiff-5.dll

MD5 ebad1fa14342d14a6b30e01ebc6d23c1
SHA1 9c4718e98e90f176c57648fa4ed5476f438b80a7
SHA256 4f50820827ac76042752809479c357063fe5653188654a6ba4df639da2fbf3ca
SHA512 91872eaa1f3f45232ab2d753585e650ded24c6cc8cc1d2a476fa98a61210177bd83570c52594b5ad562fc27cb76e034122f16a922c6910e4ed486da1d3c45c24

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libssl-1_1.dll

MD5 0bfdc638fbe4135514de3aebf59fa410
SHA1 963addfdadf918339dfcab33e07bb6c48c86099e
SHA256 77affb7e88ab70fa04e382e29bf04a94ddf36c5cbd88b29ff33e15912d83ed01
SHA512 768abcc391eea4a3b34b0aade99932cd9befb922dcf9e720edf4c4719938214236e8668eca67026bd07567fbd10bbba98d63f47d63a81c7be1adce3bdd1973e4

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libpng16-16.dll

MD5 55009dd953f500022c102cfb3f6a8a6c
SHA1 07af9f4d456ddf86a51da1e4e4c5b54b0cf06ddb
SHA256 20391787cba331cfbe32fbf22f328a0fd48924e944e80de20ba32886bf4b6fd2
SHA512 4423d3ec8fef29782f3d4a21feeac9ba24c9c765d770b2920d47b4fb847a96ff5c793b20373833b4ff8bc3d8fa422159c64beffb78ce5768ed22742740a8c6c6

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libopusfile-0.dll

MD5 2d5274bea7ef82f6158716d392b1be52
SHA1 ce2ff6e211450352eec7417a195b74fbd736eb24
SHA256 6dea07c27c0cc5763347357e10c3b17af318268f0f17c7b165325ce524a0e8d5
SHA512 9973d68b23396b3aa09d2079d18f2c463e807c9c1fdf4b1a5f29d561e8d5e62153e0c7be23b63975ad179b9599ff6b0cf08ebdbe843d194483e7ec3e7aeb232a

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libopus-0.x64.dll

MD5 e56f1b8c782d39fd19b5c9ade735b51b
SHA1 3d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256 fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512 b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libcrypto-1_1.dll

MD5 8e7025186c1c6f3f61198c027ff38627
SHA1 79c6f11358c38bda0c12ee1e3ab90a21f4651fa1
SHA256 f393f54886674e42bb7667087c92af67bd46e542c44ddff11c5061481261c90e
SHA512 4bbbf7d0a51aec361779d7735c6a91f1bdd468da0aaa3626c3cb52128c998d6454be8c473c8743172ffcea9dc66403a5a81ff5535d9baf87fa6ab990a35add41

C:\Users\Admin\AppData\Local\Temp\_MEI22562\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI22562\crypto_clipper.json

MD5 8bff94a9573315a9d1820d9bb710d97f
SHA1 e69a43d343794524b771d0a07fd4cb263e5464d5
SHA256 3f7446866f42bcbeb8426324d3ea58f386f3171abe94279ea7ec773a4adde7d7
SHA512 d5ece1ea9630488245c578cb22d6d9d902839e53b4550c6232b4fb9389ef6c5d5392426ea4a9e3c461979d6d6aa94ddf3b2755f48e9988864788b530cdfcf80f

memory/2960-1280-0x00007FF8C50E0000-0x00007FF8C50F9000-memory.dmp

memory/2960-1273-0x00007FF8CAF20000-0x00007FF8CAF44000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI22562\libffi-8.dll

MD5 77199701fe2d585080e44c70ea5aed4c
SHA1 34c8b0ce03a945351e30fb704a00d5257e2a6132
SHA256 4eb41bcf5e54017c4d8c6a7184f4633d9e6c10ca8f52ad21e3b752edd745d4ee
SHA512 d325f517a3eb831f3f5853c5471295244716a666507aa4e4b262e0842f1bfad0c9648a6711fbce514193e411cfcdbb9afe86764e740355cd06895dfcc623fe34

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xzbsc5lv.fke.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2960-1531-0x00007FF8C38B0000-0x00007FF8C3E98000-memory.dmp

memory/2960-1538-0x00007FF8C3890000-0x00007FF8C38A9000-memory.dmp

memory/2960-1545-0x00007FF8C3060000-0x00007FF8C317C000-memory.dmp

memory/2960-1550-0x00007FF8C2E30000-0x00007FF8C2E52000-memory.dmp

memory/2960-1555-0x00007FF8C2C90000-0x00007FF8C2C9A000-memory.dmp

memory/2960-1557-0x00007FF8C2C10000-0x00007FF8C2C6D000-memory.dmp

memory/2960-1561-0x00007FF8C29F0000-0x00007FF8C2B63000-memory.dmp

memory/2960-1562-0x00007FF8C29D0000-0x00007FF8C29E8000-memory.dmp

memory/2960-1563-0x00007FF8C2860000-0x00007FF8C2895000-memory.dmp

memory/2960-1564-0x00007FF8C27A0000-0x00007FF8C285C000-memory.dmp

memory/2960-1565-0x00007FF8C2770000-0x00007FF8C279B000-memory.dmp

memory/2960-1566-0x00007FF8C2490000-0x00007FF8C2713000-memory.dmp

memory/2960-1560-0x00007FF8C2B70000-0x00007FF8C2B93000-memory.dmp

memory/2960-1568-0x00007FF8C1DC0000-0x00007FF8C1E15000-memory.dmp

memory/2960-1569-0x00007FF8C1AB0000-0x00007FF8C1D8F000-memory.dmp

memory/2960-1567-0x00007FF8C1E20000-0x00007FF8C248D000-memory.dmp

memory/2960-1559-0x00007FF8C2BA0000-0x00007FF8C2BCE000-memory.dmp

memory/2960-1558-0x00007FF8C2BE0000-0x00007FF8C2C09000-memory.dmp

memory/2960-1556-0x00007FF8C2C70000-0x00007FF8C2C8C000-memory.dmp

memory/2960-1554-0x00007FF8C2CA0000-0x00007FF8C2CB1000-memory.dmp

memory/2960-1553-0x00007FF8C2CC0000-0x00007FF8C2D0A000-memory.dmp

memory/2960-1551-0x00007FF8C2D30000-0x00007FF8C2D47000-memory.dmp

memory/2960-1571-0x00007FF8BF990000-0x00007FF8BF9A7000-memory.dmp

memory/2960-1573-0x00007FF8BF930000-0x00007FF8BF952000-memory.dmp

memory/2960-1578-0x00007FF8BF7D0000-0x00007FF8BF817000-memory.dmp

memory/2960-1579-0x00007FF8BF7B0000-0x00007FF8BF7CA000-memory.dmp

memory/2960-1603-0x00007FF8BF790000-0x00007FF8BF7A9000-memory.dmp

memory/2960-1605-0x00007FF8BF770000-0x00007FF8BF78D000-memory.dmp

memory/2960-1626-0x00007FF8BF690000-0x00007FF8BF744000-memory.dmp

memory/2960-1633-0x00007FF8BF670000-0x00007FF8BF68A000-memory.dmp

memory/2960-1663-0x00007FF8BF1C0000-0x00007FF8BF253000-memory.dmp

memory/2960-1665-0x00007FF8BF170000-0x00007FF8BF1BB000-memory.dmp

memory/2960-1635-0x00007FF8BF260000-0x00007FF8BF66F000-memory.dmp

memory/2960-1616-0x00007FF8BF750000-0x00007FF8BF763000-memory.dmp

memory/2960-1575-0x00007FF8BF860000-0x00007FF8BF890000-memory.dmp

memory/2960-1577-0x00007FF8BF820000-0x00007FF8BF853000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI17362\cryptography-41.0.7.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

memory/2960-1729-0x00007FF8BEE90000-0x00007FF8BF0B6000-memory.dmp

memory/2960-1730-0x00007FF8BEE10000-0x00007FF8BEE8B000-memory.dmp

memory/2960-1737-0x00007FF8BEA80000-0x00007FF8BEAC2000-memory.dmp

memory/2960-1736-0x00007FF8BEAD0000-0x00007FF8BEB12000-memory.dmp

memory/2960-1733-0x00007FF8BED30000-0x00007FF8BED78000-memory.dmp

memory/2960-1732-0x00007FF8BED80000-0x00007FF8BEE0A000-memory.dmp

memory/2960-1728-0x00007FF8BF0C0000-0x00007FF8BF169000-memory.dmp

memory/2960-1670-0x00007FF8B9370000-0x00007FF8BB263000-memory.dmp

memory/2960-1574-0x00007FF8BF890000-0x00007FF8BF92C000-memory.dmp

memory/2960-1572-0x00007FF8BF960000-0x00007FF8BF981000-memory.dmp

memory/2960-1570-0x00007FF8BF9B0000-0x00007FF8C1AA3000-memory.dmp

memory/2960-1552-0x00007FF8C2D10000-0x00007FF8C2D29000-memory.dmp

memory/2960-1548-0x00007FF8C2E80000-0x00007FF8C2E92000-memory.dmp

memory/2960-1549-0x00007FF8C2E60000-0x00007FF8C2E74000-memory.dmp

memory/2960-1547-0x00007FF8C2EA0000-0x00007FF8C2EB5000-memory.dmp

memory/2960-1546-0x00007FF8C3020000-0x00007FF8C3058000-memory.dmp

memory/2960-1544-0x00007FF8C3180000-0x00007FF8C31A6000-memory.dmp

memory/2960-1543-0x00007FF8C4D70000-0x00007FF8C4D7B000-memory.dmp

memory/2960-1542-0x00007FF8CB630000-0x00007FF8CB63D000-memory.dmp

memory/2960-1541-0x00007FF8C31B0000-0x00007FF8C3268000-memory.dmp

memory/2960-1540-0x00007FF8C34D0000-0x00007FF8C34FE000-memory.dmp

memory/2960-1539-0x00007FF8D3790000-0x00007FF8D379D000-memory.dmp

memory/2960-1537-0x00007FF8C3500000-0x00007FF8C3875000-memory.dmp

memory/2960-1536-0x00007FF8C4D80000-0x00007FF8C4D94000-memory.dmp

memory/2960-1535-0x00007FF8C4DA0000-0x00007FF8C4DCD000-memory.dmp

memory/2960-1534-0x00007FF8C50E0000-0x00007FF8C50F9000-memory.dmp

memory/2960-1533-0x00007FF8D37A0000-0x00007FF8D37AF000-memory.dmp

memory/2960-1532-0x00007FF8CAF20000-0x00007FF8CAF44000-memory.dmp

C:\Users\Admin\BunniBot\ss.png

MD5 f185caa390d475761bd217efd2144085
SHA1 d41214f96223367d9a04fe202317548839e266c0
SHA256 83ad87f69d17b1058dd9df94be2afb10b3cefa1a4d956723fd5ecf0d3d25be2f
SHA512 c7ffc50b7632f0edf0f23458daab309a063a12fe124633c777642f034c8e0959e1b7ecc1d958c646a20aed590b9d333cbe786de89d1dfcfe145b497a1af1b38f

Analysis: behavioral4

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win10v2004-20231127-en

Max time kernel

150s

Max time network

133s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeManageVolumePrivilege N/A C:\Windows\System32\svchost.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k UnistackSvcGroup

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 21.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 201.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 104.241.123.92.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 175.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 24.73.42.20.in-addr.arpa udp

Files

memory/4756-0-0x000002206C6A0000-0x000002206C6B0000-memory.dmp

memory/4756-16-0x000002206C7A0000-0x000002206C7B0000-memory.dmp

memory/4756-32-0x0000022074D90000-0x0000022074D91000-memory.dmp

memory/4756-33-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-34-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-35-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-38-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-37-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-36-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-39-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-40-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-41-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-42-0x0000022074DC0000-0x0000022074DC1000-memory.dmp

memory/4756-43-0x00000220749E0000-0x00000220749E1000-memory.dmp

memory/4756-44-0x00000220749D0000-0x00000220749D1000-memory.dmp

memory/4756-46-0x00000220749E0000-0x00000220749E1000-memory.dmp

memory/4756-49-0x00000220749D0000-0x00000220749D1000-memory.dmp

memory/4756-52-0x0000022074910000-0x0000022074911000-memory.dmp

C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

MD5 739a878245bfceca7594374596909db4
SHA1 2515778a3a38349a4c6517a18604ad1e029396c8
SHA256 83e1dccc4a5ceb78007e6c0802a8d966ee187fafa27b96f95dc1b4b296aa2447
SHA512 4dde316457c95095965fbd3af35f09f58f5d001bb3441901431d3080c965508c0ac3bb1c7d4736b807fc6e547b61c78cc69fa78ed255dcf7fc6eb685b8fc4688

memory/4756-64-0x0000022074B10000-0x0000022074B11000-memory.dmp

memory/4756-66-0x0000022074B20000-0x0000022074B21000-memory.dmp

memory/4756-67-0x0000022074B20000-0x0000022074B21000-memory.dmp

memory/4756-68-0x0000022074C30000-0x0000022074C31000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:25

Platform

win7-20231201-en

Max time kernel

121s

Max time network

122s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1514849007-2165033493-4114354048-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 f8b0eef9d69ca5d7b830fa056ccaea32
SHA1 b21b28a73cfd44694fd1235125e0f17e4eac6b93
SHA256 7a2ec7a271d86e6eee7c65eb31899703a4785d407384c14ad140c8f10ee17b77
SHA512 4a6e6b7b29f8a205764aaf0e58aca0c05f6458e527ff8780467c5ea5c6a1bd54c1ef1ed50d5039d5c07adaa6eef134da75acafd848ebd25011e638f7d200fc7d

Analysis: behavioral6

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win10v2004-20231130-en

Max time kernel

126s

Max time network

51s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-433534792-1200107535-3148087551-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-433534792-1200107535-3148087551-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win10v2004-20231130-en

Max time kernel

125s

Max time network

51s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-596315103-1488671723-776734015-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-596315103-1488671723-776734015-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A

Analysis: behavioral10

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win10v2004-20231127-en

Max time kernel

124s

Max time network

132s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 193.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 104.116.69.13.in-addr.arpa udp

Files

N/A

Analysis: behavioral11

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win7-20231023-en

Max time kernel

119s

Max time network

124s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 431c80c6ccd1b7bde2e7be72743240fa
SHA1 484d27a815042569e6c0ee2589a023d4fd81afc6
SHA256 7048a245509884e381598afc8d2d79a30fdf8987bca862b9ca97b0df39b80bfd
SHA512 c16b646eba26a1d1b735bc77550978be966b550b5366670d28aa9966379d0ac6b854079a9926f001e6f3a810e31cd4039f6290cbe5cc8aa7dc12811bc0bada1e

Analysis: behavioral12

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win10v2004-20231127-en

Max time kernel

143s

Max time network

150s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 21.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 201.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 12.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win7-20231020-en

Max time kernel

119s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe

"C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe"

C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe

"C:\Users\Admin\AppData\Local\Temp\GOBLIN SERVICES.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI20602\python311.dll

MD5 87b5d21226d74f069b5ae8fb74743236
SHA1 153651a542db095d0f9088a97351b90d02b307ac
SHA256 3cac88119657daef7f79844aeb9da79b45c1f3bb2ea3468b0d4ed26067852194
SHA512 788bb26b3f4ce99a2b49eef2742972fe843bdd97d361a6e67237f29376648ea6f874f1f6ba6dd53c74ef51a29e650a02fb99dfc30b5badfa9d2e05491f81d7d6

memory/2732-1261-0x000007FEF6070000-0x000007FEF6658000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win7-20231023-en

Max time kernel

121s

Max time network

125s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1936 wrote to memory of 2544 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe
PID 1936 wrote to memory of 2544 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe
PID 1936 wrote to memory of 2544 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\rundll32.exe

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

Network

N/A

Files

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:25

Platform

win7-20231129-en

Max time kernel

119s

Max time network

119s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\misc.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\misc.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 7f9dc678cba7fd263e72616e28d3fe70
SHA1 ca219495a5a4d4e4c5f584bbf3535662663c2671
SHA256 df862e3947417ba8db58422044e7bd52088315fe0840439627c25baef857e3ba
SHA512 20316acdde2fd82b6510055e48eb924d6144d0e0535ac9acc7c0777980da6e31cd0bb34d1473df73d8519259a659e0cbd7614ef108dbc6c02e85eabbfc20d800

Analysis: behavioral9

Detonation Overview

Submitted

2023-12-11 21:20

Reported

2023-12-11 21:26

Platform

win7-20231129-en

Max time kernel

117s

Max time network

118s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 f17cd434fa9038402a89eb84172c4d15
SHA1 3382e0a0a1b4fcf5804b8deae908b005045edaee
SHA256 e1f7720b599e8469afa8fadfb03920f784a8f05b0352a5c4652301568f21091d
SHA512 03d3717a77420a04a8c3b0ea7c8333bd82f30762f65692fd4cea15b1e4c733883d06b0e67d8c87bf8ebc82041821eab4e035f29207589a6ab2871735182c2a62