Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe
Resource
win10v2004-20240802-en
General
-
Target
Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe
-
Size
3.3MB
-
MD5
e23d97827ea3c90cd85f2d11402e8940
-
SHA1
67c01979b3516f9c3082cc05367142a74e413be8
-
SHA256
16f7d9d609c24c5af75c0141059d49008eb9b1f016d198e224bdb486668cc7b5
-
SHA512
e9dfd9ebf77aa615b17c05f99a5efed0c5dc993b7ca59800aa7ffa45d0d7fe4e207d0e4386c4fd9b11ceb49b5a4d28b4014ab9d6327ed86a8321cd9f3e90f646
-
SSDEEP
98304:EyasyD6Lvd557Vh2EKTlpFGuKIKRv6owpuC:XyOT57V7jFiowgC
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Locale = "*" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Version = "11,1081,19041,0" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\IsInstalled = "1" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Version = "11,1081,19041,0" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\IsInstalled = "1" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Locale = "*" ie4uinit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 3 IoCs
pid Process 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 2476 sysinfo-app.exe 4988 MobiHelper.exe -
Loads dropped DLL 14 IoCs
pid Process 2336 MsiExec.exe 4748 rundll32.exe 2336 MsiExec.exe 3492 rundll32.exe 2336 MsiExec.exe 3532 rundll32.exe 2336 MsiExec.exe 1664 MsiExec.exe 1664 MsiExec.exe 2336 MsiExec.exe 4796 MsiExec.exe 848 rundll32.exe 4796 MsiExec.exe 3000 rundll32.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\Z: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\I: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\T: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\U: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\V: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\P: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\L: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\Y: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\K: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\R: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\N: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe File opened (read-only) \??\H: Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\MobiGame\playstore\api-ms-win-core-synch-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-crt-heap-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-crt-process-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\chrome_elf.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\clrjit.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-handle-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\build.cfg msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-sysinfo-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-crt-filesystem-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-interlocked-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\Chromely.pdb msiexec.exe File created C:\Program Files\MobiGame\player\lib64\vulkan\shaders\Astc_1DArray.spv msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-namedpipe-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\API-MS-Win-core-xstate-l2-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\appsettings.json msiexec.exe File created C:\Program Files\MobiGame\playstore\dist\static\media\bg.8b1130b2eac075640c70.jpg msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-libraryloader-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-sysinfo-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-crt-string-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\dist\asset-manifest.json msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-console-l1-2-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-localization-l1-2-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-crt-locale-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-console-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-debug-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-console-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-libraryloader-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\clretwrc.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-file-l1-2-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-util-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-crt-math-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\lib64\vulkan\shaders\Astc_3D.spv msiexec.exe File created C:\Program Files\MobiGame\playstore\clrcompression.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-datetime-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-memory-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-profile-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-synch-l1-2-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-crt-filesystem-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-crt-runtime-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-errorhandling-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-processenvironment-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-timezone-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-crt-conio-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-crt-time-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\locales\ar.pak msiexec.exe File created C:\Program Files\MobiGame\utils\artifacts_reporter.exe msiexec.exe File created C:\Program Files\MobiGame\playstore\chrome_200_percent.pak msiexec.exe File created C:\Program Files\MobiGame\aeg_launcher.exe msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-rtlsupport-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-file-l2-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-crt-heap-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-crt-math-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-namedpipe-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-synch-l1-2-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\locales\bg.pak msiexec.exe File created C:\Program Files\MobiGame\playstore\Chromely.Core.pdb msiexec.exe File created C:\Program Files\MobiGame\playstore\chromely.ico msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-debug-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-timezone-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-crt-conio-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\comregister.cmd msiexec.exe File created C:\Program Files\MobiGame\playstore\api-ms-win-core-interlocked-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-processthreads-l1-1-0.dll msiexec.exe File created C:\Program Files\MobiGame\player\api-ms-win-core-profile-l1-1-0.dll msiexec.exe -
Drops file in Windows directory 44 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIADFA.tmp-\WixSharp.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIAFD0.tmp-\VirtualBoxSetup.exe rundll32.exe File opened for modification C:\Windows\Installer\MSICC57.tmp-\WixSharp.dll rundll32.exe File opened for modification C:\Windows\Installer\MSICD61.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSICC57.tmp-\VirtualBoxSetup.exe rundll32.exe File opened for modification C:\Windows\Installer\MSICC57.tmp-\WixSharp.UI.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIAFD0.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIAC82.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIADFA.tmp-\VirtualBoxSetup.exe rundll32.exe File opened for modification C:\Windows\Installer\MSIC8BC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAC82.tmp-\WixSharp.UI.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIAC82.tmp-\WixSharp.dll rundll32.exe File opened for modification C:\Windows\Installer\MSICD61.tmp-\VirtualBoxSetup.exe rundll32.exe File opened for modification C:\Windows\Installer\e599ef5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIAC82.tmp-\VirtualBoxSetup.exe rundll32.exe File opened for modification C:\Windows\Installer\MSIAFD0.tmp-\WixSharp.UI.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIAFD0.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSICC57.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSICD61.tmp-\VirtualBoxSetup.pdb rundll32.exe File opened for modification C:\Windows\Installer\MSICD61.tmp-\WixSharp.UI.dll rundll32.exe File created C:\Windows\Installer\e599ef5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIADFA.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIADFA.tmp-\WixSharp.UI.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIAFD0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICC57.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSICC57.tmp-\VirtualBoxSetup.pdb rundll32.exe File opened for modification C:\Windows\Installer\MSICD61.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSICD61.tmp-\WixSharp.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIAC82.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIADFA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIADFA.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIAFD0.tmp-\VirtualBoxSetup.pdb rundll32.exe File created C:\Windows\Installer\SourceHash{0CD5AE2D-BB58-4E35-8B5C-AFE9A9189E1A} msiexec.exe File opened for modification C:\Windows\Installer\MSIC270.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC87C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICC57.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAC82.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIC04C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC2AF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICD61.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIAFD0.tmp-\WixSharp.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Capabilities ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\OperationalData = "12" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Capabilities ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities\Hidden = "0" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities\Hidden = "0" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation\CVListTTL = "0" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation\CVListTTL = "0" ie4uinit.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\ = "htmlfile" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell ie4uinit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\ddeexec\Application ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shellex\IconHandler ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.svg\ = "svgfile" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xhtml\Content Type = "application/xhtml+xml" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\ = "opennew" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\opennew ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shellex\IconHandler ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mailto ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\ = "URL:HyperText Transfer Protocol" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\printto\command ie4uinit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\ddeexec ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\open ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shellex\ContextMenuHandlers\{90AA3A4E-1CBA-4233-B8BB-535773D48449} ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\DelegateExecute = "{17FE9752-0B5A-4665-84CD-569794602F5C}" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\open ie4uinit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\DefaultIcon ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\OpenWithProgIds\IE.AssocFile.HTM ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xht\Content Type = "application/xhtml+xml" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\ShellEx\PropertySheetHandlers\{FBF23B40-E3F0-101B-8488-00AA003E56F8} ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\open\ = "Open in S&ame Window" ie4uinit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\open\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\ = "mhtmlfile" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithProgIds ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mailto\URL Protocol ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\URL Protocol ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\CommandId = "IE.Protocol" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\print\command ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\print\command\ = "\"C:\\Windows\\system32\\rundll32.exe\" \"C:\\Windows\\system32\\mshtml.dll\",PrintHTML \"%1\"" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shell\open ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.URL\OpenWithProgIds\InternetShortcut ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mailto\shell\open ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\Shell\Open\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32 ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\opennew\command\DelegateExecute = "{17FE9752-0B5A-4665-84CD-569794602F5C}" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.website\ = "Microsoft.Website" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.html ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\opennew ie4uinit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\opennew\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\opennew\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\Content Type = "message/rfc822" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shellex ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\FriendlyTypeName = "@C:\\Windows\\system32\\ieframe.dll,-912" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\open\MUIVerb = "@C:\\Windows\\system32\\ieframe.dll,-5732" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\iexplore.exe\shell\open ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shell\open\command ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\open\MUIVerb = "@C:\\Windows\\system32\\ieframe.dll,-5732" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shellex ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mailto\shell\open\command ie4uinit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\DefaultIcon ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\DefaultIcon ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xhtml\Content Type = "application/xhtml+xml" ie4uinit.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 1900000001000000100000005d1b8ff2c30f63f5b536edd400f7f9b40300000001000000140000004efc31460c619ecae59c1bce2c008036d94c84b809000000010000000c000000300a06082b060105050703031d00000001000000100000005467b0adde8d858e30ee517b1a19ecd91400000001000000140000001f00bf46800afc7839b7a5b443d95650bbce963b53000000010000001f000000301d301b060567810c010330123010060a2b0601040182373c0101030200c06200000001000000200000007b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df860b000000010000004200000047006c006f00620061006c005300690067006e00200043006f006400650020005300690067006e0069006e006700200052006f006f007400200052003400350000000f0000000100000030000000c130bba37b8b350e89fd5ed76b4f78777feee220d3b9e729042bef6af46e8e4c1b252e32b3080c681bc9a8a1afdd0a3c200000000100000076050000308205723082035aa00302010202107653feac75464893f5e5d74a483a4ef8300d06092a864886f70d01010c05003053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f7420523435301e170d3230303331383030303030305a170d3435303331383030303030305a3053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f742052343530820222300d06092a864886f70d01010105000382020f003082020a0282020100b62dc530dd7ae8ab903d0372b03a4b991661b2e5ffa5671d371ce57eec9383aa84f5a3439b98458ab863575d9b00880425e9f868924b82d84bc94a03f3a87f6a8f8a6127bda144d0fdf53f22c2a34f918db305b22882915dfb5988050b9706c298f82ca73324ee503a41ccf0a0b07b1d4dd2a8583896e9dff91b91bb8b102cd2c7431da20974a180af7be6330a0c596b8ebcf4ab5a977b7fae55fb84f080fe844cd7e2babdc475a16fbd61107444b29807e274abff68dc6c263ee91fe5e00487ad30d30c8d037c55b816705c24782025eb676788abba4e34986b7011de38cad4bea1c09ce1df1e0201d83be1674384b6cffc74b72f84a3bfba09373d676cb1455c1961ab4183f5ac1deb770d464773cebfbd9595ed9d2b8810fefa58e8a757e1b3cfa85ae907259b12c49e80723d93dc8c94df3b44e62680fcd2c303f08c0cd245d62ee78f989ee604ee426e677e42167162e704f960c664a1b69c81214e2bc66d689486c699747367317a91f2d48c796e7ca6bb7e466f4dc585122bcf9a224408a88537ce07615706171224c0c43173a1983557477e103a45d92da4519098a9a00737c4651aaa1c6b1677f7a797ec3f1930996f31fbea40b2e7d2c4fac9d0f050767459fa8d6d1732bef8e97e03f4e787759ad44a912c850313022b4280f2896a36cfc84ca0ce9ef8cb8dad16a7d3ded59b18a7c6923af18263f12e0e2464df0203010001a3423040300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604141f00bf46800afc7839b7a5b443d95650bbce963b300d06092a864886f70d01010c050003820201005e2bba749734445f764828408493ee016ee9a1b3d68025e67be4bc09913d0ffc76add7d43020bb8f60d091d61cf29cef781a2b943202c12496525202d0f3d1fcf29b396e99e11f8e43417d9a1e5bc95d9a84fc26e687f3747226ada41bd93d3b6a52a03c091e2f1e7bb333b445c7f7acb1af9360ad76aeb8b21578eb836aebffdb46ab24e5ee02fa901f59c02f5dd6b75da45c10b77253f8414eccfa781a254acafe85624361c3b437aa81d2f4d63a0fbd8d597e3047de2b6be72150335fd4679bd4b8679f3c279903ff85438e7312ca20cde861d5b166dc17d6396d0fdbcf2337a182894e1c6b3fd6a0cdaa079d3e4226aad70ceefa47bf1a527ed17581d3c98a62176d4f88a021a0263eaf6dd962301fe99828ae6e8dd58e4c726693808d2ae355c760679042565c22510fb3dc4e39ee4dddd91d7810543b6ed0976f03b51eb22373c612b29a64d0fc958524a8ffdfa1b0dc9140aedf0933abb9dd92b7f1cc91743b69eb67971b90bfe7c7a06f71bb57bfb78f5aed7a406a16cd80842d2fe102d4249443b315fc0c2b1bfd716ffccbbc75173a5e83d2c9b32f1bd59c8d7f54fe7e7ee456a387a79de1595294418f6d5bbe86959aff1a76dd40d2514a70b41f336323773fec271e59e40887ed34824a0f3ffea01dc1f56773458678f4aa29e92787c619dbc61314c33949874da097e06513f59d7756e9dab358c73af2c0cd82 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 692 powershell.exe 692 powershell.exe 5116 powershell.exe 5116 powershell.exe 464 powershell.exe 464 powershell.exe 4256 powershell.exe 4256 powershell.exe 2092 powershell.exe 2092 powershell.exe 1048 powershell.exe 1048 powershell.exe 1048 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 4812 powershell.exe 4812 powershell.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 3492 rundll32.exe 1836 msiexec.exe 1836 msiexec.exe 848 rundll32.exe 848 rundll32.exe 848 rundll32.exe 848 rundll32.exe 848 rundll32.exe 848 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe Token: SeDebugPrivilege 692 powershell.exe Token: SeIncreaseQuotaPrivilege 692 powershell.exe Token: SeSecurityPrivilege 692 powershell.exe Token: SeTakeOwnershipPrivilege 692 powershell.exe Token: SeLoadDriverPrivilege 692 powershell.exe Token: SeSystemProfilePrivilege 692 powershell.exe Token: SeSystemtimePrivilege 692 powershell.exe Token: SeProfSingleProcessPrivilege 692 powershell.exe Token: SeIncBasePriorityPrivilege 692 powershell.exe Token: SeCreatePagefilePrivilege 692 powershell.exe Token: SeBackupPrivilege 692 powershell.exe Token: SeRestorePrivilege 692 powershell.exe Token: SeShutdownPrivilege 692 powershell.exe Token: SeDebugPrivilege 692 powershell.exe Token: SeSystemEnvironmentPrivilege 692 powershell.exe Token: SeRemoteShutdownPrivilege 692 powershell.exe Token: SeUndockPrivilege 692 powershell.exe Token: SeManageVolumePrivilege 692 powershell.exe Token: 33 692 powershell.exe Token: 34 692 powershell.exe Token: 35 692 powershell.exe Token: 36 692 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeIncreaseQuotaPrivilege 5116 powershell.exe Token: SeSecurityPrivilege 5116 powershell.exe Token: SeTakeOwnershipPrivilege 5116 powershell.exe Token: SeLoadDriverPrivilege 5116 powershell.exe Token: SeSystemProfilePrivilege 5116 powershell.exe Token: SeSystemtimePrivilege 5116 powershell.exe Token: SeProfSingleProcessPrivilege 5116 powershell.exe Token: SeIncBasePriorityPrivilege 5116 powershell.exe Token: SeCreatePagefilePrivilege 5116 powershell.exe Token: SeBackupPrivilege 5116 powershell.exe Token: SeRestorePrivilege 5116 powershell.exe Token: SeShutdownPrivilege 5116 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeSystemEnvironmentPrivilege 5116 powershell.exe Token: SeRemoteShutdownPrivilege 5116 powershell.exe Token: SeUndockPrivilege 5116 powershell.exe Token: SeManageVolumePrivilege 5116 powershell.exe Token: 33 5116 powershell.exe Token: 34 5116 powershell.exe Token: 35 5116 powershell.exe Token: 36 5116 powershell.exe Token: SeDebugPrivilege 464 powershell.exe Token: SeIncreaseQuotaPrivilege 464 powershell.exe Token: SeSecurityPrivilege 464 powershell.exe Token: SeTakeOwnershipPrivilege 464 powershell.exe Token: SeLoadDriverPrivilege 464 powershell.exe Token: SeSystemProfilePrivilege 464 powershell.exe Token: SeSystemtimePrivilege 464 powershell.exe Token: SeProfSingleProcessPrivilege 464 powershell.exe Token: SeIncBasePriorityPrivilege 464 powershell.exe Token: SeCreatePagefilePrivilege 464 powershell.exe Token: SeBackupPrivilege 464 powershell.exe Token: SeRestorePrivilege 464 powershell.exe Token: SeShutdownPrivilege 464 powershell.exe Token: SeDebugPrivilege 464 powershell.exe Token: SeSystemEnvironmentPrivilege 464 powershell.exe Token: SeRemoteShutdownPrivilege 464 powershell.exe Token: SeUndockPrivilege 464 powershell.exe Token: SeManageVolumePrivilege 464 powershell.exe Token: 33 464 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2476 sysinfo-app.exe 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4364 2012 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 82 PID 2012 wrote to memory of 4364 2012 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 82 PID 4364 wrote to memory of 692 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 84 PID 4364 wrote to memory of 692 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 84 PID 4364 wrote to memory of 5116 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 87 PID 4364 wrote to memory of 5116 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 87 PID 4364 wrote to memory of 464 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 89 PID 4364 wrote to memory of 464 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 89 PID 4364 wrote to memory of 3432 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 91 PID 4364 wrote to memory of 3432 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 91 PID 3432 wrote to memory of 2476 3432 cmd.exe 93 PID 3432 wrote to memory of 2476 3432 cmd.exe 93 PID 4364 wrote to memory of 4256 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 98 PID 4364 wrote to memory of 4256 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 98 PID 4364 wrote to memory of 2092 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 100 PID 4364 wrote to memory of 2092 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 100 PID 4364 wrote to memory of 1048 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 108 PID 4364 wrote to memory of 1048 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 108 PID 4364 wrote to memory of 4608 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 111 PID 4364 wrote to memory of 4608 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 111 PID 4364 wrote to memory of 4988 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 113 PID 4364 wrote to memory of 4988 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 113 PID 4988 wrote to memory of 3788 4988 MobiHelper.exe 115 PID 4988 wrote to memory of 3788 4988 MobiHelper.exe 115 PID 4364 wrote to memory of 628 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 116 PID 4364 wrote to memory of 628 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 116 PID 4364 wrote to memory of 4812 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 119 PID 4364 wrote to memory of 4812 4364 Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe 119 PID 1836 wrote to memory of 2336 1836 msiexec.exe 122 PID 1836 wrote to memory of 2336 1836 msiexec.exe 122 PID 2336 wrote to memory of 4748 2336 MsiExec.exe 123 PID 2336 wrote to memory of 4748 2336 MsiExec.exe 123 PID 2336 wrote to memory of 3492 2336 MsiExec.exe 124 PID 2336 wrote to memory of 3492 2336 MsiExec.exe 124 PID 3492 wrote to memory of 3248 3492 rundll32.exe 125 PID 3492 wrote to memory of 3248 3492 rundll32.exe 125 PID 2336 wrote to memory of 3532 2336 MsiExec.exe 127 PID 2336 wrote to memory of 3532 2336 MsiExec.exe 127 PID 1836 wrote to memory of 1664 1836 msiexec.exe 128 PID 1836 wrote to memory of 1664 1836 msiexec.exe 128 PID 1836 wrote to memory of 1664 1836 msiexec.exe 128 PID 1836 wrote to memory of 4796 1836 msiexec.exe 129 PID 1836 wrote to memory of 4796 1836 msiexec.exe 129 PID 4796 wrote to memory of 848 4796 MsiExec.exe 130 PID 4796 wrote to memory of 848 4796 MsiExec.exe 130 PID 4796 wrote to memory of 3000 4796 MsiExec.exe 131 PID 4796 wrote to memory of 3000 4796 MsiExec.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe"C:\Users\Admin\AppData\Local\Temp\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe"C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe" /app "C:\Users\Admin\AppData\Local\MobiGame\\"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\utils\sysinfo-app.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\utils\sysinfo-app.exeC:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\utils\sysinfo-app.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" (Get-CimInstance Win32_OptionalFeature | Where-Object {('HypervisorPlatform','VirtualMachinePlatform','Microsoft-Hyper-V-All','Microsoft-Hyper-V-Hypervisor','Microsoft-Hyper-V-Services') -like $_.Name}).InstallState3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\MobiHelper.exe"MobiHelper.exe" --install-path="C:\Program Files\MobiGame" --desktop-path="C:\Users\Admin\Desktop" --local-app-data-path="C:\Users\Admin\AppData\Local\MobiGame" --parent="C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe" --playstore-json-file-path="C:\Users\Admin\AppData\Local\MobiGame\playstore.json" --google-analytics-id="28312628" --create-playstore-shortcut --api-url="https://gamestore30.emu.codes" --source="gameslolc"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\system32\ie4uinit.exe"C:\Windows\system32\ie4uinit.exe" -show4⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies Internet Explorer settings
- Modifies registry class
PID:3788
-
-
-
C:\Windows\system32\ie4uinit.exe"C:\Windows\system32\ie4uinit.exe" -show3⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies Internet Explorer settings
- Modifies registry class
PID:628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2796
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 7DD8018E9631A7BFB1B9981BF9C7D5E32⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSIAC82.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240757968 2 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4748
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSIADFA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240758312 11 WixSharp!WixSharp.ManagedProjectActions.WixSharp_Load_Action3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\system32\cmd.exe"cmd.exe" /c set4⤵PID:3248
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSIAFD0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240758812 32 VirtualBoxSetup!VirtualBoxSetup.CustomActions.SetSessionPropertiesFromConfig3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3532
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7E2AB24576BE954FC74EC3E958B053252⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 448135C84C998D6ACB30425E1FB90B78 E Global\MSI00002⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSICC57.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240766046 83 VirtualBoxSetup!VirtualBoxSetup.CustomActions.CloseProcessesAndUsedFiles3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSICD61.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240766312 90 VirtualBoxSetup!VirtualBoxSetup.CustomActions.DeletePlayStoreAutorun3⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_53A1B1F8A70C6C11B81DE7FBA9338D4F
Filesize1KB
MD50a1c00e7c281dfb825b82c8ef5f6630b
SHA187cc9f15333160e2694d3dde091ab6b3b46474f3
SHA2565a5575c2ffca40825dddedf4f29b0c515ef359b76316be42780db71821e9e1d5
SHA512707b726379f6883dbe00a60bffa5b52ee8ca84005703ea365d43b2c60d2683fc18e10f88d7a8b2e3d84863535e5d75b59b73aad5682cabe8ccc56428df4abd1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize1KB
MD514f6a1453b20f2af5174396127d44454
SHA16ae30f2916869897fc64c21848507a8e4055137a
SHA2563880705ad811ca4e689696945f7a961c36a3ec17456b9488e93170653a609f29
SHA512fb3b90655775ee9493205be48925306d568a306474aa9f5d20285236d6f5792faa98623a7b54bb6f1ee024e361e73ffda68ce6ae4af26c42f0c01edb001cf5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_53A1B1F8A70C6C11B81DE7FBA9338D4F
Filesize536B
MD5fa1452417fc82d20c3c3d7739504caad
SHA17a2bc11c56c8f0f08670e31c41b6ecf302a64b94
SHA2562bcac126fa97dfa9c59450c4c401be8fcfe0bb56801f1d759ecf6369e9183b7d
SHA512269da390f16361dc04c46d947f80358be839e8c69db3201e7587311a1f8b634cc304460eade7df0a9d288ab81c1cd9d25d231f91c0beed05eb400f74a752a575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize536B
MD5363583aab843b9b63e19a89e92880fca
SHA1ff978a55f1d52df1e145cbc9fd6836acb65b1a8d
SHA256e349a318d37fe3ab0ef78eae7bd6238b2191103b8d73bef7a934ecc44773cb1b
SHA5128100bbf628efc995eff27d0e863ab8d41d7cca54c206549f29780f7634a5d3d69f637138c5d81d95a67e1984cae8adee943ec1781f651760fc223d741803c9eb
-
Filesize
3KB
MD53bfc414667e1ebc31e9259fa1db290fa
SHA19bff989429779efef334e5524a362e7b6ff266cb
SHA256b58f994c644f7b4a831e889630bfd7ca0860aeb1e0920dc0f5d4928585a9dbab
SHA512e6cb000e8f900132f7dc661f943b8e91e945d171157ff3289b91e9d79f70230e363ed65b7ec97f451b376cf4706a14de9a86193e72dcea8fe3aa8c86c6117d13
-
Filesize
651B
MD500bfeb783aeff425ce898d55718d506d
SHA1aac7a973dc1f9ca7abc529c7ea37ad7eaf491b8f
SHA256d06099ef43eb002055378b1b6d9853f9b1f891ada476932ba575d1f97065a580
SHA5122209d5f4999cb36ebf26c6b8cb3195cc9fc0f0a103f4a28dd77b04605d7c6e79d47d806454c63b8d42bbe32864be7cdb56df3cccf71a6c27fe0b331d8304e1ff
-
Filesize
952B
MD520bfd92545250c3f6719176834866d86
SHA13a327e6806b8b2e7e20723b3bb49c43f76b51fc6
SHA25679433103e8ed8f0d737ad926195c24080ca65841234508db03f7b616322010c9
SHA51211926914fa2ecf1b28e38fbe7949ba488a531643fdde9ed48e4f4c271965e32bc5b7fa02e1029a9c71bd5282027bf87fae94af467de5dea72b4cb2e1b91f0f33
-
Filesize
1KB
MD5d0510e53e1744f2e398026ea8ef3717e
SHA13dd36ee33b5fcd15ac92bfc9380cb5901add5827
SHA256c4b4f6ecac0f8337b39ee9c82e6d125a9e19697bb75bd7f7aefd147df1e58392
SHA5121c16d12820511ef19e4aceb29ba90fff43885ba671baeac479b426b58104a6301e70b5c951d06a4fb9e1d7f0821ab9042b73f56619b836228a34d342ec2a5b16
-
Filesize
1KB
MD56ac6c8637ec8b38210eb2b246a2494f9
SHA1d756b88360ee7391aec76489c601392a5b84673b
SHA2563d20c06f31d3f77fac462e06b4bbb88803a64ccf380624b31cf08da483db1d4f
SHA512ae684a20a714bdb0bd4f5fa72491fe4191acf42c3f80934da46fc1909fae73e732bff573c21a2ceff50eba5750852cc45bd9dab4c7a9f7017df5e9a7123a3ffb
-
Filesize
1KB
MD57278fa708769a543014267e4613f927c
SHA1d18017fe0dcb3ef814e69cc1ce20857ee25dd3b7
SHA2564617aca60de6e4127de1fdca73f36a60703822c2ea38a9f521377d4f49394edd
SHA512147ca121aa72f2a11f3ae22667ee433ac095be3e7d0ad71aa9a1f5fee1838e361f359b58854908a9d942de7162f7c136d51f6a5c9b6b9a1bdd94586ffe921cc6
-
Filesize
1KB
MD56569c189091a8d908dd3580a0d9f050b
SHA143d092357454a91dfc724aecf97153f156df6673
SHA256795fc2c0473ecc84ae5609ae3736bbce18eb914ae402ce1ae95004773030dafc
SHA512406014043ce8d05fb45fd5329f0ddeeb67f18e9758681f7d09931e1e53dc1594f199ef4ae4c830b7c3d3b630547bd13ede6dab6b8c30c0e9bdeadae3dc132ded
-
Filesize
1KB
MD5371e7ee6c059cbe909fb920a5fbdc79b
SHA1748b6dd17f5fe32b309ff9910e84c77a3f6a8092
SHA25631bd5a28190599cf85382a7a9a438e8cf8dd7897181d9fd270827ea4fb4545ba
SHA512036e660355198776e712c6159c378abb32a2b8fb7335c43bbd80124affc35caa6caabec6f83c9cb7901983efcbf2d658aa68526e62c67ec7eb1460d87ef97f9c
-
Filesize
1KB
MD54a1ecdb31d7a3d9699351208166883cb
SHA1b62a03b1a9e94f731427b5e19bd57bbc4a53e742
SHA2566fa9e2383011bb63b475b42dbc83c1e1db57135ac2590bec0a9003e7f036eeb7
SHA512ec94fd098e3c3674eb2fd6704414d179f1ac118c566f0b57be40050f3688e5b60bd6fd528631e827058b49f25d74d1f6f939a9c4c1ad9e0256534a83d8b491b6
-
Filesize
1KB
MD53f81481f0251165ee8051799d5487156
SHA1dadc07e6eff95dd6fde0f3fb3eca0a4aa1941434
SHA256020c968aedf44573c2dc9945010abb1109638dffdd9a627c503321068b79d845
SHA512c93f39f6f41ad4256c1c6e6fb5afd4a44477372c8459d369ef962b42ddcfb3b7c84ac8b93f128fac8e9e8405c84c62c8891ca05ce97a84a0e6a411fe50371efe
-
Filesize
32B
MD55c2650fea370180dadfe31b172cb6227
SHA1167c2751d8da962e111faf5ce85231afb5c582a2
SHA2561a2e3a49ee458a58eec35c79bfe0412c6de88daf5e020aa31dc5e1608b32a2e7
SHA51237301d65b9e0d227d824d24a2e2f4013b50492a8365a1ff1d89344efb0fec08556ebef76d28691b2b4bbe0f2cd5f42c0b7ff1414a9ae202ce125810d9e979883
-
Filesize
32B
MD57a19d70c01b154764b7d803a577dcfa9
SHA10532d5c745eab6fe2912dcf7fcc3f0b8ecde0250
SHA2566204ec80e86780c15c10fcb880ee08ffa9bca3e43958d2bf71169b1cf1f1298c
SHA512a37e603e5f5fe6fc2db82e412752f2619c0c89f144fc1745fd4e4a2a964c7af0e8ad6ab90515b2ebd19e1e391cea297b796e6f810ed843fb517ee3be1c907b71
-
Filesize
4KB
MD5f94b64b0734d0834fb188baff7601ad2
SHA1649e718e2982cd0ccc16f785fd6f405f30226f7e
SHA25603e957899c7237302dc9beb982c25bfaea6ce7cda0d7c47de7123ebecf1120c8
SHA5123006a39836ee60abe303d7b135540ed41138c3200b56a914d9abdc3029e38b1c61e8be96d07924c741fe9f7f2a91338a94f1c48d45f0c7506afb841bf1aaaa4b
-
Filesize
1KB
MD508b2aa05da856b40c718d96f8725b8c3
SHA1f3d3c13f419b2f0dcfd95eb0def830028ef7dbe1
SHA256cbb238c4963c4663a2cad9c801201909999050df6cf0964da60fe4e5c39cf32f
SHA51277f532ee7a678a9f32dabe4f6a937b3db9284f64a464784c49d94c2a072a75d1377e58387ad546bc8f7a06950ee56a60acee2e19a8498bd3a8caf3583592a1dc
-
Filesize
2KB
MD53f7c2cd0a1a3cc30b4bd49e815ad450d
SHA13d16b276459c8bd67ae93daabefec6c567ad9826
SHA25672146e618b60e84e84b76c45698a1062ea6e3997ee0d4958c4844cf13bdf22a1
SHA5122d7e351017c160cf617415aa4805cd0b91b62eeeb8462e8134472c3a8c01a56c98ba76ea4216908dbe237376b7d091c4f14ecb262879d72f5fbff21f9e9b56e9
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
537B
MD55feca042545b8c85fc30c3cdb6f36b9b
SHA153555b4f48d4945b41bf887f3ad7825159654c77
SHA256e02252206a390428ec0a5ddfdb2ec048593cfb0ed967f4885e54c22224650caf
SHA5125d734ab9bc5ca72014886715c49739ce42a5ae462ab5a752ce1aa3d7031cc511053459d4d762f8955aafa05c42c1ea5eb688e59aaaf978c3335de7ef00e11c65
-
Filesize
5KB
MD5e09ca833ccd4a626fd1da2543d5bef68
SHA17ae21f74c8b8bf564123d7e61ae11c63c5bc4e01
SHA2561db566b34afa6dbab3e076f43553e0e04fdbc566542bb7fc52f5342358286991
SHA5127ed39b694798759fcb6948c277261a4f84937ac439a0743cd6ee107f2377e3cf30d7400ee36fd6520531af5f1d516f5be1616116a4bcd62d2348d837acd03ada
-
Filesize
154B
MD5f97f3970ebf4ccd7ff1adda4825230a3
SHA15365cece98aa84a39f482039e731796812335f76
SHA256e0fc86d63617a38cbbc965ee94fe6b5856b8efff380a556f349c7652930b95fc
SHA512ceb06133494145c332095fe91ae8290430926a14c7763d67e515683ba402c36d736564f50724a9c2a1dc911460515e506431bed17f63be6fffe87efab54b35da
-
Filesize
153B
MD59985778609094662c1bb0ebc122a6472
SHA186e890c413152fbcb3fe6a20fef15444d72eacaa
SHA256fa2d51eac7d2b0835fe578bfb8ce04323635e9678c68d4aeb203d867bf8e9fcc
SHA5124b8b715a5808d46edd86f6e91b8779c54bba2ac01db67d6b44cb42ad172a92e06f47cab98269c6a403b3a3fbb16490e895ae3fe0f0e092025271d87a778d108b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
182KB
MD582eb1ccf28f3af897c2db27282b41156
SHA19f945d8b18ff0fbb5f013efe5e2ff33aef136104
SHA256ced6cab3c04c08ce5705af0b6986965dbdbfda17cbd66c973bb371ed3b95f37a
SHA5129458fabeae4dabf8109b9736496a01d9168312faec1c17d6eed89e8f09cbb8287d74ff758948cf07838720c11005e87a734e920be4ead275354f46a0a6176f84
-
Filesize
590KB
MD5751672b3dc8e48b7632544b57e01a069
SHA1a497158550201b67a8340756529c8909f13ddb5a
SHA256acff977962ee68c47b786c28186b43b093ef41ec6ed617ee019f1227e17d8799
SHA51296e0d9a1f15c55ab69b37ec095dda802a008c37c14a51bce6b5e04ca60d83e09bf9d69be604d0fd5f407471c959fafec0d8477856570fc8862a606a237baa97e
-
Filesize
1KB
MD54c77703bc70d087c272b1b4f8db55c4c
SHA13bbf0cc26c0b888aedefbfb077ca1e270d3c45c3
SHA256dfddd98c2f704875c1b40cd1c81005faf10a442135c2c84b9ebef51f935d4b06
SHA512bb0052a2c5904e503429017c506f03122c2f4b83d0609c1d40a153848d392303c1ec441338fcb18977e6f310f634abe0bd3ecbee03cd7e468795dd2cb75f8dc3
-
Filesize
464KB
MD583222120c8095b8623fe827fb70faf6b
SHA19294136b07c36fab5523ef345fe05f03ea516b15
SHA256eff79de319ca8941a2e62fb573230d82b79b80958e5a26ab1a4e87193eb13503
SHA5123077e4ea7ebfd4d25b60b9727fbab183827aad5ba914e8cd3d9557fa3913fd82efe2cd20b1a193d8c7e1b81ee44f04dadfcb8f18507977c78dd5c8b071f8addb
-
Filesize
522KB
MD5d293db543d714d4b6a959911f04982cc
SHA169c6d24cebec0d0f82b2006d9f9f9c3add831263
SHA256dd31c28d11f79d4dd84c531b68fe52aa8f1076ef585bcf438d8976f8d3baf14d
SHA5128abcf620c879092fcdc77b16877a9d7b50d9dd7b0e7a89187150bf03c1a7e05021cd30e30315d881ed5e819cb0d85050fdf294fa41bb8006c7cfe582fb68dc5c
-
Filesize
3KB
MD5c0ecf23c7cf4e09c426ff35e83eb34b8
SHA16e42205b40fa610e3d3376cc21997745f448ced7
SHA25661bcc5c65812305576bd37eb7237ac29f04f14cef3ab9b9e7e8f940d5522b393
SHA512ce8ee53483211cc488df90f396fa33877866cdc862b343625c736cf676be37e95021e465d277aff503f01eee8e5883175ab6a74ba2317285e843f87285f9995d
-
Filesize
241KB
MD5e7eeaacea4bb7ca8625dbc72f9c05177
SHA16e540e594d4e7fe1c55f2f9e406d3c0f6d02af9d
SHA25667f5c0fedec2ca57fc1b3118bd772b987c01b573584c08c4264fc8030f0944f3
SHA5129b45ab2f9b865da7775405eb05b805073f37590573c50b70644c6e694f2e6effa5c9b0cb15ce30b184f8afa71a382bc4bb9096599ccce8b68e130131da502c2c
-
Filesize
169KB
MD5bbaa88e5567a6b9c134f28262c54ca65
SHA15d59256abbc0226d4966cfa7f96511453736bb63
SHA2562e2cf708db9d86b04c62a6273aa326225181fb739f6b950fbe2e1bd4905ecd0b
SHA512eb714c554123a9405f1beb952e82f79b684995a4f567f3fb9bf934f51496eea0d325c791fddafc2105922ca51f93132db85ee8b555880ac04e0e039636c58779
-
Filesize
540KB
MD501e10fdd82dff5e70eff077adc2a4528
SHA15bc845e65e732c4bbc246174eb18874140d26772
SHA25657f75c075376c8977860c3bcb8d7d693289450a08b569159bf7ed1dc1824e1f1
SHA512fe0f0e8c14d6a8318a1a4320e427375b309e2ab5f05286ecca7d7ce1c3047c75054cce2153233c07bf7a921d43fea3fc5093af928bb7b555de46dfa2adb55366
-
Filesize
140KB
MD52bc5de386a4297144781d15b8e812b63
SHA1ae6b19d49b413f1549b3540a9fbba00c1e8b3d27
SHA2569c266080fb5f31e02a5005b91657093bd8c1faed23102e021a8be283c1753461
SHA512e4d43c871af5c03392d2fb139fdf10c2f2da2f1d6fe0edd089e3e30369d6d350727b483c98868626f81d680400b44ee4d328e475b0017bfdeb38cdb44a8b4d4b
-
Filesize
23KB
MD5a5aa80f49ad64689085755ab1ebf086e
SHA127e88cf0d2b34ea91efaa5cef9a763ee2722c824
SHA256a79e1c30e9308afe4d680f0bfb82de3e8c1fe94aeca453ec4092c3ed4789ae6b
SHA512f3dbd77e3a2ec3915b34d1387388abad45c99459ce03c06dc9a83d04f751b837c7b56cf9b4b7630f7fcd897a1d8057fce4cf761b1dc140a3928431b22b9b5b82
-
C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe
Filesize1.0MB
MD58afdf50f0097e7fc7254c83b2b2bf097
SHA1771f30d91517ce306e93b548f31bd595139255a8
SHA2561c96bab3b22b9e52736982b58ff5d75eb22293aa184024ad29c4f722bf1420f3
SHA51251e70ae50cc46be7670ce73c559ffa11f6cc324a0256b44f394c789b5e7fd78089b934f7a91b06d5ceba55caede217a87296bbdb0ba17e48e59dad8ca33a5e2b
-
C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe.config
Filesize3KB
MD56517457e21bed85a6e41e8b84942c8dc
SHA145451a32d6246265c94660030642137ff0ac4629
SHA2563148b743bb5599ee95ff171d8ed7f66c48979d5993a328f9e9291c1443e0fd28
SHA512e694240d22e240f3b4ba78a2d0e38b353ce1f5ea348d46e688cb60166cdd91083b5069d1cbc79f94cfbf322edbdeee3511eb9360c2a08c3002d1ca28175451a3
-
Filesize
31KB
MD5346d813cb3b38030edbe2342b21ecb0d
SHA1578cc0f818bb3c414e5b806fe628a100f2eed63c
SHA2564a807bec1041e2a900688f17d338a06b952a1a8e76b61f681454302753ab79ee
SHA51272d6117ba66f1939fcb1f1bd89fe3a7cc5d93ae67ba7ed9927746a388eec4885986915372d5ff92176615f6e73e9ddcdff5e8feb30d2b0c17f8aaaab1e4f744a
-
Filesize
20KB
MD5647ef1d7ccf030a09f17a54c5f40bbed
SHA108a71074606354e53a5c25aa9b084dfe9bef551f
SHA256dc7ba0dcf33d3599c6d471cedb604e141d24a9aff9964225b8de1dfbb8a285db
SHA51216d7dfc6033114c247c252f5463ab874418b609811ef31dd82365482487c6a8dcb2260f9b288fa883d3ba70c8b8836bb9e38d5bc24303db71fdcac8778b769fe
-
Filesize
280KB
MD57c11f28d40f846515c132c5e358913bb
SHA1fe7d3cd47352835016ffe5be86185165c4a09f69
SHA2568cdae744cb81a397c61f9311e1bd089206783b8b173d6e8216005b84662fda1e
SHA51212acfc71df4e7d24fe0ac9de97d21dcd651480fd0c9e46035cd3a2f3fe1ee6833fc9679cda0b07ffa33bb6ff0a97b6d28f3fa161747990b18cea73c22bf124c8
-
Filesize
234KB
MD52b30334153d41d8c762207309be73d92
SHA1a54f5fa79252b1b9968f6e1a44fde7f007a12548
SHA2569b4eee17b496a35e88b5f1631ba21c2bee262b3c6da0024c18e3d1b7996b3484
SHA512cc9972e8f8952bef7364b00d269848a918c47bd4fb66cb0fbc97ea7c74dab467ca7fa694c79a3d07cff45869fe9bd6643a3291b4fd83c53c544320470ab78aeb
-
Filesize
631KB
MD512ef5de02e17750d796ea176a6a285e8
SHA1235c20773fd054e5469dad5e3d4ef7795a3f5657
SHA2569f3fdd1a27c709eb028795ce2e41068709f37d100352331dbdd0d5a0bc2fead4
SHA512bfecf915d934faf6abf09796b608136c0e0f52a1cdd0ae685145df5d21cd54da7369a275bc4ccccffef83e4d86258fd7dc09cc887c569f7a27c0fb4760f7a2cd
-
Filesize
980B
MD5c9c40af1656f8531eaa647caceb1e436
SHA1907837497508de13d5a7e60697fc9d050e327e19
SHA2561a67f60962ca1cbf19873b62a8518efe8c701a09cd609af4c50ecc7f0b468bb8
SHA5120f7033686befa3f4acf3ed355c1674eaa6e349fba97e906446c8a7000be6876f157bc015bf5d3011fbbdc2c771bcbaea97918b8d24c064cbbd302741cc70cbc7
-
Filesize
172KB
MD54e04a4cb2cf220aecc23ea1884c74693
SHA1a828c986d737f89ee1d9b50e63c540d48096957f
SHA256cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a
SHA512c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4
-
Filesize
431KB
MD502551708742c3e7badee72532c9484b7
SHA1d5aa394ee2883a0f4648698fb7d1f54039f3f73e
SHA2560fc8edc2b0bf3b92ab50c08429b03f7612fe1fe2e1216a4d9266f11058e3e95f
SHA5120cf5c87831e4d82bc09decaba0c99ae71044a59b97ab61345a1e5e940766227adf27e34593a8642d51ea5673a37e510e8ebf81ebdbb1bcb1777d48a738520e7c
-
Filesize
662KB
MD5c8b8460b401e15a7e24adccb73ce2733
SHA11d2543e3ec0a18f956fd3f9fd2295f06258dd862
SHA256634e02af77d50ce1047fd71d654e90d9838627ec17ea821ed4e1048d7aeb34ee
SHA512ff7666306e49297f8178d1f6b28af0da6d8d8553c12dd561e21f5f0cc14f1a3befab3cbfb031e9aae51dac517a437ffcef90304d82f551eb2a7e24a19076943c
-
Filesize
275KB
MD59d640e28c58b6e42ef7ccacc0f5a5480
SHA10f2e57ec93fe46607b70d282682aeaad86403185
SHA25674ac0ebb26bf0a323427545b5a3a6e67b6bfcd0a1238daec816ced191b3ad0b2
SHA5127097368b9a4cd143890353ff255f28861bbf0c178d249b06fe0decc492f99fff15cf3348bfbbfb1021247e7f926a53d05b0d0450829e000a5697e8f12d4bc217
-
Filesize
239KB
MD5a8d11ee5c3dcc54d8082fd2c087c7977
SHA18191c9e82f4e6f67a427a5f3b7b1a3bcd67cb4ae
SHA256c29d2aeb1de17211adb98a490051d83bfd05d10af66094ef7159d0917bad35cb
SHA5126462a7d23e571b41791af130ae0d2a0e010e30705a66e96b716028a0fe08bc4c7669b78ec4e56aedce991872336b0da7bcf1845ca5a15e621fa91d4c05d9f9ab
-
Filesize
146KB
MD59d9a45f017d425179b7907410fd4d124
SHA1d466dacd22e4daa5698ffc2a812a48b8fc680d71
SHA25651f05b7aec5c1e565c36b33a456ce2e3500669399abd9ead2bd217d847805415
SHA512f9336ebf658f24c235105b4845f1182e06fa6bca38d32a6b07774b6bddbb29cfb64cc174fdb25c2b00e4fdbf25fdf32df5229f156b5eb1f4d06a4f3b9938d1d2
-
Filesize
118KB
MD5ba3165ec14e657e6235d6d789e9e25ca
SHA1f626fcc0e7e7f26a092da6a995f5936a45c4f71a
SHA256bf93de4755822425f3fd3928b52d2a6e6c91ab069213aaaa95695ed3e17e72e9
SHA5126d83dd60b1f8e8d93ddbda657b1c75f86c1f5f6eac899123f6ce498f5dd1a5abf05e29776144044c6a848e8fdd2b9a6a5367c4b249b879a310a260fb6b55b6da