Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/08/2024, 00:23

240811-apyleszfnh 8

11/08/2024, 00:12

240811-ahh76azdjb 7

Analysis

  • max time kernel
    217s
  • max time network
    219s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 00:23

General

  • Target

    Among-Us_com.innersloth.spacemafia_gameslolc_28138855.exe

  • Size

    3.3MB

  • MD5

    e23d97827ea3c90cd85f2d11402e8940

  • SHA1

    67c01979b3516f9c3082cc05367142a74e413be8

  • SHA256

    16f7d9d609c24c5af75c0141059d49008eb9b1f016d198e224bdb486668cc7b5

  • SHA512

    e9dfd9ebf77aa615b17c05f99a5efed0c5dc993b7ca59800aa7ffa45d0d7fe4e207d0e4386c4fd9b11ceb49b5a4d28b4014ab9d6327ed86a8321cd9f3e90f646

  • SSDEEP

    98304:EyasyD6Lvd557Vh2EKTlpFGuKIKRv6owpuC:XyOT57V7jFiowgC

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file
  • Manipulates Digital Signatures 1 TTPs 4 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies data under HKEY_USERS 22 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Among-Us_com.innersloth.spacemafia_gameslolc_28138855.exe
    "C:\Users\Admin\AppData\Local\Temp\Among-Us_com.innersloth.spacemafia_gameslolc_28138855.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\Among-Us_com.innersloth.spacemafia_gameslolc_28138855.exe
      "C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\Among-Us_com.innersloth.spacemafia_gameslolc_28138855.exe" /app "C:\Users\Admin\AppData\Local\MobiGame\\"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1132
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3448
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3288
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\utils\sysinfo-app.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\utils\sysinfo-app.exe
          C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\utils\sysinfo-app.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4648
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1888
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3740
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_OptionalFeature | Where-Object {('HypervisorPlatform','VirtualMachinePlatform','Microsoft-Hyper-V-All','Microsoft-Hyper-V-Hypervisor','Microsoft-Hyper-V-Services') -like $_.Name}).InstallState
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2100
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:828
      • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\MobiHelper.exe
        "MobiHelper.exe" --install-path="C:\Program Files\MobiGame" --desktop-path="C:\Users\Admin\Desktop" --local-app-data-path="C:\Users\Admin\AppData\Local\MobiGame" --parent="C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\Among-Us_com.innersloth.spacemafia_gameslolc_28138855.exe" --playstore-json-file-path="C:\Users\Admin\AppData\Local\MobiGame\playstore.json" --google-analytics-id="28138855" --create-playstore-shortcut --api-url="https://gamestore30.emu.codes" --source="gameslolc"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4184
        • C:\Windows\system32\ie4uinit.exe
          "C:\Windows\system32\ie4uinit.exe" -show
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:1332
      • C:\Windows\system32\ie4uinit.exe
        "C:\Windows\system32\ie4uinit.exe" -show
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2028
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1868
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2616
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 2CB95991C01B15A3F665E42338E8CCC5
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1544
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI5DB6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240737750 2 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:3632
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI5EB1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240737968 11 WixSharp!WixSharp.ManagedProjectActions.WixSharp_Load_Action
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /c set
            4⤵
              PID:2480
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSI600A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240738343 32 VirtualBoxSetup!VirtualBoxSetup.CustomActions.SetSessionPropertiesFromConfig
            3⤵
            • Loads dropped DLL
            PID:4804
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding A194AAB51E7A8B80EEAD508E6EB92504
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2932
        • C:\Windows\System32\MsiExec.exe
          C:\Windows\System32\MsiExec.exe -Embedding BD46C7519DB4E076CCAF6BA307B87615 E Global\MSI0000
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3376
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSI79E1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240744984 83 VirtualBoxSetup!VirtualBoxSetup.CustomActions.CloseProcessesAndUsedFiles
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            PID:220
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSI7ADC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240745171 90 VirtualBoxSetup!VirtualBoxSetup.CustomActions.DeletePlayStoreAutorun
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:5088
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIB3A1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240759718 94 VirtualBoxSetup!VirtualBoxSetup.CustomActions.CreatePlaystore
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            PID:3928
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIB94F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240761171 119 VirtualBoxSetup!VirtualBoxSetup.CustomActions.CreateRegistryForAegLauncher
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:4424
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIB9EC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240761312 123 VirtualBoxSetup!VirtualBoxSetup.CustomActions.InstallCertificate
            3⤵
            • Manipulates Digital Signatures
            • Loads dropped DLL
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Modifies system certificate store
            PID:4864
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIBA7A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240761453 127 VirtualBoxSetup!VirtualBoxSetup.CustomActions.SaveSessionPropertiesToConfig
            3⤵
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Drops file in Windows directory
            PID:4612
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIBB65.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240761734 137 VirtualBoxSetup!VirtualBoxSetup.CustomActions.SubstitutePath
            3⤵
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Drops file in Windows directory
            PID:3708
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIBD79.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240762234 157 VirtualBoxSetup!VirtualBoxSetup.CustomActions.InstallService
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious use of WriteProcessMemory
            PID:1340
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe" "C:\Program Files\MobiGame\MobiGameUpdater.exe"
              4⤵
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              PID:3832
            • C:\Windows\system32\sc.exe
              "sc.exe" config MobiGameUpdater start= demand
              4⤵
              • Launches sc.exe
              PID:3200
            • C:\Program Files\MobiGame\utils\subinacl.exe
              "C:\Program Files\MobiGame\utils\subinacl.exe" /service MobiGameUpdater /grant=S-1-5-21-656926755-4116854191-210765258-1000=F
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4864
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIC068.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240762984 170 VirtualBoxSetup!VirtualBoxSetup.CustomActions.InstallAegLauncherService
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:3652
            • C:\Program Files\MobiGame\aeg_launcher.exe
              "C:\Program Files\MobiGame\aeg_launcher.exe" -service=install
              4⤵
              • Executes dropped EXE
              PID:1508
            • C:\Windows\system32\sc.exe
              "sc.exe" config AegLauncher start= auto
              4⤵
              • Launches sc.exe
              PID:4700
            • C:\Program Files\MobiGame\utils\subinacl.exe
              "C:\Program Files\MobiGame\utils\subinacl.exe" /service AegLauncher /grant=S-1-5-21-656926755-4116854191-210765258-1000=F
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4080
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIC27D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240763515 181 VirtualBoxSetup!VirtualBoxSetup.CustomActions.UpdateUninstallData
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:4684
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIC405.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240763890 190 VirtualBoxSetup!VirtualBoxSetup.CustomActions.RegisterCustomProtocol
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:3224
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIC7A1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240764843 199 VirtualBoxSetup!VirtualBoxSetup.CustomActions.InstallVirtualBox
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:4508
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /c "C:\Program Files\MobiGame\player\register_services.cmd"
              4⤵
                PID:2100
                • C:\Windows\system32\net.exe
                  NET FILE /N
                  5⤵
                    PID:2576
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 FILE /N
                      6⤵
                        PID:996
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c cd
                      5⤵
                        PID:1896
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c cd
                        5⤵
                          PID:4460
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ver
                          5⤵
                            PID:3116
                          • C:\Program Files\MobiGame\player\MobiVBoxSVC.exe
                            "C:\Program Files\MobiGame\player\MobiVBoxSVC.exe" /UnregServer
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:2976
                          • C:\Program Files\MobiGame\player\MobiVBoxSDS.exe
                            "C:\Program Files\MobiGame\player\MobiVBoxSDS.exe" /UnregService
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Modifies registry class
                            PID:1952
                          • C:\Windows\system32\regsvr32.exe
                            C:\Windows\system32\regsvr32 /s /u "C:\Program Files\MobiGame\player\VBoxC.dll"
                            5⤵
                            • Loads dropped DLL
                            PID:3664
                          • C:\Windows\syswow64\regsvr32.exe
                            C:\Windows\syswow64\regsvr32 /s /u "C:\Program Files\MobiGame\player\x86\VBoxClient-x86.dll"
                            5⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:4788
                          • C:\Windows\system32\regsvr32.exe
                            C:\Windows\system32\regsvr32 /s /u "C:\Program Files\MobiGame\player\VBoxProxyStub.dll"
                            5⤵
                            • Loads dropped DLL
                            • Modifies registry class
                            PID:4200
                          • C:\Windows\syswow64\regsvr32.exe
                            C:\Windows\syswow64\regsvr32 /s /u "C:\Program Files\MobiGame\player\x86\VBoxProxyStub-x86.dll"
                            5⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:3708
                          • C:\Program Files\MobiGame\player\SUPUninstall.exe
                            "C:\Program Files\MobiGame\player\SUPUninstall.exe"
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:3472
                          • C:\Program Files\MobiGame\player\MobiVBoxSVC.exe
                            "C:\Program Files\MobiGame\player\MobiVBoxSVC.exe" /RegServer
                            5⤵
                            • Executes dropped EXE
                            PID:2128
                          • C:\Program Files\MobiGame\player\MobiVBoxSDS.exe
                            "C:\Program Files\MobiGame\player\MobiVBoxSDS.exe" /RegService
                            5⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            PID:4888
                          • C:\Windows\system32\regsvr32.exe
                            C:\Windows\system32\regsvr32 /s "C:\Program Files\MobiGame\player\VBoxC.dll"
                            5⤵
                              PID:3288
                            • C:\Windows\syswow64\regsvr32.exe
                              C:\Windows\syswow64\regsvr32 /s "C:\Program Files\MobiGame\player\x86\VBoxClient-x86.dll"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:4736
                            • C:\Windows\system32\regsvr32.exe
                              C:\Windows\system32\regsvr32 /s "C:\Program Files\MobiGame\player\VBoxProxyStub.dll"
                              5⤵
                              • Modifies registry class
                              PID:2764
                            • C:\Windows\syswow64\regsvr32.exe
                              C:\Windows\syswow64\regsvr32 /s "C:\Program Files\MobiGame\player\x86\VBoxProxyStub-x86.dll"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:3320
                            • C:\Program Files\MobiGame\player\SUPInstall.exe
                              "C:\Program Files\MobiGame\player\SUPInstall.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:4704
                            • C:\Windows\system32\net.exe
                              NET FILE /N
                              5⤵
                                PID:4672
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 FILE /N
                                  6⤵
                                    PID:1000
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c cd
                                  5⤵
                                    PID:4628
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c cd
                                    5⤵
                                      PID:4608
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ver
                                      5⤵
                                        PID:4128
                                      • C:\Program Files\MobiGame\player\MobiVBoxSVC.exe
                                        "C:\Program Files\MobiGame\player\MobiVBoxSVC.exe" /UnregServer
                                        5⤵
                                        • Executes dropped EXE
                                        PID:1876
                                      • C:\Program Files\MobiGame\player\MobiVBoxSDS.exe
                                        "C:\Program Files\MobiGame\player\MobiVBoxSDS.exe" /UnregService
                                        5⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        PID:756
                                      • C:\Windows\system32\regsvr32.exe
                                        C:\Windows\system32\regsvr32 /s /u "C:\Program Files\MobiGame\player\VBoxC.dll"
                                        5⤵
                                          PID:3012
                                        • C:\Windows\syswow64\regsvr32.exe
                                          C:\Windows\syswow64\regsvr32 /s /u "C:\Program Files\MobiGame\player\x86\VBoxClient-x86.dll"
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4944
                                        • C:\Windows\system32\regsvr32.exe
                                          C:\Windows\system32\regsvr32 /s /u "C:\Program Files\MobiGame\player\VBoxProxyStub.dll"
                                          5⤵
                                          • Modifies registry class
                                          PID:4552
                                        • C:\Windows\syswow64\regsvr32.exe
                                          C:\Windows\syswow64\regsvr32 /s /u "C:\Program Files\MobiGame\player\x86\VBoxProxyStub-x86.dll"
                                          5⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:4984
                                        • C:\Program Files\MobiGame\player\SUPUninstall.exe
                                          "C:\Program Files\MobiGame\player\SUPUninstall.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          PID:376
                                      • C:\Windows\system32\sc.exe
                                        "C:\Windows\system32\sc.exe" stop "MobiGameUpdater"
                                        4⤵
                                        • Launches sc.exe
                                        PID:3628
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe" /u "C:\Program Files\MobiGame\MobiGameUpdater.exe"
                                        4⤵
                                        • Modifies data under HKEY_USERS
                                        PID:4596
                                    • C:\Windows\system32\rundll32.exe
                                      rundll32.exe "C:\Windows\Installer\MSIE443.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240772140 213 VirtualBoxSetup!VirtualBoxSetup.CustomActions.RemoveRegistryForAegLauncher
                                      3⤵
                                      • Drops file in Windows directory
                                      PID:1476
                                  • C:\Windows\syswow64\MsiExec.exe
                                    C:\Windows\syswow64\MsiExec.exe -Embedding 7B8DF60C3BEB3DBC1B4A43E1CA1A8B69 E Global\MSI0000
                                    2⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:2636
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                                  1⤵
                                    PID:452
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe"
                                      2⤵
                                      • Subvert Trust Controls: Mark-of-the-Web Bypass
                                      • Checks processor information in registry
                                      • NTFS ADS
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2572
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {05c8d65f-44e6-471a-bcc5-c373e0b7a3ac} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" gpu
                                        3⤵
                                          PID:1388
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2372 -prefMapHandle 2368 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5d37f70-13ef-4b86-bc56-322bc90bb7a7} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" socket
                                          3⤵
                                          • Checks processor information in registry
                                          PID:664
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 2952 -prefMapHandle 2948 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a99bb411-bde8-4cc3-b0b2-b935e26f42c6} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" tab
                                          3⤵
                                            PID:3260
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4224 -childID 2 -isForBrowser -prefsHandle 4216 -prefMapHandle 4212 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0de67e4-8c89-46c1-b94b-2512d49e5c76} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" tab
                                            3⤵
                                              PID:2932
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5032 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5028 -prefMapHandle 5024 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4ed0330-b6a0-4552-97f5-8473828e1e59} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" utility
                                              3⤵
                                              • Checks processor information in registry
                                              PID:5480
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5388 -childID 3 -isForBrowser -prefsHandle 4864 -prefMapHandle 5360 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e0bb5e8-4d18-4461-a051-bb40dc9ccbd1} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" tab
                                              3⤵
                                                PID:5852
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 4 -isForBrowser -prefsHandle 5552 -prefMapHandle 5560 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52ffa6cc-4283-47f3-a855-c483b1799675} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" tab
                                                3⤵
                                                  PID:5864
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 5 -isForBrowser -prefsHandle 5772 -prefMapHandle 5780 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af99982c-77cc-4f8b-a15e-1e9169be4b23} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" tab
                                                  3⤵
                                                    PID:5876
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6100 -childID 6 -isForBrowser -prefsHandle 2792 -prefMapHandle 2644 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1344 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2edbfa4-a4f8-4244-9fcb-e25be4cd6f77} 2572 "\\.\pipe\gecko-crash-server-pipe.2572" tab
                                                    3⤵
                                                      PID:4680
                                                    • C:\Users\Admin\Downloads\Gameslolinstaller.exe
                                                      "C:\Users\Admin\Downloads\Gameslolinstaller.exe"
                                                      3⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      PID:4268
                                                      • C:\Users\Admin\AppData\Local\Temp\pcgame_F8EE0699\Gameslolinstaller.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\pcgame_F8EE0699\Gameslolinstaller.exe" /app "C:\Users\Admin\AppData\Local\MobiGame\\"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5284
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
                                                          5⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:5444
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
                                                          5⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:5076
                                                    • C:\Users\Admin\Downloads\Gameslolinstaller.exe
                                                      "C:\Users\Admin\Downloads\Gameslolinstaller.exe"
                                                      3⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      PID:5372
                                                      • C:\Users\Admin\AppData\Local\Temp\pcgame_EE228F83\Gameslolinstaller.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\pcgame_EE228F83\Gameslolinstaller.exe" /app "C:\Users\Admin\AppData\Local\MobiGame\\"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5664
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
                                                          5⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:4520
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
                                                          5⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:5292

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files\MobiGame\5qgoaojb.newcfg

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  9e083eaa17228a0fa77f70921e94d34d

                                                  SHA1

                                                  481fc382b1cffbca84d5aab4438f48702950cafe

                                                  SHA256

                                                  7259583e7be390d19192141ffe5ee5dcd8ddca8933ad7b636063749a3e6f6f6f

                                                  SHA512

                                                  0709a6651aa0a79f334cc6547c49d86b1f9e58543d71aa38daff55c1260fe981299cf240a19c499db45ba203a6b1b6afe3aa0babf8f8b100a7357ac15d0541a7

                                                • C:\Program Files\MobiGame\Communicator.exe.config

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  a1542da1b06616171d711cf143c18e93

                                                  SHA1

                                                  2d661b2def0a3377c238e76af5636e61369d6d61

                                                  SHA256

                                                  d2b4784ab623981ea29243091bbcd49081dafa30211a00135a32f30b9b83f71b

                                                  SHA512

                                                  45ff0605a99aaeb35539349386adba60d946971463dadf40c1e7e483530074776eebc093c5f08676cd7b2e4c2b96ab6b804cc85d43b567db94b6193136bfb03b

                                                • C:\Program Files\MobiGame\Communicator.exe.config

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  a4a318e85df543bb4bee362f061eafaa

                                                  SHA1

                                                  39b6d13872e5e1dfb5260ae48d6d4b313e16329a

                                                  SHA256

                                                  3ffebb3ce4d2e01757cbe0495c2919181a129e6f969d9a8a498e8c28912bff99

                                                  SHA512

                                                  54f949aaf669594cf21fd843e5650d7b96d81f4e57a751e7293d112b76af9b442c6c4369954bb2a92fa5f93d4a9286f238e858973794eb65344e0ce94495cc22

                                                • C:\Program Files\MobiGame\MobiGameUpdater.InstallLog

                                                  Filesize

                                                  251B

                                                  MD5

                                                  e23cd35078ec3585e3ad3f4a49a195ea

                                                  SHA1

                                                  c798ced2882ba76bf6cd2a305c63f032d34170ad

                                                  SHA256

                                                  ca6c6f38a25e005d35d405335021cb2f86f9eed57e2c410ff18ae5114d446bbc

                                                  SHA512

                                                  040ac655d86f98c6f86f5bc88e3ac41012bac58f6951bc88ba9ff09ac29f403806d320eab306cbb9ec7f0aaa8bee4df8723fb37f3fea496e9bf1dcfc01bf7c46

                                                • C:\Program Files\MobiGame\MobiGameUpdater.InstallLog

                                                  Filesize

                                                  660B

                                                  MD5

                                                  349e0bdb3112341296785ceb24e5af3b

                                                  SHA1

                                                  5500fdbe799b225d4205ddbeb35f0b5a775bc157

                                                  SHA256

                                                  d869115f03a7b277ddc93e5683722047f0bca52a897608271513a63edb2e7a05

                                                  SHA512

                                                  927405cea3bdb77177e8c74c9d488565e54a879fc6e51e538a05e775e25f6d7a4c5e84353e4b46e810c5d87570a41f81c41a2f876e085d9c17887f359cd04f21

                                                • C:\Program Files\MobiGame\MobiGameUpdater.InstallLog

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  27f6a9de38d3ac5a4fb04fdd6c761ea3

                                                  SHA1

                                                  43642f7ea086f9ef6f427962cf8eb8399939d1fe

                                                  SHA256

                                                  f619d54a74addc3619cba5102b2b8709d1f97b4196ae112daa4b3339b1e20c2a

                                                  SHA512

                                                  ec5198d0080ba3cf7effd73d0de8bef09e0ba86dc71ff3b6e7c71ee69fbf401e7d3f08003dcda7d396606ef72aedd1b682d82eb4798dff58ae45a4671850b680

                                                • C:\Program Files\MobiGame\MobiGameUpdater.exe.config

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  9157364bda432f8a034964136910cfcc

                                                  SHA1

                                                  78e273e8319a38635f02808280770f036558d2fc

                                                  SHA256

                                                  8283250cf944b819c911ec174c13f80096d30623eb2c99a32b56752fb14daf08

                                                  SHA512

                                                  6148948de8e718a143a852c8a598b3a0c352f497405d75bc0bd23ea63b81d6d2506912e67d4db5ec656da70d222f79d1f76bf28445af80ef1eee45cbc3486a91

                                                • C:\Program Files\MobiGame\MobiGameUpdater.exe.config

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  ef25297ab52076dc86fef669d9ef9d7b

                                                  SHA1

                                                  56f15ec744bf967b5fc136a85aa60a66887283b6

                                                  SHA256

                                                  45885321df04462c6ec055ebd73481aad116042d58a7c54ce7aee661694d673a

                                                  SHA512

                                                  1b6b0fb63dd4b95dd08e37c3f4b33ce8a5666536474245850e3fa2ea5066af063f438b18597e38c06f74d9b217a2d921487bcf7e7d31bed893e2e82f3359d1e9

                                                • C:\Program Files\MobiGame\kdyxczgs.newcfg

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  7cb3d46c48c6293491fec4692283451b

                                                  SHA1

                                                  947ba52f318a69c5c9dc560c5f51aad03a5d32b0

                                                  SHA256

                                                  4be4e69ffa86ae8a511ec5edf46f9f38e52a4e4d7fe03bfb534597a3dc6928e6

                                                  SHA512

                                                  8172ee34d943f4609d102f809d3e2e834641ef47dd959c724633039e30c5957e497d18864fd4c2d57d188fe6e09728740619e8dad33333812d079fa1f166cf4c

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_53A1B1F8A70C6C11B81DE7FBA9338D4F

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  d640af5b733945e1c4abef1dab0d4935

                                                  SHA1

                                                  e6f3de7b9f37fe318601b68261ac0f9f5bee1332

                                                  SHA256

                                                  48f07bee4f2b6e4ffaa1cdf6a131a8c571b8a616374b2615bfabc377ab3651c3

                                                  SHA512

                                                  0e929927e5827162394a0eaf8674550e3b16a35b30b3208a46dad0b5f3854066c85f5f87c8a9a34a02ca033eb052a6a71824b30d3d509f7a2975998adc5d6b5c

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  9f16d96b0729e78d8383bf3a973e2c3b

                                                  SHA1

                                                  e56fdde3d08015fb15e7117af0def39e0a76fcce

                                                  SHA256

                                                  6af06c47034db4777080b5a6836bf223d06d41a491daed02036f2ac5fcc5ed63

                                                  SHA512

                                                  4c65629006b5ee23b0652f3af299f974ad6da55e26daff125b73e03babbf7fe862e81fd9e4d74a91537a12f1c9339c35c75d7604b7ec3578b8883357016faf7e

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_53A1B1F8A70C6C11B81DE7FBA9338D4F

                                                  Filesize

                                                  536B

                                                  MD5

                                                  a190c5d4823aff20c140c1d018c58602

                                                  SHA1

                                                  174e5cfedcbcc2b9fcf79bde600d12c4fe5cef9e

                                                  SHA256

                                                  f110a35ff1237798a14a781e98de3f1e91a60232c75b5e99fded232826ee17bd

                                                  SHA512

                                                  f1de97c19e258efd0318fa42154ba5291c4a79edb5a7f85f7ebf0e56dd8a5746fd126518808e2600c439a7f758dab0167f60c760c4f9a41ebe6749dde8c7029e

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

                                                  Filesize

                                                  536B

                                                  MD5

                                                  812cbfff346f1d0d8e0d89a7bf785536

                                                  SHA1

                                                  5c0f059de2342d1758a308809d2e2016f7d20ae0

                                                  SHA256

                                                  d62dc279b5c62f8b923a1d34934afdc462ec928466d89275ce82b6b6f88a1985

                                                  SHA512

                                                  78e854347a7f30d1e848b75afe58ed33bee459b0b680fcdb72d22a6db853280ea646ed18a89a4a3a32536e2fafaa20947e92a13c315e907a99c8fd2d68855b4b

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  3bfc414667e1ebc31e9259fa1db290fa

                                                  SHA1

                                                  9bff989429779efef334e5524a362e7b6ff266cb

                                                  SHA256

                                                  b58f994c644f7b4a831e889630bfd7ca0860aeb1e0920dc0f5d4928585a9dbab

                                                  SHA512

                                                  e6cb000e8f900132f7dc661f943b8e91e945d171157ff3289b91e9d79f70230e363ed65b7ec97f451b376cf4706a14de9a86193e72dcea8fe3aa8c86c6117d13

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log

                                                  Filesize

                                                  651B

                                                  MD5

                                                  00bfeb783aeff425ce898d55718d506d

                                                  SHA1

                                                  aac7a973dc1f9ca7abc529c7ea37ad7eaf491b8f

                                                  SHA256

                                                  d06099ef43eb002055378b1b6d9853f9b1f891ada476932ba575d1f97065a580

                                                  SHA512

                                                  2209d5f4999cb36ebf26c6b8cb3195cc9fc0f0a103f4a28dd77b04605d7c6e79d47d806454c63b8d42bbe32864be7cdb56df3cccf71a6c27fe0b331d8304e1ff

                                                • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\ie4uinit-show.log

                                                  Filesize

                                                  952B

                                                  MD5

                                                  d4145263b11804d24183c677c80121b3

                                                  SHA1

                                                  5f742243c2ddc2cbefeb97ceaff3ec2d2c88e62a

                                                  SHA256

                                                  e905fc0fa30996dbe6a57ded31a917615e09b1610b2d62105cedfc348541725a

                                                  SHA512

                                                  3778944fa8b26a8c10f44240d3853d149ad3725da505618f2dfe4f9ea8dd9fd367e50259e562732b7ba27fb08f077eb3377a895a9f0016055e9d01d57b925d43

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  7d62a8b4882bcae55db635f5173a97d9

                                                  SHA1

                                                  c780200e6e77abadbf872d9493d362ad1ff9342a

                                                  SHA256

                                                  03a9c1ee1610ac667757db120dfb496c1dfe93fb3fe6e25a3805092d19c3349e

                                                  SHA512

                                                  bf3b4cfec8ecf7010ff261bc5eb5d1ab27be5f4cafd73e9fcf6b65dfb340afb27ff77dd26ddb94f7183cd69ac43281bbb3a4afef34ccc306fdd0ca1950fd61eb

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  33d9648e4975f07ebcf4a3176d7486f8

                                                  SHA1

                                                  f1376eabe24360c19ea387c604708ef5d3baf74f

                                                  SHA256

                                                  125f70eaff332e7abafccb6a35c6e87b029143918e74bf9045b207410e4f697c

                                                  SHA512

                                                  81f07b63ef2e8b2af81272cde8bfba7353fd89c82c3ac5d5ecb4004b943578c2dc1bf88b79b0df6157f9286c31601e693bababbdf294c4079c267c9611a523af

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  740951544b69d9a5a00aa693bf1e2d73

                                                  SHA1

                                                  c46fdae6979a08b5e9db05046686f0d1edf38caa

                                                  SHA256

                                                  dd63d617a9607de67ecf702ea93f02e805d11eafbd2c6e9f705c620b1e685a22

                                                  SHA512

                                                  e5fbfb1346aa56c358b6970e0caddb424ef416daba7ed3a2014dc18dabd2d0d5ec42f4a10518ca1453e7dc4da1893ee23b0cd18d4e91887637ce5ae9577db398

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  1e766e6dd952c14f3a47474346d696b6

                                                  SHA1

                                                  68f5c07852d6e08b7d3ffba06f8c7b9281423cac

                                                  SHA256

                                                  f5969b62711235d7428c48b01c084cb8bfab18403bff55737d387642930392f8

                                                  SHA512

                                                  1c1cecd4bb19f905d2e15c2be5d67620894ec0215b4dd9613dd9e3fcebe7f744b12b4c5a32e49939c69a2214d7c1376108f5c95532f4c0b9df50687019f5c28c

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  6f93ba2bf86c51621ed901d5066fb2c8

                                                  SHA1

                                                  c476f6080fb1db89c755757e9a2586206ff33491

                                                  SHA256

                                                  c9730d10fd39a556bc3134350c8e06e4126abe61ee41cc5cd6927eab4037143f

                                                  SHA512

                                                  ce6a78e697ef8510e39eb113df1dfaf68f714c2d2278e346e58a779e7861287a229ea26b433611db26aa12614405af0c2c13b4ab5041db76f8a5673564512401

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  75163bfdcc84ef15aa8d47f3151648f9

                                                  SHA1

                                                  89390212556f2f8d9b25aae768638d289fdcd935

                                                  SHA256

                                                  37fb7235974d55711f1f60ee307047f13cb2df8e90e604e5ac502aa8de3730da

                                                  SHA512

                                                  2e29296bc01858a4b1e5e967b71c0b52b7b84b56fbe1a33c0be5fe45e3e9d2b0af464d111b4dd98261ddd4505c082cc556a01f5d19c85d28c1ccdf7fd4967152

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  4a1ecdb31d7a3d9699351208166883cb

                                                  SHA1

                                                  b62a03b1a9e94f731427b5e19bd57bbc4a53e742

                                                  SHA256

                                                  6fa9e2383011bb63b475b42dbc83c1e1db57135ac2590bec0a9003e7f036eeb7

                                                  SHA512

                                                  ec94fd098e3c3674eb2fd6704414d179f1ac118c566f0b57be40050f3688e5b60bd6fd528631e827058b49f25d74d1f6f939a9c4c1ad9e0256534a83d8b491b6

                                                • C:\Users\Admin\AppData\Local\MobiGame\hwid.dat

                                                  Filesize

                                                  32B

                                                  MD5

                                                  3fca6e72305c406c7f91dda95ca62881

                                                  SHA1

                                                  548163ef3b6d39eee1bc330fb1f5ad995c9b4d4d

                                                  SHA256

                                                  d865f508c0ea37c8a1d16377ad5283021ea0d4edb26acdaf3c87c9ac34454a06

                                                  SHA512

                                                  bc9b6710778597f639776fbb0f01400f05b947aec34c60a30c2a091d056851884120bcacb428125b365f41d3763011b5da395dfaf2b5efe09ab2ee54980661c2

                                                • C:\Users\Admin\AppData\Local\MobiGame\installid.dat

                                                  Filesize

                                                  32B

                                                  MD5

                                                  bba5816e909b1779b72039a4c8c5148e

                                                  SHA1

                                                  9b454ae78ed4bbe0673b64f830d0be0feca5d1a5

                                                  SHA256

                                                  960533c5bf189da87d40ac310701428db9538adce1d461ea2778822168aa48f1

                                                  SHA512

                                                  6fea26631e30a4e4f019ffd807a8e45ac51522d3ed3a74523f2c368713c03745543aec14605ae17599bb327f7bed05b80f2ac590493559d9d1fc3192dba4838b

                                                • C:\Users\Admin\AppData\Local\MobiGame\logs\downloader.log

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  53fffed461a95d18ff54926fd28ef3b0

                                                  SHA1

                                                  1a05c94436391bb882bbf9305db0717c8c4e3808

                                                  SHA256

                                                  3c117b31a742e71000e874193a829ce18edb1f937a2d2bb86b4b4ce2c93a4470

                                                  SHA512

                                                  ff2e43ffea3b5ebf8bc2409a25235a09c53e29f0d735f1d162eb81d38ddf49fc02ba551b778898cc65082365e6ef03f19fd7484f372e1d24e6f14519fcffa47b

                                                • C:\Users\Admin\AppData\Local\MobiGame\logs\msi_install_2024.08.11_00-25.log

                                                  Filesize

                                                  2B

                                                  MD5

                                                  f3b25701fe362ec84616a93a45ce9998

                                                  SHA1

                                                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                  SHA256

                                                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                  SHA512

                                                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                • C:\Users\Admin\AppData\Local\MobiGame\playstore.json

                                                  Filesize

                                                  537B

                                                  MD5

                                                  5feca042545b8c85fc30c3cdb6f36b9b

                                                  SHA1

                                                  53555b4f48d4945b41bf887f3ad7825159654c77

                                                  SHA256

                                                  e02252206a390428ec0a5ddfdb2ec048593cfb0ed967f4885e54c22224650caf

                                                  SHA512

                                                  5d734ab9bc5ca72014886715c49739ce42a5ae462ab5a752ce1aa3d7031cc511053459d4d762f8955aafa05c42c1ea5eb688e59aaaf978c3335de7ef00e11c65

                                                • C:\Users\Admin\AppData\Local\MobiGame\sourcesettings.json

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  e09ca833ccd4a626fd1da2543d5bef68

                                                  SHA1

                                                  7ae21f74c8b8bf564123d7e61ae11c63c5bc4e01

                                                  SHA256

                                                  1db566b34afa6dbab3e076f43553e0e04fdbc566542bb7fc52f5342358286991

                                                  SHA512

                                                  7ed39b694798759fcb6948c277261a4f84937ac439a0743cd6ee107f2377e3cf30d7400ee36fd6520531af5f1d516f5be1616116a4bcd62d2348d837acd03ada

                                                • C:\Users\Admin\AppData\Local\MobiGame\userconfig.json

                                                  Filesize

                                                  154B

                                                  MD5

                                                  f97f3970ebf4ccd7ff1adda4825230a3

                                                  SHA1

                                                  5365cece98aa84a39f482039e731796812335f76

                                                  SHA256

                                                  e0fc86d63617a38cbbc965ee94fe6b5856b8efff380a556f349c7652930b95fc

                                                  SHA512

                                                  ceb06133494145c332095fe91ae8290430926a14c7763d67e515683ba402c36d736564f50724a9c2a1dc911460515e506431bed17f63be6fffe87efab54b35da

                                                • C:\Users\Admin\AppData\Local\MobiGame\userconfig.json

                                                  Filesize

                                                  153B

                                                  MD5

                                                  9985778609094662c1bb0ebc122a6472

                                                  SHA1

                                                  86e890c413152fbcb3fe6a20fef15444d72eacaa

                                                  SHA256

                                                  fa2d51eac7d2b0835fe578bfb8ce04323635e9678c68d4aeb203d867bf8e9fcc

                                                  SHA512

                                                  4b8b715a5808d46edd86f6e91b8779c54bba2ac01db67d6b44cb42ad172a92e06f47cab98269c6a403b3a3fbb16490e895ae3fe0f0e092025271d87a778d108b

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vtjbhp4j.kro.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\Among-Us_com.innersloth.spacemafia_gameslolc_28138855.exe

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  8afdf50f0097e7fc7254c83b2b2bf097

                                                  SHA1

                                                  771f30d91517ce306e93b548f31bd595139255a8

                                                  SHA256

                                                  1c96bab3b22b9e52736982b58ff5d75eb22293aa184024ad29c4f722bf1420f3

                                                  SHA512

                                                  51e70ae50cc46be7670ce73c559ffa11f6cc324a0256b44f394c789b5e7fd78089b934f7a91b06d5ceba55caede217a87296bbdb0ba17e48e59dad8ca33a5e2b

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\Among-Us_com.innersloth.spacemafia_gameslolc_28138855.exe.config

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  6517457e21bed85a6e41e8b84942c8dc

                                                  SHA1

                                                  45451a32d6246265c94660030642137ff0ac4629

                                                  SHA256

                                                  3148b743bb5599ee95ff171d8ed7f66c48979d5993a328f9e9291c1443e0fd28

                                                  SHA512

                                                  e694240d22e240f3b4ba78a2d0e38b353ce1f5ea348d46e688cb60166cdd91083b5069d1cbc79f94cfbf322edbdeee3511eb9360c2a08c3002d1ca28175451a3

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\Microsoft.Deployment.WindowsInstaller.dll

                                                  Filesize

                                                  182KB

                                                  MD5

                                                  82eb1ccf28f3af897c2db27282b41156

                                                  SHA1

                                                  9f945d8b18ff0fbb5f013efe5e2ff33aef136104

                                                  SHA256

                                                  ced6cab3c04c08ce5705af0b6986965dbdbfda17cbd66c973bb371ed3b95f37a

                                                  SHA512

                                                  9458fabeae4dabf8109b9736496a01d9168312faec1c17d6eed89e8f09cbb8287d74ff758948cf07838720c11005e87a734e920be4ead275354f46a0a6176f84

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\MobiHelper.exe

                                                  Filesize

                                                  590KB

                                                  MD5

                                                  751672b3dc8e48b7632544b57e01a069

                                                  SHA1

                                                  a497158550201b67a8340756529c8909f13ddb5a

                                                  SHA256

                                                  acff977962ee68c47b786c28186b43b093ef41ec6ed617ee019f1227e17d8799

                                                  SHA512

                                                  96e0d9a1f15c55ab69b37ec095dda802a008c37c14a51bce6b5e04ca60d83e09bf9d69be604d0fd5f407471c959fafec0d8477856570fc8862a606a237baa97e

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\MobiHelper.exe.config

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  4c77703bc70d087c272b1b4f8db55c4c

                                                  SHA1

                                                  3bbf0cc26c0b888aedefbfb077ca1e270d3c45c3

                                                  SHA256

                                                  dfddd98c2f704875c1b40cd1c81005faf10a442135c2c84b9ebef51f935d4b06

                                                  SHA512

                                                  bb0052a2c5904e503429017c506f03122c2f4b83d0609c1d40a153848d392303c1ec441338fcb18977e6f310f634abe0bd3ecbee03cd7e468795dd2cb75f8dc3

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\Newtonsoft.Json.dll

                                                  Filesize

                                                  464KB

                                                  MD5

                                                  83222120c8095b8623fe827fb70faf6b

                                                  SHA1

                                                  9294136b07c36fab5523ef345fe05f03ea516b15

                                                  SHA256

                                                  eff79de319ca8941a2e62fb573230d82b79b80958e5a26ab1a4e87193eb13503

                                                  SHA512

                                                  3077e4ea7ebfd4d25b60b9727fbab183827aad5ba914e8cd3d9557fa3913fd82efe2cd20b1a193d8c7e1b81ee44f04dadfcb8f18507977c78dd5c8b071f8addb

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\ResumeService.exe

                                                  Filesize

                                                  522KB

                                                  MD5

                                                  d293db543d714d4b6a959911f04982cc

                                                  SHA1

                                                  69c6d24cebec0d0f82b2006d9f9f9c3add831263

                                                  SHA256

                                                  dd31c28d11f79d4dd84c531b68fe52aa8f1076ef585bcf438d8976f8d3baf14d

                                                  SHA512

                                                  8abcf620c879092fcdc77b16877a9d7b50d9dd7b0e7a89187150bf03c1a7e05021cd30e30315d881ed5e819cb0d85050fdf294fa41bb8006c7cfe582fb68dc5c

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\ResumeService.exe.config

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  c0ecf23c7cf4e09c426ff35e83eb34b8

                                                  SHA1

                                                  6e42205b40fa610e3d3376cc21997745f448ced7

                                                  SHA256

                                                  61bcc5c65812305576bd37eb7237ac29f04f14cef3ab9b9e7e8f940d5522b393

                                                  SHA512

                                                  ce8ee53483211cc488df90f396fa33877866cdc862b343625c736cf676be37e95021e465d277aff503f01eee8e5883175ab6a74ba2317285e843f87285f9995d

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\ServiceStack.Client.dll

                                                  Filesize

                                                  241KB

                                                  MD5

                                                  e7eeaacea4bb7ca8625dbc72f9c05177

                                                  SHA1

                                                  6e540e594d4e7fe1c55f2f9e406d3c0f6d02af9d

                                                  SHA256

                                                  67f5c0fedec2ca57fc1b3118bd772b987c01b573584c08c4264fc8030f0944f3

                                                  SHA512

                                                  9b45ab2f9b865da7775405eb05b805073f37590573c50b70644c6e694f2e6effa5c9b0cb15ce30b184f8afa71a382bc4bb9096599ccce8b68e130131da502c2c

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\ServiceStack.Interfaces.dll

                                                  Filesize

                                                  169KB

                                                  MD5

                                                  bbaa88e5567a6b9c134f28262c54ca65

                                                  SHA1

                                                  5d59256abbc0226d4966cfa7f96511453736bb63

                                                  SHA256

                                                  2e2cf708db9d86b04c62a6273aa326225181fb739f6b950fbe2e1bd4905ecd0b

                                                  SHA512

                                                  eb714c554123a9405f1beb952e82f79b684995a4f567f3fb9bf934f51496eea0d325c791fddafc2105922ca51f93132db85ee8b555880ac04e0e039636c58779

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\ServiceStack.Text.dll

                                                  Filesize

                                                  540KB

                                                  MD5

                                                  01e10fdd82dff5e70eff077adc2a4528

                                                  SHA1

                                                  5bc845e65e732c4bbc246174eb18874140d26772

                                                  SHA256

                                                  57f75c075376c8977860c3bcb8d7d693289450a08b569159bf7ed1dc1824e1f1

                                                  SHA512

                                                  fe0f0e8c14d6a8318a1a4320e427375b309e2ab5f05286ecca7d7ce1c3047c75054cce2153233c07bf7a921d43fea3fc5093af928bb7b555de46dfa2adb55366

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\System.Memory.dll

                                                  Filesize

                                                  140KB

                                                  MD5

                                                  2bc5de386a4297144781d15b8e812b63

                                                  SHA1

                                                  ae6b19d49b413f1549b3540a9fbba00c1e8b3d27

                                                  SHA256

                                                  9c266080fb5f31e02a5005b91657093bd8c1faed23102e021a8be283c1753461

                                                  SHA512

                                                  e4d43c871af5c03392d2fb139fdf10c2f2da2f1d6fe0edd089e3e30369d6d350727b483c98868626f81d680400b44ee4d328e475b0017bfdeb38cdb44a8b4d4b

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\System.Runtime.CompilerServices.Unsafe.dll

                                                  Filesize

                                                  23KB

                                                  MD5

                                                  a5aa80f49ad64689085755ab1ebf086e

                                                  SHA1

                                                  27e88cf0d2b34ea91efaa5cef9a763ee2722c824

                                                  SHA256

                                                  a79e1c30e9308afe4d680f0bfb82de3e8c1fe94aeca453ec4092c3ed4789ae6b

                                                  SHA512

                                                  f3dbd77e3a2ec3915b34d1387388abad45c99459ce03c06dc9a83d04f751b837c7b56cf9b4b7630f7fcd897a1d8057fce4cf761b1dc140a3928431b22b9b5b82

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\WixSharp.Msi.dll

                                                  Filesize

                                                  31KB

                                                  MD5

                                                  346d813cb3b38030edbe2342b21ecb0d

                                                  SHA1

                                                  578cc0f818bb3c414e5b806fe628a100f2eed63c

                                                  SHA256

                                                  4a807bec1041e2a900688f17d338a06b952a1a8e76b61f681454302753ab79ee

                                                  SHA512

                                                  72d6117ba66f1939fcb1f1bd89fe3a7cc5d93ae67ba7ed9927746a388eec4885986915372d5ff92176615f6e73e9ddcdff5e8feb30d2b0c17f8aaaab1e4f744a

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\log4net-loggly.dll

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  647ef1d7ccf030a09f17a54c5f40bbed

                                                  SHA1

                                                  08a71074606354e53a5c25aa9b084dfe9bef551f

                                                  SHA256

                                                  dc7ba0dcf33d3599c6d471cedb604e141d24a9aff9964225b8de1dfbb8a285db

                                                  SHA512

                                                  16d7dfc6033114c247c252f5463ab874418b609811ef31dd82365482487c6a8dcb2260f9b288fa883d3ba70c8b8836bb9e38d5bc24303db71fdcac8778b769fe

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\log4net.dll

                                                  Filesize

                                                  280KB

                                                  MD5

                                                  7c11f28d40f846515c132c5e358913bb

                                                  SHA1

                                                  fe7d3cd47352835016ffe5be86185165c4a09f69

                                                  SHA256

                                                  8cdae744cb81a397c61f9311e1bd089206783b8b173d6e8216005b84662fda1e

                                                  SHA512

                                                  12acfc71df4e7d24fe0ac9de97d21dcd651480fd0c9e46035cd3a2f3fe1ee6833fc9679cda0b07ffa33bb6ff0a97b6d28f3fa161747990b18cea73c22bf124c8

                                                • C:\Users\Admin\AppData\Local\Temp\pcgame_EBFACB94\utils\sysinfo-app.exe

                                                  Filesize

                                                  234KB

                                                  MD5

                                                  2b30334153d41d8c762207309be73d92

                                                  SHA1

                                                  a54f5fa79252b1b9968f6e1a44fde7f007a12548

                                                  SHA256

                                                  9b4eee17b496a35e88b5f1631ba21c2bee262b3c6da0024c18e3d1b7996b3484

                                                  SHA512

                                                  cc9972e8f8952bef7364b00d269848a918c47bd4fb66cb0fbc97ea7c74dab467ca7fa694c79a3d07cff45869fe9bd6643a3291b4fd83c53c544320470ab78aeb

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\AlternateServices.bin

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  7ca66edcbc41fe60016be7b43471553e

                                                  SHA1

                                                  2708413d9aae5803cba7271a9d33dc21a900ab83

                                                  SHA256

                                                  7b421e73c9a08f9bc078fc9ff90323d7b1fda46004547bf5a030006841b25851

                                                  SHA512

                                                  124df3f0a79970a023094679d4cf28ff27c591cb7e230d407fac26aa882d54b815a8dbcb839329c318e2e7f4b25d7ffe0a122abfadaac926c75c914e8a3a8a5e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  21KB

                                                  MD5

                                                  d12df46123996ec75fe7851503886330

                                                  SHA1

                                                  be9c3365c8daab6d1de5847801d1fee5bea3ad55

                                                  SHA256

                                                  ba9bac9ed73be4124a40f13a16128285114b9d498bc23cbc354b257a6113068d

                                                  SHA512

                                                  7865119c4717177d7cd2afd7dc45c4fdbc4e61b5a76731beb5795037d35d47465233d7154f0cea873d8939ead8d364a25667fd124b459f2b4a2dfcefd9ceb538

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  22KB

                                                  MD5

                                                  891762590efbb24ea31833e563268f75

                                                  SHA1

                                                  8ffb437f1d164797f6a09243b1bdbef3f938da3d

                                                  SHA256

                                                  49269b2dcf4e96cf0b69c4c7f02e566a224f3bd815dcfa9834058495bda963b8

                                                  SHA512

                                                  77f3b16fd005470b4d47ed4ecc20ad30a16847db424868ac70349a5cc1a3d2296d593d7f21ba38d74554bf7f4e1007d16f13643dcd4f964eb705cf3f7591617a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\datareporting\glean\pending_pings\18c9f1d2-4367-4e48-b613-9c14b67f9796

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  6ea87ca603a6b2b4a691d9a67a93568d

                                                  SHA1

                                                  b0647909f606d9654714727965db09ea54d57018

                                                  SHA256

                                                  04ff57932409c9aece89246ededd80483a96bb5e5d5cb04197502a26edaf9e67

                                                  SHA512

                                                  02b481eb2e800e6df01b05b6dae531f8e446dae44566f9e390f8af9790bbc54a67cb0de2cd8f22e85a6d7c4feb73b36231589b0bba80b1fa11248de0a75de398

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\datareporting\glean\pending_pings\693969a8-5d55-48b5-b575-b447982e020b

                                                  Filesize

                                                  659B

                                                  MD5

                                                  bd1d841ac6a6fdaad47932d32668bd8c

                                                  SHA1

                                                  55f5f68d3314bc62046a3ebb95c41cd035c1a49a

                                                  SHA256

                                                  706c38b158ddf5c0a8a545ebdbb0ac02bbe958eb08008c70bbbc0e48d4f5cfbb

                                                  SHA512

                                                  180325a9e6faea0956c9facda684cba37cea3a5901c89db327964ca84bce201c10f4f8f1019090fefa7f1a0b2ad00d7c27cdb34b1948f647e8a1c220a5c8d9ef

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\datareporting\glean\pending_pings\d8e7e60e-9a2c-4219-90a0-87f11a33540d

                                                  Filesize

                                                  982B

                                                  MD5

                                                  aba24774552afbcce265c0cd443b9550

                                                  SHA1

                                                  f8e75a5c1ef2c692872db1bf2b26c2fb13a11e2d

                                                  SHA256

                                                  035edf7e50222c0e1c23f4e8721ec427b44d97e3c7bac2819bccaec0f01d9da8

                                                  SHA512

                                                  ddddb60d82b5b507e4b006bf295602fc52dc2b1add10794f84db20054ce8f3b52dcc2732e6e2f04484f35c723b9bac58054bca9010d4db275ccba6f726f1c191

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\prefs-1.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  be2c03e176cc6307c9ac059a6213a714

                                                  SHA1

                                                  4695f966616254b75de5edd2fec9b9dc24abfecd

                                                  SHA256

                                                  609ed696e0c922ee1075c25ab6578426addf7b08937c821539d40646c5b5c6a6

                                                  SHA512

                                                  4c5961095ac77d47da0fdf04397eb09ae7757de5363069f3e577803ce67593d3e718015ba40ee672e49da0ab9c9b3f57aae55c4976290e56e0f9c9a6091f284b

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\prefs-1.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  c52e68abb22cadcafaaa4899806eb9bb

                                                  SHA1

                                                  eff6f1253a3b117073b7922d5c2b751bd9b938ab

                                                  SHA256

                                                  63a143e2104e2f4fc301ce0a905ffe0c992ff1b6068b6394adec2c4611ccfe80

                                                  SHA512

                                                  13c21d1f24fc90b85c8bf04ef80b9aceeb335efb31f0eace4407376b869192fe56473f281eef377dc6645ebf3955797f5633532ee5453deb8e9c0ff7e1cb80f4

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\prefs.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  d06f468ee8ea6cb69f15c81718049236

                                                  SHA1

                                                  a8cea9471db0fb247a5e3096af59deec47533c07

                                                  SHA256

                                                  ec78313812d8837b094368f09441b7e50c158bb0f02be6186f481541c088a53d

                                                  SHA512

                                                  7c56d39fbe8f808f92c22321a7530515b8883f886006eea5b84db1d7db5609bc54d28cccbd44180e27ee7f4401ea331c713d85d51328c284dd30d52c86a9e57e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5utpapi8.default-release\prefs.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  45b4d4f7f6134d2583bdbed0cae04b01

                                                  SHA1

                                                  737517358e18dc8a822622c9fb30155a9b23fdeb

                                                  SHA256

                                                  292ae09aebd481682dd21a15c4bd89f3f264b8c28c8e82544f91e374c647060b

                                                  SHA512

                                                  68212d4ed5b471dc542dd4ec2c42036c9c7683143d49d79d5b76f6ce15057cbf7ecb07800ac9359c979fff3a3cafab915be8b64d132c390f6abcb7e91dba6ae8

                                                • C:\Users\Admin\Downloads\Gameslolinstaller.LpFcBhUg.exe.part

                                                  Filesize

                                                  3.3MB

                                                  MD5

                                                  e23d97827ea3c90cd85f2d11402e8940

                                                  SHA1

                                                  67c01979b3516f9c3082cc05367142a74e413be8

                                                  SHA256

                                                  16f7d9d609c24c5af75c0141059d49008eb9b1f016d198e224bdb486668cc7b5

                                                  SHA512

                                                  e9dfd9ebf77aa615b17c05f99a5efed0c5dc993b7ca59800aa7ffa45d0d7fe4e207d0e4386c4fd9b11ceb49b5a4d28b4014ab9d6327ed86a8321cd9f3e90f646

                                                • C:\Windows\Installer\MSI5DB6.tmp

                                                  Filesize

                                                  631KB

                                                  MD5

                                                  12ef5de02e17750d796ea176a6a285e8

                                                  SHA1

                                                  235c20773fd054e5469dad5e3d4ef7795a3f5657

                                                  SHA256

                                                  9f3fdd1a27c709eb028795ce2e41068709f37d100352331dbdd0d5a0bc2fead4

                                                  SHA512

                                                  bfecf915d934faf6abf09796b608136c0e0f52a1cdd0ae685145df5d21cd54da7369a275bc4ccccffef83e4d86258fd7dc09cc887c569f7a27c0fb4760f7a2cd

                                                • C:\Windows\Installer\MSI5EB1.tmp-\CustomAction.config

                                                  Filesize

                                                  980B

                                                  MD5

                                                  c9c40af1656f8531eaa647caceb1e436

                                                  SHA1

                                                  907837497508de13d5a7e60697fc9d050e327e19

                                                  SHA256

                                                  1a67f60962ca1cbf19873b62a8518efe8c701a09cd609af4c50ecc7f0b468bb8

                                                  SHA512

                                                  0f7033686befa3f4acf3ed355c1674eaa6e349fba97e906446c8a7000be6876f157bc015bf5d3011fbbdc2c771bcbaea97918b8d24c064cbbd302741cc70cbc7

                                                • C:\Windows\Installer\MSI5EB1.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                                  Filesize

                                                  172KB

                                                  MD5

                                                  4e04a4cb2cf220aecc23ea1884c74693

                                                  SHA1

                                                  a828c986d737f89ee1d9b50e63c540d48096957f

                                                  SHA256

                                                  cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a

                                                  SHA512

                                                  c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4

                                                • C:\Windows\Installer\MSI5EB1.tmp-\WixSharp.dll

                                                  Filesize

                                                  431KB

                                                  MD5

                                                  02551708742c3e7badee72532c9484b7

                                                  SHA1

                                                  d5aa394ee2883a0f4648698fb7d1f54039f3f73e

                                                  SHA256

                                                  0fc8edc2b0bf3b92ab50c08429b03f7612fe1fe2e1216a4d9266f11058e3e95f

                                                  SHA512

                                                  0cf5c87831e4d82bc09decaba0c99ae71044a59b97ab61345a1e5e940766227adf27e34593a8642d51ea5673a37e510e8ebf81ebdbb1bcb1777d48a738520e7c

                                                • C:\Windows\Installer\MSI600A.tmp

                                                  Filesize

                                                  662KB

                                                  MD5

                                                  c8b8460b401e15a7e24adccb73ce2733

                                                  SHA1

                                                  1d2543e3ec0a18f956fd3f9fd2295f06258dd862

                                                  SHA256

                                                  634e02af77d50ce1047fd71d654e90d9838627ec17ea821ed4e1048d7aeb34ee

                                                  SHA512

                                                  ff7666306e49297f8178d1f6b28af0da6d8d8553c12dd561e21f5f0cc14f1a3befab3cbfb031e9aae51dac517a437ffcef90304d82f551eb2a7e24a19076943c

                                                • C:\Windows\Installer\MSI600A.tmp-\VirtualBoxSetup.exe

                                                  Filesize

                                                  275KB

                                                  MD5

                                                  9d640e28c58b6e42ef7ccacc0f5a5480

                                                  SHA1

                                                  0f2e57ec93fe46607b70d282682aeaad86403185

                                                  SHA256

                                                  74ac0ebb26bf0a323427545b5a3a6e67b6bfcd0a1238daec816ced191b3ad0b2

                                                  SHA512

                                                  7097368b9a4cd143890353ff255f28861bbf0c178d249b06fe0decc492f99fff15cf3348bfbbfb1021247e7f926a53d05b0d0450829e000a5697e8f12d4bc217

                                                • C:\Windows\Installer\MSI600A.tmp-\WixSharp.UI.dll

                                                  Filesize

                                                  239KB

                                                  MD5

                                                  a8d11ee5c3dcc54d8082fd2c087c7977

                                                  SHA1

                                                  8191c9e82f4e6f67a427a5f3b7b1a3bcd67cb4ae

                                                  SHA256

                                                  c29d2aeb1de17211adb98a490051d83bfd05d10af66094ef7159d0917bad35cb

                                                  SHA512

                                                  6462a7d23e571b41791af130ae0d2a0e010e30705a66e96b716028a0fe08bc4c7669b78ec4e56aedce991872336b0da7bcf1845ca5a15e621fa91d4c05d9f9ab

                                                • C:\Windows\Installer\MSI71A0.tmp

                                                  Filesize

                                                  146KB

                                                  MD5

                                                  9d9a45f017d425179b7907410fd4d124

                                                  SHA1

                                                  d466dacd22e4daa5698ffc2a812a48b8fc680d71

                                                  SHA256

                                                  51f05b7aec5c1e565c36b33a456ce2e3500669399abd9ead2bd217d847805415

                                                  SHA512

                                                  f9336ebf658f24c235105b4845f1182e06fa6bca38d32a6b07774b6bddbb29cfb64cc174fdb25c2b00e4fdbf25fdf32df5229f156b5eb1f4d06a4f3b9938d1d2

                                                • C:\Windows\Installer\MSI722E.tmp

                                                  Filesize

                                                  118KB

                                                  MD5

                                                  ba3165ec14e657e6235d6d789e9e25ca

                                                  SHA1

                                                  f626fcc0e7e7f26a092da6a995f5936a45c4f71a

                                                  SHA256

                                                  bf93de4755822425f3fd3928b52d2a6e6c91ab069213aaaa95695ed3e17e72e9

                                                  SHA512

                                                  6d83dd60b1f8e8d93ddbda657b1c75f86c1f5f6eac899123f6ce498f5dd1a5abf05e29776144044c6a848e8fdd2b9a6a5367c4b249b879a310a260fb6b55b6da

                                                • C:\Windows\Installer\MSIB94F.tmp-\VirtualBoxSetup.pdb

                                                  Filesize

                                                  133KB

                                                  MD5

                                                  8d7036aa6edeab136f0bf2517486daf0

                                                  SHA1

                                                  25de74222ce8c807206ec96030981fa3b894d8da

                                                  SHA256

                                                  8e612e7e41241868a471b00f6958f17cbc737282b792c5c90b24e641a1f904b1

                                                  SHA512

                                                  d1250dff6896dbe4b2d805d722a1e0528085a8a297cd8b2edd70aeb0081a882dd863b1fb9800b5846d97026886e972bf1856946c9a846369a9f8a221b5be1f78

                                                • memory/1132-76-0x0000024425F30000-0x0000024425F5A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1132-77-0x0000024425F30000-0x0000024425F54000-memory.dmp

                                                  Filesize

                                                  144KB

                                                • memory/1132-72-0x00000244258E0000-0x0000024425902000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/2676-148-0x0000029B7CE50000-0x0000029B7CE76000-memory.dmp

                                                  Filesize

                                                  152KB

                                                • memory/2676-59-0x0000029B7CAF0000-0x0000029B7CB6A000-memory.dmp

                                                  Filesize

                                                  488KB

                                                • memory/2676-48-0x00007FFA49443000-0x00007FFA49445000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2676-49-0x0000029B612B0000-0x0000029B613B6000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/2676-51-0x0000029B7B7D0000-0x0000029B7B81A000-memory.dmp

                                                  Filesize

                                                  296KB

                                                • memory/2676-654-0x0000029B61830000-0x0000029B6183E000-memory.dmp

                                                  Filesize

                                                  56KB

                                                • memory/2676-608-0x0000029B7B140000-0x0000029B7B16E000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/2676-53-0x0000029B7CA60000-0x0000029B7CAEE000-memory.dmp

                                                  Filesize

                                                  568KB

                                                • memory/2676-54-0x00007FFA49440000-0x00007FFA49F01000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/2676-426-0x00007FFA49440000-0x00007FFA49F01000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/2676-56-0x0000029B617C0000-0x0000029B617CC000-memory.dmp

                                                  Filesize

                                                  48KB

                                                • memory/2676-365-0x00007FFA49443000-0x00007FFA49445000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2676-321-0x0000029B7F9B0000-0x0000029B7F9FA000-memory.dmp

                                                  Filesize

                                                  296KB

                                                • memory/2676-145-0x0000029B7CDB0000-0x0000029B7CDE0000-memory.dmp

                                                  Filesize

                                                  192KB

                                                • memory/2676-142-0x0000029B7CE00000-0x0000029B7CE42000-memory.dmp

                                                  Filesize

                                                  264KB

                                                • memory/2676-214-0x0000029B7D0D0000-0x0000029B7D0D8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/2676-209-0x0000029B7CA40000-0x0000029B7CA4A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/2676-211-0x0000029B7CA50000-0x0000029B7CA58000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/2676-213-0x0000029B7CDE0000-0x0000029B7CDE8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/2676-212-0x0000029B7CDF0000-0x0000029B7CDF8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/2676-3120-0x00007FFA49440000-0x00007FFA49F01000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/2728-720-0x0000012CD1410000-0x0000012CD145C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/2728-722-0x0000012CE99A0000-0x0000012CE99E2000-memory.dmp

                                                  Filesize

                                                  264KB

                                                • memory/3632-691-0x000002A733DE0000-0x000002A733E0E000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/3632-693-0x000002A74DC80000-0x000002A74DCF2000-memory.dmp

                                                  Filesize

                                                  456KB

                                                • memory/3832-2292-0x000001DEBAA50000-0x000001DEBAA8C000-memory.dmp

                                                  Filesize

                                                  240KB

                                                • memory/3832-2278-0x000001DED32E0000-0x000001DED3376000-memory.dmp

                                                  Filesize

                                                  600KB

                                                • memory/3832-2277-0x000001DEB8DC0000-0x000001DEB8DCA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/3832-2291-0x000001DEBA9D0000-0x000001DEBA9E2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/4184-430-0x000001E0F0400000-0x000001E0F05C2000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/4184-432-0x000001E0F0B00000-0x000001E0F1028000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/4184-389-0x000001E0EC800000-0x000001E0EC896000-memory.dmp

                                                  Filesize

                                                  600KB

                                                • memory/5076-3687-0x0000015C3EB80000-0x0000015C3ECCE000-memory.dmp

                                                  Filesize

                                                  1.3MB

                                                • memory/5444-3635-0x000001AC99CC0000-0x000001AC99E0E000-memory.dmp

                                                  Filesize

                                                  1.3MB