Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 19:35

General

  • Target

    Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe

  • Size

    3.3MB

  • MD5

    e23d97827ea3c90cd85f2d11402e8940

  • SHA1

    67c01979b3516f9c3082cc05367142a74e413be8

  • SHA256

    16f7d9d609c24c5af75c0141059d49008eb9b1f016d198e224bdb486668cc7b5

  • SHA512

    e9dfd9ebf77aa615b17c05f99a5efed0c5dc993b7ca59800aa7ffa45d0d7fe4e207d0e4386c4fd9b11ceb49b5a4d28b4014ab9d6327ed86a8321cd9f3e90f646

  • SSDEEP

    98304:EyasyD6Lvd557Vh2EKTlpFGuKIKRv6owpuC:XyOT57V7jFiowgC

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe
    "C:\Users\Admin\AppData\Local\Temp\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe
      "C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe" /app "C:\Users\Admin\AppData\Local\MobiGame\\"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:692
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5116
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:464
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\utils\sysinfo-app.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3432
        • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\utils\sysinfo-app.exe
          C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\utils\sysinfo-app.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2476
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4256
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2092
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_OptionalFeature | Where-Object {('HypervisorPlatform','VirtualMachinePlatform','Microsoft-Hyper-V-All','Microsoft-Hyper-V-Hypervisor','Microsoft-Hyper-V-Services') -like $_.Name}).InstallState
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1048
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4608
      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\MobiHelper.exe
        "MobiHelper.exe" --install-path="C:\Program Files\MobiGame" --desktop-path="C:\Users\Admin\Desktop" --local-app-data-path="C:\Users\Admin\AppData\Local\MobiGame" --parent="C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe" --playstore-json-file-path="C:\Users\Admin\AppData\Local\MobiGame\playstore.json" --google-analytics-id="28312628" --create-playstore-shortcut --api-url="https://gamestore30.emu.codes" --source="gameslolc"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Windows\system32\ie4uinit.exe
          "C:\Windows\system32\ie4uinit.exe" -show
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:3788
      • C:\Windows\system32\ie4uinit.exe
        "C:\Windows\system32\ie4uinit.exe" -show
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:628
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" (Get-CimInstance Win32_ComputerSystem).HypervisorPresent
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4812
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2796
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 7DD8018E9631A7BFB1B9981BF9C7D5E3
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIAC82.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240757968 2 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          PID:4748
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIADFA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240758312 11 WixSharp!WixSharp.ManagedProjectActions.WixSharp_Load_Action
          3⤵
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3492
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /c set
            4⤵
              PID:3248
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSIAFD0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240758812 32 VirtualBoxSetup!VirtualBoxSetup.CustomActions.SetSessionPropertiesFromConfig
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:3532
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 7E2AB24576BE954FC74EC3E958B05325
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1664
        • C:\Windows\System32\MsiExec.exe
          C:\Windows\System32\MsiExec.exe -Embedding 448135C84C998D6ACB30425E1FB90B78 E Global\MSI0000
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4796
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSICC57.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240766046 83 VirtualBoxSetup!VirtualBoxSetup.CustomActions.CloseProcessesAndUsedFiles
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            PID:848
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Windows\Installer\MSICD61.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240766312 90 VirtualBoxSetup!VirtualBoxSetup.CustomActions.DeletePlayStoreAutorun
            3⤵
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:3000

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_53A1B1F8A70C6C11B81DE7FBA9338D4F

        Filesize

        1KB

        MD5

        0a1c00e7c281dfb825b82c8ef5f6630b

        SHA1

        87cc9f15333160e2694d3dde091ab6b3b46474f3

        SHA256

        5a5575c2ffca40825dddedf4f29b0c515ef359b76316be42780db71821e9e1d5

        SHA512

        707b726379f6883dbe00a60bffa5b52ee8ca84005703ea365d43b2c60d2683fc18e10f88d7a8b2e3d84863535e5d75b59b73aad5682cabe8ccc56428df4abd1c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

        Filesize

        1KB

        MD5

        14f6a1453b20f2af5174396127d44454

        SHA1

        6ae30f2916869897fc64c21848507a8e4055137a

        SHA256

        3880705ad811ca4e689696945f7a961c36a3ec17456b9488e93170653a609f29

        SHA512

        fb3b90655775ee9493205be48925306d568a306474aa9f5d20285236d6f5792faa98623a7b54bb6f1ee024e361e73ffda68ce6ae4af26c42f0c01edb001cf5ab

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_53A1B1F8A70C6C11B81DE7FBA9338D4F

        Filesize

        536B

        MD5

        fa1452417fc82d20c3c3d7739504caad

        SHA1

        7a2bc11c56c8f0f08670e31c41b6ecf302a64b94

        SHA256

        2bcac126fa97dfa9c59450c4c401be8fcfe0bb56801f1d759ecf6369e9183b7d

        SHA512

        269da390f16361dc04c46d947f80358be839e8c69db3201e7587311a1f8b634cc304460eade7df0a9d288ab81c1cd9d25d231f91c0beed05eb400f74a752a575

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

        Filesize

        536B

        MD5

        363583aab843b9b63e19a89e92880fca

        SHA1

        ff978a55f1d52df1e145cbc9fd6836acb65b1a8d

        SHA256

        e349a318d37fe3ab0ef78eae7bd6238b2191103b8d73bef7a934ecc44773cb1b

        SHA512

        8100bbf628efc995eff27d0e863ab8d41d7cca54c206549f29780f7634a5d3d69f637138c5d81d95a67e1984cae8adee943ec1781f651760fc223d741803c9eb

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        3bfc414667e1ebc31e9259fa1db290fa

        SHA1

        9bff989429779efef334e5524a362e7b6ff266cb

        SHA256

        b58f994c644f7b4a831e889630bfd7ca0860aeb1e0920dc0f5d4928585a9dbab

        SHA512

        e6cb000e8f900132f7dc661f943b8e91e945d171157ff3289b91e9d79f70230e363ed65b7ec97f451b376cf4706a14de9a86193e72dcea8fe3aa8c86c6117d13

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log

        Filesize

        651B

        MD5

        00bfeb783aeff425ce898d55718d506d

        SHA1

        aac7a973dc1f9ca7abc529c7ea37ad7eaf491b8f

        SHA256

        d06099ef43eb002055378b1b6d9853f9b1f891ada476932ba575d1f97065a580

        SHA512

        2209d5f4999cb36ebf26c6b8cb3195cc9fc0f0a103f4a28dd77b04605d7c6e79d47d806454c63b8d42bbe32864be7cdb56df3cccf71a6c27fe0b331d8304e1ff

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\ie4uinit-show.log

        Filesize

        952B

        MD5

        20bfd92545250c3f6719176834866d86

        SHA1

        3a327e6806b8b2e7e20723b3bb49c43f76b51fc6

        SHA256

        79433103e8ed8f0d737ad926195c24080ca65841234508db03f7b616322010c9

        SHA512

        11926914fa2ecf1b28e38fbe7949ba488a531643fdde9ed48e4f4c271965e32bc5b7fa02e1029a9c71bd5282027bf87fae94af467de5dea72b4cb2e1b91f0f33

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        d0510e53e1744f2e398026ea8ef3717e

        SHA1

        3dd36ee33b5fcd15ac92bfc9380cb5901add5827

        SHA256

        c4b4f6ecac0f8337b39ee9c82e6d125a9e19697bb75bd7f7aefd147df1e58392

        SHA512

        1c16d12820511ef19e4aceb29ba90fff43885ba671baeac479b426b58104a6301e70b5c951d06a4fb9e1d7f0821ab9042b73f56619b836228a34d342ec2a5b16

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        6ac6c8637ec8b38210eb2b246a2494f9

        SHA1

        d756b88360ee7391aec76489c601392a5b84673b

        SHA256

        3d20c06f31d3f77fac462e06b4bbb88803a64ccf380624b31cf08da483db1d4f

        SHA512

        ae684a20a714bdb0bd4f5fa72491fe4191acf42c3f80934da46fc1909fae73e732bff573c21a2ceff50eba5750852cc45bd9dab4c7a9f7017df5e9a7123a3ffb

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        7278fa708769a543014267e4613f927c

        SHA1

        d18017fe0dcb3ef814e69cc1ce20857ee25dd3b7

        SHA256

        4617aca60de6e4127de1fdca73f36a60703822c2ea38a9f521377d4f49394edd

        SHA512

        147ca121aa72f2a11f3ae22667ee433ac095be3e7d0ad71aa9a1f5fee1838e361f359b58854908a9d942de7162f7c136d51f6a5c9b6b9a1bdd94586ffe921cc6

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        6569c189091a8d908dd3580a0d9f050b

        SHA1

        43d092357454a91dfc724aecf97153f156df6673

        SHA256

        795fc2c0473ecc84ae5609ae3736bbce18eb914ae402ce1ae95004773030dafc

        SHA512

        406014043ce8d05fb45fd5329f0ddeeb67f18e9758681f7d09931e1e53dc1594f199ef4ae4c830b7c3d3b630547bd13ede6dab6b8c30c0e9bdeadae3dc132ded

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        371e7ee6c059cbe909fb920a5fbdc79b

        SHA1

        748b6dd17f5fe32b309ff9910e84c77a3f6a8092

        SHA256

        31bd5a28190599cf85382a7a9a438e8cf8dd7897181d9fd270827ea4fb4545ba

        SHA512

        036e660355198776e712c6159c378abb32a2b8fb7335c43bbd80124affc35caa6caabec6f83c9cb7901983efcbf2d658aa68526e62c67ec7eb1460d87ef97f9c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        4a1ecdb31d7a3d9699351208166883cb

        SHA1

        b62a03b1a9e94f731427b5e19bd57bbc4a53e742

        SHA256

        6fa9e2383011bb63b475b42dbc83c1e1db57135ac2590bec0a9003e7f036eeb7

        SHA512

        ec94fd098e3c3674eb2fd6704414d179f1ac118c566f0b57be40050f3688e5b60bd6fd528631e827058b49f25d74d1f6f939a9c4c1ad9e0256534a83d8b491b6

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        3f81481f0251165ee8051799d5487156

        SHA1

        dadc07e6eff95dd6fde0f3fb3eca0a4aa1941434

        SHA256

        020c968aedf44573c2dc9945010abb1109638dffdd9a627c503321068b79d845

        SHA512

        c93f39f6f41ad4256c1c6e6fb5afd4a44477372c8459d369ef962b42ddcfb3b7c84ac8b93f128fac8e9e8405c84c62c8891ca05ce97a84a0e6a411fe50371efe

      • C:\Users\Admin\AppData\Local\MobiGame\hwid.dat

        Filesize

        32B

        MD5

        5c2650fea370180dadfe31b172cb6227

        SHA1

        167c2751d8da962e111faf5ce85231afb5c582a2

        SHA256

        1a2e3a49ee458a58eec35c79bfe0412c6de88daf5e020aa31dc5e1608b32a2e7

        SHA512

        37301d65b9e0d227d824d24a2e2f4013b50492a8365a1ff1d89344efb0fec08556ebef76d28691b2b4bbe0f2cd5f42c0b7ff1414a9ae202ce125810d9e979883

      • C:\Users\Admin\AppData\Local\MobiGame\installid.dat

        Filesize

        32B

        MD5

        7a19d70c01b154764b7d803a577dcfa9

        SHA1

        0532d5c745eab6fe2912dcf7fcc3f0b8ecde0250

        SHA256

        6204ec80e86780c15c10fcb880ee08ffa9bca3e43958d2bf71169b1cf1f1298c

        SHA512

        a37e603e5f5fe6fc2db82e412752f2619c0c89f144fc1745fd4e4a2a964c7af0e8ad6ab90515b2ebd19e1e391cea297b796e6f810ed843fb517ee3be1c907b71

      • C:\Users\Admin\AppData\Local\MobiGame\logs\downloader.log

        Filesize

        4KB

        MD5

        f94b64b0734d0834fb188baff7601ad2

        SHA1

        649e718e2982cd0ccc16f785fd6f405f30226f7e

        SHA256

        03e957899c7237302dc9beb982c25bfaea6ce7cda0d7c47de7123ebecf1120c8

        SHA512

        3006a39836ee60abe303d7b135540ed41138c3200b56a914d9abdc3029e38b1c61e8be96d07924c741fe9f7f2a91338a94f1c48d45f0c7506afb841bf1aaaa4b

      • C:\Users\Admin\AppData\Local\MobiGame\logs\mobihelper.log

        Filesize

        1KB

        MD5

        08b2aa05da856b40c718d96f8725b8c3

        SHA1

        f3d3c13f419b2f0dcfd95eb0def830028ef7dbe1

        SHA256

        cbb238c4963c4663a2cad9c801201909999050df6cf0964da60fe4e5c39cf32f

        SHA512

        77f532ee7a678a9f32dabe4f6a937b3db9284f64a464784c49d94c2a072a75d1377e58387ad546bc8f7a06950ee56a60acee2e19a8498bd3a8caf3583592a1dc

      • C:\Users\Admin\AppData\Local\MobiGame\logs\mobihelper.log

        Filesize

        2KB

        MD5

        3f7c2cd0a1a3cc30b4bd49e815ad450d

        SHA1

        3d16b276459c8bd67ae93daabefec6c567ad9826

        SHA256

        72146e618b60e84e84b76c45698a1062ea6e3997ee0d4958c4844cf13bdf22a1

        SHA512

        2d7e351017c160cf617415aa4805cd0b91b62eeeb8462e8134472c3a8c01a56c98ba76ea4216908dbe237376b7d091c4f14ecb262879d72f5fbff21f9e9b56e9

      • C:\Users\Admin\AppData\Local\MobiGame\logs\msi_install_2024.10.01_19-38.log

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Local\MobiGame\playstore.json

        Filesize

        537B

        MD5

        5feca042545b8c85fc30c3cdb6f36b9b

        SHA1

        53555b4f48d4945b41bf887f3ad7825159654c77

        SHA256

        e02252206a390428ec0a5ddfdb2ec048593cfb0ed967f4885e54c22224650caf

        SHA512

        5d734ab9bc5ca72014886715c49739ce42a5ae462ab5a752ce1aa3d7031cc511053459d4d762f8955aafa05c42c1ea5eb688e59aaaf978c3335de7ef00e11c65

      • C:\Users\Admin\AppData\Local\MobiGame\sourcesettings.json

        Filesize

        5KB

        MD5

        e09ca833ccd4a626fd1da2543d5bef68

        SHA1

        7ae21f74c8b8bf564123d7e61ae11c63c5bc4e01

        SHA256

        1db566b34afa6dbab3e076f43553e0e04fdbc566542bb7fc52f5342358286991

        SHA512

        7ed39b694798759fcb6948c277261a4f84937ac439a0743cd6ee107f2377e3cf30d7400ee36fd6520531af5f1d516f5be1616116a4bcd62d2348d837acd03ada

      • C:\Users\Admin\AppData\Local\MobiGame\userconfig.json

        Filesize

        154B

        MD5

        f97f3970ebf4ccd7ff1adda4825230a3

        SHA1

        5365cece98aa84a39f482039e731796812335f76

        SHA256

        e0fc86d63617a38cbbc965ee94fe6b5856b8efff380a556f349c7652930b95fc

        SHA512

        ceb06133494145c332095fe91ae8290430926a14c7763d67e515683ba402c36d736564f50724a9c2a1dc911460515e506431bed17f63be6fffe87efab54b35da

      • C:\Users\Admin\AppData\Local\MobiGame\userconfig.json

        Filesize

        153B

        MD5

        9985778609094662c1bb0ebc122a6472

        SHA1

        86e890c413152fbcb3fe6a20fef15444d72eacaa

        SHA256

        fa2d51eac7d2b0835fe578bfb8ce04323635e9678c68d4aeb203d867bf8e9fcc

        SHA512

        4b8b715a5808d46edd86f6e91b8779c54bba2ac01db67d6b44cb42ad172a92e06f47cab98269c6a403b3a3fbb16490e895ae3fe0f0e092025271d87a778d108b

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uigwpkyn.cxa.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Microsoft.Deployment.WindowsInstaller.dll

        Filesize

        182KB

        MD5

        82eb1ccf28f3af897c2db27282b41156

        SHA1

        9f945d8b18ff0fbb5f013efe5e2ff33aef136104

        SHA256

        ced6cab3c04c08ce5705af0b6986965dbdbfda17cbd66c973bb371ed3b95f37a

        SHA512

        9458fabeae4dabf8109b9736496a01d9168312faec1c17d6eed89e8f09cbb8287d74ff758948cf07838720c11005e87a734e920be4ead275354f46a0a6176f84

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\MobiHelper.exe

        Filesize

        590KB

        MD5

        751672b3dc8e48b7632544b57e01a069

        SHA1

        a497158550201b67a8340756529c8909f13ddb5a

        SHA256

        acff977962ee68c47b786c28186b43b093ef41ec6ed617ee019f1227e17d8799

        SHA512

        96e0d9a1f15c55ab69b37ec095dda802a008c37c14a51bce6b5e04ca60d83e09bf9d69be604d0fd5f407471c959fafec0d8477856570fc8862a606a237baa97e

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\MobiHelper.exe.config

        Filesize

        1KB

        MD5

        4c77703bc70d087c272b1b4f8db55c4c

        SHA1

        3bbf0cc26c0b888aedefbfb077ca1e270d3c45c3

        SHA256

        dfddd98c2f704875c1b40cd1c81005faf10a442135c2c84b9ebef51f935d4b06

        SHA512

        bb0052a2c5904e503429017c506f03122c2f4b83d0609c1d40a153848d392303c1ec441338fcb18977e6f310f634abe0bd3ecbee03cd7e468795dd2cb75f8dc3

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Newtonsoft.Json.dll

        Filesize

        464KB

        MD5

        83222120c8095b8623fe827fb70faf6b

        SHA1

        9294136b07c36fab5523ef345fe05f03ea516b15

        SHA256

        eff79de319ca8941a2e62fb573230d82b79b80958e5a26ab1a4e87193eb13503

        SHA512

        3077e4ea7ebfd4d25b60b9727fbab183827aad5ba914e8cd3d9557fa3913fd82efe2cd20b1a193d8c7e1b81ee44f04dadfcb8f18507977c78dd5c8b071f8addb

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\ResumeService.exe

        Filesize

        522KB

        MD5

        d293db543d714d4b6a959911f04982cc

        SHA1

        69c6d24cebec0d0f82b2006d9f9f9c3add831263

        SHA256

        dd31c28d11f79d4dd84c531b68fe52aa8f1076ef585bcf438d8976f8d3baf14d

        SHA512

        8abcf620c879092fcdc77b16877a9d7b50d9dd7b0e7a89187150bf03c1a7e05021cd30e30315d881ed5e819cb0d85050fdf294fa41bb8006c7cfe582fb68dc5c

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\ResumeService.exe.config

        Filesize

        3KB

        MD5

        c0ecf23c7cf4e09c426ff35e83eb34b8

        SHA1

        6e42205b40fa610e3d3376cc21997745f448ced7

        SHA256

        61bcc5c65812305576bd37eb7237ac29f04f14cef3ab9b9e7e8f940d5522b393

        SHA512

        ce8ee53483211cc488df90f396fa33877866cdc862b343625c736cf676be37e95021e465d277aff503f01eee8e5883175ab6a74ba2317285e843f87285f9995d

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\ServiceStack.Client.dll

        Filesize

        241KB

        MD5

        e7eeaacea4bb7ca8625dbc72f9c05177

        SHA1

        6e540e594d4e7fe1c55f2f9e406d3c0f6d02af9d

        SHA256

        67f5c0fedec2ca57fc1b3118bd772b987c01b573584c08c4264fc8030f0944f3

        SHA512

        9b45ab2f9b865da7775405eb05b805073f37590573c50b70644c6e694f2e6effa5c9b0cb15ce30b184f8afa71a382bc4bb9096599ccce8b68e130131da502c2c

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\ServiceStack.Interfaces.dll

        Filesize

        169KB

        MD5

        bbaa88e5567a6b9c134f28262c54ca65

        SHA1

        5d59256abbc0226d4966cfa7f96511453736bb63

        SHA256

        2e2cf708db9d86b04c62a6273aa326225181fb739f6b950fbe2e1bd4905ecd0b

        SHA512

        eb714c554123a9405f1beb952e82f79b684995a4f567f3fb9bf934f51496eea0d325c791fddafc2105922ca51f93132db85ee8b555880ac04e0e039636c58779

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\ServiceStack.Text.dll

        Filesize

        540KB

        MD5

        01e10fdd82dff5e70eff077adc2a4528

        SHA1

        5bc845e65e732c4bbc246174eb18874140d26772

        SHA256

        57f75c075376c8977860c3bcb8d7d693289450a08b569159bf7ed1dc1824e1f1

        SHA512

        fe0f0e8c14d6a8318a1a4320e427375b309e2ab5f05286ecca7d7ce1c3047c75054cce2153233c07bf7a921d43fea3fc5093af928bb7b555de46dfa2adb55366

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\System.Memory.dll

        Filesize

        140KB

        MD5

        2bc5de386a4297144781d15b8e812b63

        SHA1

        ae6b19d49b413f1549b3540a9fbba00c1e8b3d27

        SHA256

        9c266080fb5f31e02a5005b91657093bd8c1faed23102e021a8be283c1753461

        SHA512

        e4d43c871af5c03392d2fb139fdf10c2f2da2f1d6fe0edd089e3e30369d6d350727b483c98868626f81d680400b44ee4d328e475b0017bfdeb38cdb44a8b4d4b

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\System.Runtime.CompilerServices.Unsafe.dll

        Filesize

        23KB

        MD5

        a5aa80f49ad64689085755ab1ebf086e

        SHA1

        27e88cf0d2b34ea91efaa5cef9a763ee2722c824

        SHA256

        a79e1c30e9308afe4d680f0bfb82de3e8c1fe94aeca453ec4092c3ed4789ae6b

        SHA512

        f3dbd77e3a2ec3915b34d1387388abad45c99459ce03c06dc9a83d04f751b837c7b56cf9b4b7630f7fcd897a1d8057fce4cf761b1dc140a3928431b22b9b5b82

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe

        Filesize

        1.0MB

        MD5

        8afdf50f0097e7fc7254c83b2b2bf097

        SHA1

        771f30d91517ce306e93b548f31bd595139255a8

        SHA256

        1c96bab3b22b9e52736982b58ff5d75eb22293aa184024ad29c4f722bf1420f3

        SHA512

        51e70ae50cc46be7670ce73c559ffa11f6cc324a0256b44f394c789b5e7fd78089b934f7a91b06d5ceba55caede217a87296bbdb0ba17e48e59dad8ca33a5e2b

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\Turbo-Dismount™_com.secretexit.turbodismount_gameslolc_28312628.exe.config

        Filesize

        3KB

        MD5

        6517457e21bed85a6e41e8b84942c8dc

        SHA1

        45451a32d6246265c94660030642137ff0ac4629

        SHA256

        3148b743bb5599ee95ff171d8ed7f66c48979d5993a328f9e9291c1443e0fd28

        SHA512

        e694240d22e240f3b4ba78a2d0e38b353ce1f5ea348d46e688cb60166cdd91083b5069d1cbc79f94cfbf322edbdeee3511eb9360c2a08c3002d1ca28175451a3

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\WixSharp.Msi.dll

        Filesize

        31KB

        MD5

        346d813cb3b38030edbe2342b21ecb0d

        SHA1

        578cc0f818bb3c414e5b806fe628a100f2eed63c

        SHA256

        4a807bec1041e2a900688f17d338a06b952a1a8e76b61f681454302753ab79ee

        SHA512

        72d6117ba66f1939fcb1f1bd89fe3a7cc5d93ae67ba7ed9927746a388eec4885986915372d5ff92176615f6e73e9ddcdff5e8feb30d2b0c17f8aaaab1e4f744a

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\log4net-loggly.dll

        Filesize

        20KB

        MD5

        647ef1d7ccf030a09f17a54c5f40bbed

        SHA1

        08a71074606354e53a5c25aa9b084dfe9bef551f

        SHA256

        dc7ba0dcf33d3599c6d471cedb604e141d24a9aff9964225b8de1dfbb8a285db

        SHA512

        16d7dfc6033114c247c252f5463ab874418b609811ef31dd82365482487c6a8dcb2260f9b288fa883d3ba70c8b8836bb9e38d5bc24303db71fdcac8778b769fe

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\log4net.dll

        Filesize

        280KB

        MD5

        7c11f28d40f846515c132c5e358913bb

        SHA1

        fe7d3cd47352835016ffe5be86185165c4a09f69

        SHA256

        8cdae744cb81a397c61f9311e1bd089206783b8b173d6e8216005b84662fda1e

        SHA512

        12acfc71df4e7d24fe0ac9de97d21dcd651480fd0c9e46035cd3a2f3fe1ee6833fc9679cda0b07ffa33bb6ff0a97b6d28f3fa161747990b18cea73c22bf124c8

      • C:\Users\Admin\AppData\Local\Temp\pcgame_58635FF4\utils\sysinfo-app.exe

        Filesize

        234KB

        MD5

        2b30334153d41d8c762207309be73d92

        SHA1

        a54f5fa79252b1b9968f6e1a44fde7f007a12548

        SHA256

        9b4eee17b496a35e88b5f1631ba21c2bee262b3c6da0024c18e3d1b7996b3484

        SHA512

        cc9972e8f8952bef7364b00d269848a918c47bd4fb66cb0fbc97ea7c74dab467ca7fa694c79a3d07cff45869fe9bd6643a3291b4fd83c53c544320470ab78aeb

      • C:\Windows\Installer\MSIAC82.tmp

        Filesize

        631KB

        MD5

        12ef5de02e17750d796ea176a6a285e8

        SHA1

        235c20773fd054e5469dad5e3d4ef7795a3f5657

        SHA256

        9f3fdd1a27c709eb028795ce2e41068709f37d100352331dbdd0d5a0bc2fead4

        SHA512

        bfecf915d934faf6abf09796b608136c0e0f52a1cdd0ae685145df5d21cd54da7369a275bc4ccccffef83e4d86258fd7dc09cc887c569f7a27c0fb4760f7a2cd

      • C:\Windows\Installer\MSIADFA.tmp-\CustomAction.config

        Filesize

        980B

        MD5

        c9c40af1656f8531eaa647caceb1e436

        SHA1

        907837497508de13d5a7e60697fc9d050e327e19

        SHA256

        1a67f60962ca1cbf19873b62a8518efe8c701a09cd609af4c50ecc7f0b468bb8

        SHA512

        0f7033686befa3f4acf3ed355c1674eaa6e349fba97e906446c8a7000be6876f157bc015bf5d3011fbbdc2c771bcbaea97918b8d24c064cbbd302741cc70cbc7

      • C:\Windows\Installer\MSIADFA.tmp-\Microsoft.Deployment.WindowsInstaller.dll

        Filesize

        172KB

        MD5

        4e04a4cb2cf220aecc23ea1884c74693

        SHA1

        a828c986d737f89ee1d9b50e63c540d48096957f

        SHA256

        cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a

        SHA512

        c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4

      • C:\Windows\Installer\MSIADFA.tmp-\WixSharp.dll

        Filesize

        431KB

        MD5

        02551708742c3e7badee72532c9484b7

        SHA1

        d5aa394ee2883a0f4648698fb7d1f54039f3f73e

        SHA256

        0fc8edc2b0bf3b92ab50c08429b03f7612fe1fe2e1216a4d9266f11058e3e95f

        SHA512

        0cf5c87831e4d82bc09decaba0c99ae71044a59b97ab61345a1e5e940766227adf27e34593a8642d51ea5673a37e510e8ebf81ebdbb1bcb1777d48a738520e7c

      • C:\Windows\Installer\MSIAFD0.tmp

        Filesize

        662KB

        MD5

        c8b8460b401e15a7e24adccb73ce2733

        SHA1

        1d2543e3ec0a18f956fd3f9fd2295f06258dd862

        SHA256

        634e02af77d50ce1047fd71d654e90d9838627ec17ea821ed4e1048d7aeb34ee

        SHA512

        ff7666306e49297f8178d1f6b28af0da6d8d8553c12dd561e21f5f0cc14f1a3befab3cbfb031e9aae51dac517a437ffcef90304d82f551eb2a7e24a19076943c

      • C:\Windows\Installer\MSIAFD0.tmp-\VirtualBoxSetup.exe

        Filesize

        275KB

        MD5

        9d640e28c58b6e42ef7ccacc0f5a5480

        SHA1

        0f2e57ec93fe46607b70d282682aeaad86403185

        SHA256

        74ac0ebb26bf0a323427545b5a3a6e67b6bfcd0a1238daec816ced191b3ad0b2

        SHA512

        7097368b9a4cd143890353ff255f28861bbf0c178d249b06fe0decc492f99fff15cf3348bfbbfb1021247e7f926a53d05b0d0450829e000a5697e8f12d4bc217

      • C:\Windows\Installer\MSIAFD0.tmp-\WixSharp.UI.dll

        Filesize

        239KB

        MD5

        a8d11ee5c3dcc54d8082fd2c087c7977

        SHA1

        8191c9e82f4e6f67a427a5f3b7b1a3bcd67cb4ae

        SHA256

        c29d2aeb1de17211adb98a490051d83bfd05d10af66094ef7159d0917bad35cb

        SHA512

        6462a7d23e571b41791af130ae0d2a0e010e30705a66e96b716028a0fe08bc4c7669b78ec4e56aedce991872336b0da7bcf1845ca5a15e621fa91d4c05d9f9ab

      • C:\Windows\Installer\MSIC270.tmp

        Filesize

        146KB

        MD5

        9d9a45f017d425179b7907410fd4d124

        SHA1

        d466dacd22e4daa5698ffc2a812a48b8fc680d71

        SHA256

        51f05b7aec5c1e565c36b33a456ce2e3500669399abd9ead2bd217d847805415

        SHA512

        f9336ebf658f24c235105b4845f1182e06fa6bca38d32a6b07774b6bddbb29cfb64cc174fdb25c2b00e4fdbf25fdf32df5229f156b5eb1f4d06a4f3b9938d1d2

      • C:\Windows\Installer\MSIC2AF.tmp

        Filesize

        118KB

        MD5

        ba3165ec14e657e6235d6d789e9e25ca

        SHA1

        f626fcc0e7e7f26a092da6a995f5936a45c4f71a

        SHA256

        bf93de4755822425f3fd3928b52d2a6e6c91ab069213aaaa95695ed3e17e72e9

        SHA512

        6d83dd60b1f8e8d93ddbda657b1c75f86c1f5f6eac899123f6ce498f5dd1a5abf05e29776144044c6a848e8fdd2b9a6a5367c4b249b879a310a260fb6b55b6da

      • memory/692-77-0x000001CA78BA0000-0x000001CA78BC4000-memory.dmp

        Filesize

        144KB

      • memory/692-76-0x000001CA78BA0000-0x000001CA78BCA000-memory.dmp

        Filesize

        168KB

      • memory/692-66-0x000001CA606F0000-0x000001CA60712000-memory.dmp

        Filesize

        136KB

      • memory/3492-766-0x0000021426C10000-0x0000021426C5C000-memory.dmp

        Filesize

        304KB

      • memory/3492-768-0x0000021426D10000-0x0000021426D52000-memory.dmp

        Filesize

        264KB

      • memory/4364-56-0x000001CF10B90000-0x000001CF10B9C000-memory.dmp

        Filesize

        48KB

      • memory/4364-215-0x000001CF29510000-0x000001CF29518000-memory.dmp

        Filesize

        32KB

      • memory/4364-143-0x000001CF299E0000-0x000001CF29A22000-memory.dmp

        Filesize

        264KB

      • memory/4364-174-0x00007FFD3AD23000-0x00007FFD3AD25000-memory.dmp

        Filesize

        8KB

      • memory/4364-561-0x000001CF295B0000-0x000001CF2971A000-memory.dmp

        Filesize

        1.4MB

      • memory/4364-652-0x000001CF28E70000-0x000001CF28E9E000-memory.dmp

        Filesize

        184KB

      • memory/4364-53-0x000001CF29520000-0x000001CF295AE000-memory.dmp

        Filesize

        568KB

      • memory/4364-698-0x000001CF28D30000-0x000001CF28D3E000-memory.dmp

        Filesize

        56KB

      • memory/4364-54-0x00007FFD3AD20000-0x00007FFD3B7E1000-memory.dmp

        Filesize

        10.8MB

      • memory/4364-816-0x000001CF295B0000-0x000001CF2971A000-memory.dmp

        Filesize

        1.4MB

      • memory/4364-59-0x000001CF29720000-0x000001CF2979A000-memory.dmp

        Filesize

        488KB

      • memory/4364-51-0x000001CF10BF0000-0x000001CF10C3A000-memory.dmp

        Filesize

        296KB

      • memory/4364-209-0x000001CF295B0000-0x000001CF2971A000-memory.dmp

        Filesize

        1.4MB

      • memory/4364-49-0x000001CF0EDD0000-0x000001CF0EED6000-memory.dmp

        Filesize

        1.0MB

      • memory/4364-354-0x000001CF295B0000-0x000001CF2971A000-memory.dmp

        Filesize

        1.4MB

      • memory/4364-211-0x00007FFD3AD20000-0x00007FFD3B7E1000-memory.dmp

        Filesize

        10.8MB

      • memory/4364-212-0x000001CF294B0000-0x000001CF294BA000-memory.dmp

        Filesize

        40KB

      • memory/4364-48-0x00007FFD3AD23000-0x00007FFD3AD25000-memory.dmp

        Filesize

        8KB

      • memory/4364-324-0x000001CF2C590000-0x000001CF2C5DA000-memory.dmp

        Filesize

        296KB

      • memory/4364-145-0x000001CF29AB0000-0x000001CF29AE0000-memory.dmp

        Filesize

        192KB

      • memory/4364-217-0x000001CF29A80000-0x000001CF29A88000-memory.dmp

        Filesize

        32KB

      • memory/4364-216-0x000001CF29500000-0x000001CF29508000-memory.dmp

        Filesize

        32KB

      • memory/4364-148-0x000001CF294C0000-0x000001CF294E6000-memory.dmp

        Filesize

        152KB

      • memory/4364-214-0x000001CF294F0000-0x000001CF294F8000-memory.dmp

        Filesize

        32KB

      • memory/4748-739-0x000002782C2A0000-0x000002782C312000-memory.dmp

        Filesize

        456KB

      • memory/4748-737-0x000002782C1F0000-0x000002782C21E000-memory.dmp

        Filesize

        184KB

      • memory/4988-392-0x00000114A3560000-0x00000114A35F6000-memory.dmp

        Filesize

        600KB

      • memory/4988-432-0x00000114BE1E0000-0x00000114BE3A2000-memory.dmp

        Filesize

        1.8MB

      • memory/4988-434-0x00000114BE8E0000-0x00000114BEE08000-memory.dmp

        Filesize

        5.2MB

      • memory/4988-453-0x00000114BDC40000-0x00000114BDDAA000-memory.dmp

        Filesize

        1.4MB