Resubmissions

26/01/2025, 01:09

250126-bhtvbsykam 10

26/01/2025, 01:05

250126-bfw7nswndv 7

Analysis

  • max time kernel
    219s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2025, 01:09

General

  • Target

    https://www.mediafire.com/folder/6edvg7cb9uykm/CS2+Skin+Changer+v.1.9

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://toppyneedus.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Enumerates processes with tasklist 1 TTPs 8 IoCs
  • Drops file in Windows directory 28 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 51 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/folder/6edvg7cb9uykm/CS2+Skin+Changer+v.1.9
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff61d8cc40,0x7fff61d8cc4c,0x7fff61d8cc58
      2⤵
        PID:4276
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1976 /prefetch:2
        2⤵
          PID:4244
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2028 /prefetch:3
          2⤵
            PID:4320
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2264 /prefetch:8
            2⤵
              PID:4908
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1
              2⤵
                PID:3656
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                2⤵
                  PID:2744
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4340,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:8
                  2⤵
                    PID:4704
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=5104,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:1
                    2⤵
                      PID:1704
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5288,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5316 /prefetch:1
                      2⤵
                        PID:3248
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4892,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5256 /prefetch:1
                        2⤵
                          PID:2628
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3156,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:1
                          2⤵
                            PID:412
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1032,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5396 /prefetch:8
                            2⤵
                              PID:4728
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5432,i,18289419535932826759,3770326571436788021,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5828 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:932
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                            1⤵
                              PID:4592
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                              1⤵
                                PID:4032
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:4364
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1448
                                • C:\Program Files\7-Zip\7zG.exe
                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\" -ad -an -ai#7zMap32034:106:7zEvent16894
                                  1⤵
                                    PID:4348
                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe
                                    "C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:4920
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c copy Gerald Gerald.cmd & Gerald.cmd
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3280
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        PID:372
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /I "opssvc wrsa"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2784
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        PID:1460
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1788
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c md 180387
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2620
                                      • C:\Windows\SysWOW64\extrac32.exe
                                        extrac32 /Y /E Prairie
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2324
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /V "PINE" Transit
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3252
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b 180387\Chicken.com + Exempt + Senegal + Protect + Html + Statement + Comparable + Steel + Originally + Oz 180387\Chicken.com
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3836
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b ..\Sg + ..\Spine + ..\Ups + ..\Perspectives + ..\Arrival + ..\Gmc + ..\Saver y
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1948
                                      • C:\Users\Admin\AppData\Local\Temp\180387\Chicken.com
                                        Chicken.com y
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SendNotifyMessage
                                        PID:4852
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /d y /t 5
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4692
                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe
                                    "C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:448
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c copy Gerald Gerald.cmd & Gerald.cmd
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4628
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        PID:4396
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /I "opssvc wrsa"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4804
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        PID:544
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1460
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c md 180387
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1416
                                      • C:\Windows\SysWOW64\extrac32.exe
                                        extrac32 /Y /E Prairie
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4052
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b 180387\Chicken.com + Exempt + Senegal + Protect + Html + Statement + Comparable + Steel + Originally + Oz 180387\Chicken.com
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1648
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b ..\Sg + ..\Spine + ..\Ups + ..\Perspectives + ..\Arrival + ..\Gmc + ..\Saver y
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4992
                                      • C:\Users\Admin\AppData\Local\Temp\180387\Chicken.com
                                        Chicken.com y
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SendNotifyMessage
                                        PID:4632
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /d y /t 5
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5076
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer\" -ad -an -ai#7zMap22021:126:7zEvent10211
                                    1⤵
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    PID:604
                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe
                                    "C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:860
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c copy Gerald Gerald.cmd & Gerald.cmd
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1476
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        PID:1424
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /I "opssvc wrsa"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3616
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        PID:4028
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2148
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c md 180387
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5044
                                      • C:\Windows\SysWOW64\extrac32.exe
                                        extrac32 /Y /E Prairie
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3908
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /V "PINE" Transit
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1536
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b 180387\Chicken.com + Exempt + Senegal + Protect + Html + Statement + Comparable + Steel + Originally + Oz 180387\Chicken.com
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3152
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b ..\Sg + ..\Spine + ..\Ups + ..\Perspectives + ..\Arrival + ..\Gmc + ..\Saver y
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1624
                                      • C:\Users\Admin\AppData\Local\Temp\180387\Chicken.com
                                        Chicken.com y
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SendNotifyMessage
                                        PID:4736
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /d y /t 5
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1388
                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe
                                    "C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:4360
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c copy Gerald Gerald.cmd & Gerald.cmd
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2788
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        PID:3456
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /I "opssvc wrsa"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4520
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        PID:692
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4344
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c md 180387
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3832
                                      • C:\Windows\SysWOW64\extrac32.exe
                                        extrac32 /Y /E Prairie
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3972
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /V "PINE" Transit
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:912
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b 180387\Chicken.com + Exempt + Senegal + Protect + Html + Statement + Comparable + Steel + Originally + Oz 180387\Chicken.com
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1908
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b ..\Sg + ..\Spine + ..\Ups + ..\Perspectives + ..\Arrival + ..\Gmc + ..\Saver y
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2424
                                      • C:\Users\Admin\AppData\Local\Temp\180387\Chicken.com
                                        Chicken.com y
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SendNotifyMessage
                                        PID:2324
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /d y /t 5
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4864

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                    Filesize

                                    40B

                                    MD5

                                    53f896e6ec3a1c85c0d9124da3b7380e

                                    SHA1

                                    f4b222bb0b3fda0f2ab34768d1d086bc6533575e

                                    SHA256

                                    17445b99fe65252ca0a67cde3f5d2b1feb0224d39f52d1641ae0bb8dd0282453

                                    SHA512

                                    512cd2d07e1e7ebe78ddf8f5c5a682a30a0a9a1f55099a466ddd54c351295a92f4ac4946ebf4218d6353a3148ac38a2dbc07c9f96e12042868acce13c9edb1c3

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                    Filesize

                                    649B

                                    MD5

                                    3c50fa609970d7033bc7e86b0ce50fde

                                    SHA1

                                    faba18dbc2a37d6b86192b307f9322d9e571a850

                                    SHA256

                                    9c16036c1ca97308c8b0f89eeb8cefb8c3ec9f9d745d62e7c836f0ce6d9c5c40

                                    SHA512

                                    f38db4c112f3b6955d65bf91933fe1853ea03bb28379db916a34abe8ab62c6c521ae0f86d5db97e7cc00f164a8054456e5766d374987f584512fc98316efdba7

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000026

                                    Filesize

                                    20KB

                                    MD5

                                    87e8230a9ca3f0c5ccfa56f70276e2f2

                                    SHA1

                                    eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7

                                    SHA256

                                    e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9

                                    SHA512

                                    37690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    888B

                                    MD5

                                    d91abe605a1b0444b3e5c131763ee02a

                                    SHA1

                                    25099da05f41e86d61529f4a6b1f4f24255f1a6a

                                    SHA256

                                    dd875559ba9c16a7a5a3deb4479ebd90202080dab6220bc9bcfcc4f3df2e9ac3

                                    SHA512

                                    736fc9e41f7a4f4fb39ac4696c7f7e9dc4108ea870b73aac519c5bbfa6e8adccc94c78a08596b60d51f9b050264ca4825a14bec4b869625239cf35d3155e3089

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    11KB

                                    MD5

                                    89c921d67c07f98c161dad87724a113f

                                    SHA1

                                    0719b9066be69d9c485ffe705b3cbd3cf8fcb941

                                    SHA256

                                    898869a28aa0c7ae62a45d8b67838e7ecece3a9ed28aa02203bc0bba43aa0b85

                                    SHA512

                                    d51d4ca1953246b97f7e099fd353baa791325fb3b99e1c4c2f5aa6460acbd9c303f5f4e43bc671d70451e6d8ccb43ccf66c83d19bf38b0d9ab2cdc0692e05278

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    2373258c1fe22ec27924aebb6a738b57

                                    SHA1

                                    ed330616d82354089b4a9d83d7d440643205a0e4

                                    SHA256

                                    deb7ae6d4ff59f8143d806f9eef2ddf36ba46b9fe4673eb2990fe1649a7ead5f

                                    SHA512

                                    6b4b36e45c83a120822ae9215b21c3892253ea21f6eb639dd1d566aecace9fefa721b60ee1d0bca358ebce600f3f124b0008daca7e5bd9c9ad8f111fa500e31a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    5295987efdfea9ebb32bbb06a28979ba

                                    SHA1

                                    34aa6816de3bb8d60a2f62c1878e045d0110a601

                                    SHA256

                                    3f52b69c014831381fc8a2ee4b9f1200a892dcbe1841ed4fbc533b97abf083c6

                                    SHA512

                                    af0f1d05dd20038f6bc5ceab716d3a9b06d1282245631ee4454f7f9308846f4ee9040f0b0bf9643f83e7eb3a009eb0b704be26520613af85db39c6b8005537b5

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    92e229b6d22ed714a61201a1fc61283c

                                    SHA1

                                    f19a15b91cc0088f0271d4082e74075b305a7c61

                                    SHA256

                                    6adcce2cae42a05cd3d1c68402fee84b372c69ef3c44d26a7549ca3fa9bcb33f

                                    SHA512

                                    9cfa8b42d7bfaaa9f564deae1a3c22c5cbcd74d27b9e49eda68fc1c76b8b17050829ea07477412e0faf71af306bf747ce294278aeea44e8bbc70375cc75881b5

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    51a5266a04c8ab42f3311521f3dde3b0

                                    SHA1

                                    75bbff001a667dac9b88d781a2de679b7e038e3e

                                    SHA256

                                    ab8bc50304f679967a1cb7cbebd8633a6db0c2e8eca8ec79dff774c82552a02f

                                    SHA512

                                    5ce06cf20437f78b95c018b604dcf4869868235a5784251bb314cb089ce239067066d44a389871a481a94310254a2b1c6c7773951e2ee44fe62cf3c7bc6347e6

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    b2a91e54725e7357e29d05113501d8ce

                                    SHA1

                                    db535ec3e3ae06812ca935f5647b0f70a6597523

                                    SHA256

                                    2106a5ee1fc62f85dd7e1401ee852d1a02727328f1e62f3d7d1b9834e4d1727c

                                    SHA512

                                    a36d95130171e52a5289743f9466f901eb760eec5fa5421ba25b400f7b3b6d38c356a8e23d120f8fb854838cd1053238a806f9eb81ce8255f871b3048e75eb0c

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    e003c3d37221ab090fe1d3564117b621

                                    SHA1

                                    7477d0bee9f3753a19986ac1c43f95a21628ebc7

                                    SHA256

                                    b772d614dc65551f6cdba6b3454e4390e07c9ae2d9a96414e857fb44b871c160

                                    SHA512

                                    c776ec93bf2c9d6bfcf4467ebc8a73f05b04e68a8b3e2990530e3afda6cab78cfe676fc48525e3cc1af7deb0764f43b98bffab8eada0fac2b3c77da7d0ae3bf2

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    e9519762f5e439beb63943343b78f8a9

                                    SHA1

                                    e8fe79bc81d59486a2d88fbeacc87ba5b59a0eec

                                    SHA256

                                    6ef8258b6449c92d403a446bc6bf4c0f72ebf84b348ef455944421e13a39c23e

                                    SHA512

                                    cd93f166e69203e0834892db3ddc251bd67cfaf8d18bf3c0aa028ff6a552fc496aa9f4517974771a1c77de37af172cf94a1b8b54d647db195a611d3a8d6c063e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    e8b0e0497f55f40e7541cae937ca9aea

                                    SHA1

                                    f44bca680b8fd0787efbca358fea678b629f3a73

                                    SHA256

                                    9ceecb2a08102e95844c9d223d208b79b42b7a2a464597a9c0ebbd4b7202c4b8

                                    SHA512

                                    0965aaa66487a73d950bbfaf6bcdce9dfd58c505db5636c11e4cf2294f99cda84fad0798232abefe33e20c011f31629ecb07ebd542980ea27a40b532f6746fb7

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    f3f5d838f24f25ebdb293857ca999931

                                    SHA1

                                    7c85dfca527c2e83b113a3f0b70a3be6bf54e390

                                    SHA256

                                    910df88134ce6f32694f39e11ae8952d8933e1e7dd18494fb90e33f3a6859d17

                                    SHA512

                                    2c1dc55561f875a7f417a0c85c848e12e86c4fb08a765f3c24aaca3bd8f1a8f00b95b2304dc9dd4d9b05b715047783bbfe0267336934e26a8bfd52351d10bc3e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    5e1fef366255ff6ad981a6445e48d8e1

                                    SHA1

                                    1063045c6086ae3fd06d768867b987e30fdfe02b

                                    SHA256

                                    a86f6aa52f4ec98310e13cd8c151c34005d1babc5a9355ddbf065b814b846e8d

                                    SHA512

                                    6758f1331e4778bf6ad6d44a791db486b384466cde74b4d212afea40b2629ed7bff90331588d5910f44230d2978090b338a2d6c2b76f23159e426fb4a43aadce

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    32a40993926a7febdfe238eeaf84739b

                                    SHA1

                                    59d587027f9b2082c8303e9bf78ee894a4a70ea6

                                    SHA256

                                    578c55707b0c053249b8519083d2672747ee4886c12f5e7053540af6290a644d

                                    SHA512

                                    241c7d66b1c1986ecc15b4de30370d9faa1418b9c585329ad092c1cbabd95205755f5aa101ec270f8fc6f80c35f88bcc8717dfd48d4a18c343ab0cd9670b1d99

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    86f7a0f62d78ad3f0b159da59d27cb48

                                    SHA1

                                    393270a79becf436102697aa2f61667694dd4d66

                                    SHA256

                                    c84ef3a05f724c1af9a422fbfd38537471627074e7a680658f0fa22c9b4c867a

                                    SHA512

                                    8f1cb0f51e366569807de2f0cf39ffe110a0ba9b653f8f2067609ab9747c161cdba3ab1a2452e67ee86de19a1753f3eb93a4f5ee2c877997d9bc5ccedca594a0

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    a8ec637fee5e50b89e42eafc8e94cf02

                                    SHA1

                                    bf161840bacc5c44315b4d1262dd9f9e97b48bd1

                                    SHA256

                                    b41842d9714a7f477aa41b89f9f83a93f51cce9e87bf1d823fabbe8f49054d7a

                                    SHA512

                                    724ac845e76015fc1f942a147242e313363999ed783da085898914f0b888ade8f7838081a3bc59ffc1824e0da94fbc601d01c59c26b312f76f513a7424697867

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    e0a35204b19d3091912c2978d9a48b59

                                    SHA1

                                    72e26a5604985e35f4ad21e064ef14d124566e6b

                                    SHA256

                                    e1eab4ba90ddd86c3bb8db45b0eebe1c7ceac4160fd54effdb8fea345651e707

                                    SHA512

                                    fe62a66e8e57a0f758a3791774d8a651b8114bb39fbbfb6e3460c57ea03f6bf6162ba1b31f5194dd99779d30761e7fdd3a6a0cfe1264d4e60841354cd0bb2e8a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    9871fd1f50dd5ab86ac876a1ddbfb90a

                                    SHA1

                                    b577fa1b76505f827101196238b4e53f4deeac80

                                    SHA256

                                    573ac4fe56fe3291b4aab9c3c3e70c871bab06d51bb4095fdc53c6a9aa63b468

                                    SHA512

                                    8ae20343ce7ffc7d38419be48c46ba4abe76e8285365ec79e84a552218f9d7f6a757e6737ede3afe66954d9d21fb9faa79c6d722ffd481df18430a413e8af473

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    10KB

                                    MD5

                                    c929563ef13bc16dddecfd624f555f2d

                                    SHA1

                                    304f3929276802d18c6e0af089c6f7b2cdeca614

                                    SHA256

                                    40e39e7e885f9ff4be1d3d1b6341a50069a247d226f9259a90f887ee44c12e4a

                                    SHA512

                                    ea878e3ae0ab248e9ed97c4e1f35d3d3a7d68da3fa15ca1796aa72a581923c7b9040c0a7bf4946a39947c9433dbceef08a8d67ca8606d1e1f3a2c7948beaeac8

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    116KB

                                    MD5

                                    0771b7d0687f13b105c3af7ca3d67b66

                                    SHA1

                                    16b2a1410bae0ec82517436e845752e451c74150

                                    SHA256

                                    7451259f3b9617e33266c7c3316695b4b916365b6a8bda8fe82061cda6e39bf3

                                    SHA512

                                    ddfb3cb18afec30ebaad1148d75e23da5fe21a7dc3d4cd20c46af45e505cd26c3730b5175fa0ab9b4208e63a1d157cc4bd268bee088bc1d2016d16fbf0c7a4d5

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    116KB

                                    MD5

                                    26bde1f52b772299436e3317b6df7aba

                                    SHA1

                                    249c4511489a75d429984df7fe81e44812fe24e2

                                    SHA256

                                    8b73140b143da77d084228c6011bde4810b6e009edc238f8132100372b275f58

                                    SHA512

                                    f1cd5d1608dfd730648655fcb3a234ea44d97bef7924611ace18a7050f4189d00999a81859daaa8843ecbe4d2beda5cfd5c9f68c9219267ca8b7aaaa4709de5e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\a14f4828-332e-4818-9ef4-69f22cb13528.tmp

                                    Filesize

                                    116KB

                                    MD5

                                    c47c8731530995d3d288c914be5ecc40

                                    SHA1

                                    f505b7bf0465c9a0f88060212528925ccac212dd

                                    SHA256

                                    9a899e7c152771f4aa113529e40578178507277348715ae18b445169be1881e4

                                    SHA512

                                    721299a46e9d55db2f0cf46bea2dc81e93e85271c01a347d41e9b5eb9d1c361fd9960c3b2e7710e007edcba909b0f6b284cabd66e98206be4b67e4536e98255b

                                  • C:\Users\Admin\AppData\Local\Temp\180387\Chicken.com

                                    Filesize

                                    771B

                                    MD5

                                    fb3fe08b348cd30a21ff8da25c9992ae

                                    SHA1

                                    a1fcdd3a35302e3914c6e65029a0f828c04462fa

                                    SHA256

                                    77e938e390f7e94e56c9b7bab7d3ca3ac5125cc25b042a7a843d6644f73fbd17

                                    SHA512

                                    b63c193c1b16aacb36269f3a40822dfd148c2a1130815bd1e661a5fd304804046391e4f9700e09dbdf30c5ab4d06ae13d4a6a316aea80590d2a57a48d25431dd

                                  • C:\Users\Admin\AppData\Local\Temp\180387\Chicken.com

                                    Filesize

                                    925KB

                                    MD5

                                    62d09f076e6e0240548c2f837536a46a

                                    SHA1

                                    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                    SHA256

                                    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                    SHA512

                                    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                  • C:\Users\Admin\AppData\Local\Temp\180387\y

                                    Filesize

                                    488KB

                                    MD5

                                    f9c47093d989021fc336df99f9b9dc8f

                                    SHA1

                                    9b8f03a16638dc56b6d09682fe00a0fd0873421c

                                    SHA256

                                    911118e2138f7ebb71ba3a6ac2bb658eea09f2356f29b59a397703d8c7464176

                                    SHA512

                                    a823c87f98131369d6c4c3726c433350bb3151d1a4ce1d51546503326979bb83629d7d2ec73ce14c3dff94904fca6cf80f56c1f012dd0e7cbbc4b86f51b12d73

                                  • C:\Users\Admin\AppData\Local\Temp\Arrival

                                    Filesize

                                    69KB

                                    MD5

                                    adb9b1feed9c733eb413ba9843f07494

                                    SHA1

                                    1ebb5c95cb7c03f010761905e7a3d77d949dda82

                                    SHA256

                                    cb8f8be07ae99851b227bcbe027f76412ba5bf38bac208dfe9490cc6bb02402b

                                    SHA512

                                    b4a8e7b73069132e3c445f5ae8cf84773100c52cbd8d3b23e82903db3c1e5a94ea1fe219b025baa962443186a283b1ef7cd015521f0dd4f2adfce685d1d0ffbd

                                  • C:\Users\Admin\AppData\Local\Temp\Comparable

                                    Filesize

                                    147KB

                                    MD5

                                    890691d10de9694768773d03f6920325

                                    SHA1

                                    1177c810197d123a3f9bf3df012d3b353a92761c

                                    SHA256

                                    017280540d352c5e0f1830de989c014e2e75ed03b933d05ec98d2c907edc0b72

                                    SHA512

                                    79426bb7bb5ed5474ed643c4d549a6b5c46f1edb31ac167717a6417ceda2d2bef1b8f3bc165d489f0e358b55cfe6d1462f5e1bf63f1cbf8eee106fe4d9510f0b

                                  • C:\Users\Admin\AppData\Local\Temp\Exempt

                                    Filesize

                                    107KB

                                    MD5

                                    d2954e27b0a99d55cdf57838dfe74e26

                                    SHA1

                                    47d6ce1c97e66edf859d706e660866424237586b

                                    SHA256

                                    4ff1557e59107e2105bc0bd963671b2326a089455fa11719712a90a540438586

                                    SHA512

                                    dff7dda4a2c2497b62f9034784f97c6c99d0696250e4e2cfe7af363acc25da84665d565e3804f4ccaa46560770656a5e56315ec465ebc9b62b64b8095aab6198

                                  • C:\Users\Admin\AppData\Local\Temp\Gerald

                                    Filesize

                                    28KB

                                    MD5

                                    b1d2f71324b83b0300ce817566b370e0

                                    SHA1

                                    fe5447a2b570402f4a218f2304b033d9ce6127a4

                                    SHA256

                                    044262beb6511e3f1368f6ab66a34a545f7dd9c4d5c30d36ec1bc9e2dd569c1e

                                    SHA512

                                    7b346936981f15b8f0a7c6daaca20fc58dceb8e311017ccda811a4a3a87c1d9715751068aef9bc1dddea6ed7b0e5e56898b589c851c4327bf20d4963b946773b

                                  • C:\Users\Admin\AppData\Local\Temp\Gmc

                                    Filesize

                                    74KB

                                    MD5

                                    3842e0920fb3c7c85dd281c8b918ed22

                                    SHA1

                                    ed9af9ffc86c0bc88d8328e3560479f891baf5b3

                                    SHA256

                                    397f792b1068f50ae5095fb9be7983f23c013db4eff56aea74f7f564a5531755

                                    SHA512

                                    5d1478e5c65cc89c2cfedc97cb1c4f3abec9e023f2faa18ad4b9fcf9629cfc487fa47f951549a77b4542525d3e9043a3f1e5c49bba46b1f626ffce76e2df6912

                                  • C:\Users\Admin\AppData\Local\Temp\Html

                                    Filesize

                                    143KB

                                    MD5

                                    298c6375609f7a54b312d73b5a4168d2

                                    SHA1

                                    5b0f508f773d0a07128c5b97ece7c97717f24ee7

                                    SHA256

                                    5d1e1321c38f149a05ebcf3cae5312ac68c9e2ddd779d7c9ce45862024eb31f3

                                    SHA512

                                    1273cd08a1baaffd770a1fa939f3eca15c70dd479aff603085c95c99502bc168dc506d6d4df304f36054be13de6ed9af4fc2561d7ccc6f3949cc23c69324e734

                                  • C:\Users\Admin\AppData\Local\Temp\Originally

                                    Filesize

                                    53KB

                                    MD5

                                    3d351b019ba8e905c6eddfa820c1f0ed

                                    SHA1

                                    9265177529f6098e2ee8ed3d8dac36a24cb9b192

                                    SHA256

                                    34d9c66803196a19005ee2c9f908278f93e984b4ca4a9e786d24c04168556fae

                                    SHA512

                                    d82ac6b201df093f5a9b503b937c4e5332b2137eb2181a872d6e4c8dfcd0486ea72e78aaf5979bccf165f29826caeb3583499da7e1039a641208fd4c089b3e67

                                  • C:\Users\Admin\AppData\Local\Temp\Oz

                                    Filesize

                                    25KB

                                    MD5

                                    2a12f635623f096e638c0b517ae80dc7

                                    SHA1

                                    9012203689d126a928e38254f57381a887ca3f46

                                    SHA256

                                    d55ba6bf1ff3d1acb22d500f3b3aaa45c31fba10a999cb465d3cdf2c387b25d6

                                    SHA512

                                    4fec03003b7d1bb91e9319cf2d6940b6ff1d70ea1ac12f7da311218b26a92b8b851ca3aa1b2a1d80a38cfc6c89385efd31a4ed1720e988ec154c4bdcd1693a1f

                                  • C:\Users\Admin\AppData\Local\Temp\Perspectives

                                    Filesize

                                    83KB

                                    MD5

                                    fb50dee4c1112ff30fce536cb631abfc

                                    SHA1

                                    4bd518c9ee27790be750e6205a850ae3e07f8c2e

                                    SHA256

                                    af6c55e41febc12a2ed028d05cf72bb70033455780ca423949793973dadff212

                                    SHA512

                                    d60da374dd007c6caec781c590adf611883dabdb7349c976192e3eae6e055d6e7b48965485d8b753add42df34f0461c05b303b8cf750c7a9bda32a31b4206b44

                                  • C:\Users\Admin\AppData\Local\Temp\Prairie

                                    Filesize

                                    477KB

                                    MD5

                                    0a96828d6dda9048818cc2d629a9ff9f

                                    SHA1

                                    5abe6929cc689f2a6c1d93a83af7058933b3ecf6

                                    SHA256

                                    a742dc26a8c2ee1efd50bdf00c1d0b2f639b048de9e9ea9ef02d12090c8a590f

                                    SHA512

                                    5625ab6c23b71411836b82c6f92cc6e3afbc203c62a49c92ebf66c9f2ad8fe32285e5a535a169a65a7dddd37ebbfe6e8cce849c6459fb8fd72917e17303d5419

                                  • C:\Users\Admin\AppData\Local\Temp\Protect

                                    Filesize

                                    143KB

                                    MD5

                                    af5cc288b8edb8fab7f9d57d721a5694

                                    SHA1

                                    2c97dd4c719dcfb07337dc69f3bf1a0d469170a6

                                    SHA256

                                    23a2eae98f6d7084fc73e75c1581b7b4db732131b1157c075d5ffb2936e1177c

                                    SHA512

                                    786270304b22a8b36a32a8a6d2e720123aee41bf541d602d93875abaff6a27cfd9360b22b06cae41f62b4de47ef525636adbe8ee366a324c7e5536e39ebba893

                                  • C:\Users\Admin\AppData\Local\Temp\Saver

                                    Filesize

                                    52KB

                                    MD5

                                    b1325bd57a34524790f91a98d265d29d

                                    SHA1

                                    f11981e9b5ff3f3fa93cd0c9bf9bac952c024bc4

                                    SHA256

                                    3f2afe613949951ceb0497d114b7c5d98e74a6934c9792ed3fd63a8775d8845a

                                    SHA512

                                    27d0195d548eb43ad8ce6e0df35920896352befd6cb03da1911fe8e228d55d1c1f8d81510c749de4382f8b71157645e67d988610f7b7322bfd7b15264a2ff6f1

                                  • C:\Users\Admin\AppData\Local\Temp\Senegal

                                    Filesize

                                    108KB

                                    MD5

                                    934b2ff5460cf4ee15e9efe3c7470a14

                                    SHA1

                                    1fe91fcb75e019b6835ca6f4c86295e4ae39ab0b

                                    SHA256

                                    3f3f5eba0d023810977da5ee8b0ce0be05756bd4c9a8ff2017a11c5f70a457cc

                                    SHA512

                                    783c7926e303d0ebb75781a1515d905e416318d6cf034b3c37f8c7507acbb78e17cf220b13ce1dd1a99c704993198422c2adf00b34e1cbeb2ec2d7f9708e9189

                                  • C:\Users\Admin\AppData\Local\Temp\Sg

                                    Filesize

                                    86KB

                                    MD5

                                    3aae310119068ea94c5e58d38143be33

                                    SHA1

                                    fe886dd3fb10323cc87222d32b6f7781d1c97935

                                    SHA256

                                    abf42750d29381ea1e23419e6a08f73f5ec326c37c6b9d95c041045b4b9b54d3

                                    SHA512

                                    c9f91ad0bc940f3a679bc663c7c5a67ba27a231bf5d30788841ef5721d70516592d06097f054c60ccf9d7d806cf124905294381a3177fd60191493ea1c856c4c

                                  • C:\Users\Admin\AppData\Local\Temp\Spine

                                    Filesize

                                    73KB

                                    MD5

                                    ff79ea5ee03d407d8eb05dcc6b69c1b8

                                    SHA1

                                    cbf99efaac975d1a0df7b7474f44b06294ee9f67

                                    SHA256

                                    ddf742ad9770ec05cf9bcab2658ab1d9561d1be48f86dfa8bda02b27d4446c47

                                    SHA512

                                    668377f34bef60577a2c104779093f573204bf41d6f6d58b3e0c7a4c49f5234a1463d0ddaf6e7c74b3c0c35613e8a881304086b3752b4b625142352007f53277

                                  • C:\Users\Admin\AppData\Local\Temp\Statement

                                    Filesize

                                    116KB

                                    MD5

                                    c70b07da1c6967051e2202d2774038fb

                                    SHA1

                                    50595272c208f26d627865ce90600ec6d5e88d66

                                    SHA256

                                    11889ad9086a95c399f003c8feb4308d11e7ac7ccd5806b8be54d9beb64d6e5d

                                    SHA512

                                    7760b6c36ee8058cfd73cd1bbeefd6df26d92f4d40966e4f0e37f3b17c8ddf178afc692ae41f7a2145d554ad2694a5c32979f04c06dfbc1f80dd677b86e24a8e

                                  • C:\Users\Admin\AppData\Local\Temp\Steel

                                    Filesize

                                    82KB

                                    MD5

                                    3e406b5220daa68ee1c98e0304f332ef

                                    SHA1

                                    52e5e72ad8c50b893a7b6be426586998fb400e08

                                    SHA256

                                    755093ad17388f010896123d814417ee51b08b383fa96daf76f1f2a0b78811e4

                                    SHA512

                                    07166381cf933895433f0fddc63cf3eb701e42028b36a6dbf21febd1731a667ce75374127d8eec7477d4a81c6a6b47b7309b1b25701cfd5db57fd408d305d49f

                                  • C:\Users\Admin\AppData\Local\Temp\Transit

                                    Filesize

                                    775B

                                    MD5

                                    b983dcd93d693182b775f3dbcb737a8b

                                    SHA1

                                    087ce22216d07a647ed5f4d08c02223d5a789c8b

                                    SHA256

                                    2d5ec8234d45822b9b90459b9a556e70a64554a65fa4fa6baf2e74d92a0042ed

                                    SHA512

                                    23159469a47981150a404e95362ea4c0ef026f2007f925e0d1b53bd5ef8f559ef0081d44f5d278746ad4190c935b65eae6e422e505fdb18651cf5dbe1230ead2

                                  • C:\Users\Admin\AppData\Local\Temp\Ups

                                    Filesize

                                    51KB

                                    MD5

                                    01209a148ff554a7b15adfd344b5589d

                                    SHA1

                                    d031d58bb0a2a4a5c3b123b692d2aacb5605cdc1

                                    SHA256

                                    055377880319bad61b9140bf114df294e7944f4549ab428b9da7ad49bde4320d

                                    SHA512

                                    57df693b4963159640f977d94e852117546a42b336544730cb8efd15b44de08edeb7ed2a864eea8e655b3ae0582d7ba159c27cc49d190ed7de6226dc31da97a1

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\Installer.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    a2e8cf348222b9b8d3768f9d9d19f0d0

                                    SHA1

                                    54d2ea84919e1ce60b3354078c25365c6a06a732

                                    SHA256

                                    1fc0ddcd468f3e6451de4e215d0df7955f8ccf397b3c2f08b1d8c2795fc6e2e5

                                    SHA512

                                    b283d902e03a95ea2055e6ff80ce5840d58c08b020b1ca27e9dc2badfc28a048b51e9021956215758142000085601c9811f7736c015760f8ca92f31891310e0f

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\Shared\Shared\Microsoft.SqlServer.Types.dll

                                    Filesize

                                    374KB

                                    MD5

                                    25656a196ed967bcd4b152a4073b8b44

                                    SHA1

                                    a9b64b8a42c9da3243378f2a17a9ff8057154116

                                    SHA256

                                    36c3e5efd0731ccf5ac9a341c488b4fd14c69747f5a3f6e4cd976a7c1288b3b0

                                    SHA512

                                    3903556d2130a219e9795856a14eb28926e3b798eabfe96353300ccc1c11925aff2f417c9ca588f2ddd0df47d6a64517980a39752edade9ad725f6ee4aa16383

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\Shared\Shared\Resources\1033\sqlevn70.rll

                                    Filesize

                                    2.5MB

                                    MD5

                                    27d0d43f7ee9daefc96eef48620bdb4c

                                    SHA1

                                    83c84ce3c517871dec311500001db5c501d25be3

                                    SHA256

                                    4790c4c828d21865b556b48bdbb0dc84fec7e49e8fbccfd5e75c9dcfb86cae5a

                                    SHA512

                                    fd651fb3cb9335db0a26fd58bc0831a0e91c437ca1a65355b968cf0900fecab1289b6660e64220c330b00c456e1a40e6536e8ad0a3df3f58021f6c1a47861530

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\Shared\Shared\Resources\1049\sqlevn70.rll

                                    Filesize

                                    2.8MB

                                    MD5

                                    35e743c24d8eda76966acf60ed8b337f

                                    SHA1

                                    9eacb67db44b21d2091a50f2d7a7ba7cfa7bfbea

                                    SHA256

                                    09c875779139587ede45c49cf14173d7ce1b68246471a4f5b67dad021e5085ff

                                    SHA512

                                    a25e279baca808528e8d9c0d824ca008a3666eb62f483dc3c9f81c503c97d22689c4ef8e525bf45844f865200f85a3b0a9b1911535fc427e51269043f5983a5e

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\Shared\Shared\instapi110.dll

                                    Filesize

                                    47KB

                                    MD5

                                    f9ee4c23a7bdbbb94bbfff3da087b431

                                    SHA1

                                    b8dad015dcd170bc84e8ae333c66e40c7e4090c3

                                    SHA256

                                    fc988b3fad95fd8ad36d829c9bfa2f36dcd517de674705a3928ad3384354f34f

                                    SHA512

                                    9ba5b2865854929f6ce41139c0a2db61ff49291b0a4e8a0ba653ed622406c0cd9eaeaa4df44fccddc03f0ad621ae75db071d93b76454d4be468334069d8bf5dd

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\Shared\Shared\lssyscat.dat

                                    Filesize

                                    1.0MB

                                    MD5

                                    8079e21b5980d3089761d2366d1c0828

                                    SHA1

                                    77d8430339e0d384a50064697846c8f818f0176c

                                    SHA256

                                    7cb429032be391e6f01065bb772aaf00f979ce7f1766b71d541fa53c58988f27

                                    SHA512

                                    96cb7f455fb567ba5a4e1cb019114d0680fcd338b78d6ed0a2cdd442809d4611cf46bfa95be39e0657b245a1e8c5913d21c53b1f35ee035d4b98af6b51657438

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\sqldk.dll

                                    Filesize

                                    1.6MB

                                    MD5

                                    9284cdf83b7b75720344b616864e8766

                                    SHA1

                                    0ff8fe5eed78440044f1b6afe117e91d2453744a

                                    SHA256

                                    5ab3dfd1f5c303688593e8779dca3fdeb3075647cc675df4d3a23a0a3f90f84d

                                    SHA512

                                    6b9fbcbafe732720e3bc7b4ff15a1349b55d46fc760ab2961193c4103439aeaa1313a950436de80fa6d2c78e9e4334a1d64c157046ec4ce41c2ce32c6df2665c

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\sqllang.dll

                                    Filesize

                                    24.8MB

                                    MD5

                                    29f692b545d0493d4d2257439c6969e7

                                    SHA1

                                    fccfcd17acf600abafe4671be0a1e0d9c06ce3f6

                                    SHA256

                                    f51cf85cfe31f0b447ad5d6000d176b64de50b5e7a09a0af9f59c0a23cbc729c

                                    SHA512

                                    dccdd19aba438f40fd944988f4431a905633cd29048de3b45c924350db67ad481bb221546c41145de93bc1f210c5c9e830a6dcb95127c04f8c80924647f027b0

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\sqllangsvc.dll

                                    Filesize

                                    51KB

                                    MD5

                                    fe645bdecf22601e9fdc293aed23ba0c

                                    SHA1

                                    a665dd12847f2f19a18e68329c98ec543e295027

                                    SHA256

                                    b5108ecfc1dd73e8023d609d5edd8e6dbc5279991a0ae1628f0ca2932b61010b

                                    SHA512

                                    43ac5d53d58c18c0983cbee628ff31dd3ad643b6b9e2ae1bae6d604885538a6733eb05551984dd7cbbb2ae00904e43ba3755ee007c83f874d0627d891e4162b8

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\sqlos.dll

                                    Filesize

                                    23KB

                                    MD5

                                    d5678b23d062bd0acdc4b6d9e88c9585

                                    SHA1

                                    0f9ea289f11eec5b5bc8a00f70d36b84b33f8455

                                    SHA256

                                    c8fe018e57adbb1a5328192e8e9be4a5eb15829ff5ab2713b00c6be7dca98e1e

                                    SHA512

                                    353669e3d65153425f45fcf0c63b603de96a1213aee9db824865c2a80955c465b2e382f01dc91baf8505ff8b970555cccafacc88f4fb4eb20d32bb1f75703d90

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\sqltses.dll

                                    Filesize

                                    7.8MB

                                    MD5

                                    344479af61cacc9c64bca055297afec1

                                    SHA1

                                    cc5e66e6dffa8a243193a8d25424dd81c8d85eac

                                    SHA256

                                    ab859a1d945cb99e2e52e218ef442234d1436f9aa9a81b76ebf85068ccdebc05

                                    SHA512

                                    cf76823c207ccbdc298a863b123c9a84e28e3e41c796ceb55d77fdebaa0ed9f7eb5262efd39bd393cc86319d98275a485e791d3d28b2f92a8d9d69866ba946e7

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\cache\Shared\xe.dll

                                    Filesize

                                    399KB

                                    MD5

                                    063ca314262d277a92189028a9e094fd

                                    SHA1

                                    3f8fb62d6b38ae258dbffda4d9470c78753c3814

                                    SHA256

                                    0ec09cd7d58aeb260fe82ca79ad16c353d7053a665d98f4deb26eba5e2b6e9d3

                                    SHA512

                                    0ef025c85545377d67562bef8744c0966262fd5ffe7fded4a9958ad01cab19e319b7f29fb45d4187a4930611d6b0dea0be32097cb78ae8423934080f7038193f

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\plugins\Autoupdater.ini

                                    Filesize

                                    5KB

                                    MD5

                                    f78b8f3d265b4e9a706ed0aae70bdf9c

                                    SHA1

                                    6d73ad3954fd8fda80911071efca1910fd2d0a3d

                                    SHA256

                                    dcae62d049c4dd496effab6f02220bc270c6c098ebb55a5a6e55fbafad2974d2

                                    SHA512

                                    c44887c08d1239969aaf9934921f1a7341b87faded169136fcc0539d62de3104ecec0e3ac7a28eb3135cb449f58310b49f868963b64b920210d1c55104e7e7cb

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\plugins\Management.log

                                    Filesize

                                    8KB

                                    MD5

                                    ff765d6581fe6568aaae19de239b2e7a

                                    SHA1

                                    78b09b0ce2e59ce87f65251ea903842c1c77046a

                                    SHA256

                                    4dd051de9b04902fc59d411b1c27c42007cacca4ea52e88d71c897cad1d990cc

                                    SHA512

                                    8fa7c766fc1ac48408d964eb9844f9c4a2fb3e33357e736230024788ec71cb3c338397e16f8e556bbcaafd83c58f3af6a55ceaa9daff290b0e687093e5c97a2e

                                  • C:\Users\Admin\Downloads\CS2 Skin Changer v.1.9\plugins\main.ini

                                    Filesize

                                    4KB

                                    MD5

                                    d2e799c6b2467a0a4aeb0cba508e8a30

                                    SHA1

                                    349e50e830cca26b03a0e32bac1f9045a72eb406

                                    SHA256

                                    d3d79eda930253d1ad388f60a56775f7d6bff80ce5a4e07c812d7d338fc93593

                                    SHA512

                                    f1d14875a6379b450eb5dc2513a1791ec65a6fb237db94a74621c70ca5d579428b7cded35ce3bece884faaabca4f0705de73fb5cc8b2d60be995b2be66cb20c2

                                  • memory/4852-1747-0x00000000008A0000-0x00000000008FE000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/4852-1748-0x00000000008A0000-0x00000000008FE000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/4852-1749-0x00000000008A0000-0x00000000008FE000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/4852-1751-0x00000000008A0000-0x00000000008FE000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/4852-1750-0x00000000008A0000-0x00000000008FE000-memory.dmp

                                    Filesize

                                    376KB