- Aug 16, 2017
- 325
- 860
Yeah I genuinely thought he got Isekai'd or somethingholy fuck he's back i'm shaking
Review my above postHas anyone had problems regarding the virus that this game brings? I remember downloading it last year and having quite a few problems. They even took money from me through PayPal. I don't know if it was a coincidence or it really has a virus. I await comments.
Nothing of sorts happens on my pc...
Oh shit this sounds serious! Do you have anyway instructions to remove this thing from your PC?DO NOT RUN THIS GAME
UNTIL THE DEVELOPER / OP CAN EXPLAIN THESE DETECTIONS, AND FILE OPERATIONS.
You must be registered to see the links
You must be registered to see the links
Both do the same, both have different anti virus results.
The virus one, injects into C:\Program Files (x86)\Google1608_1329478733\bin\updater.exe
View attachment 3764914
Does this really look like something this forum shouldn't look into?
Do I need to manually reverse engineer this executable to prove the developer (OR ORIGINAL POSTER !! ! ) is doing something fishy.
View attachment 3764915
Related parents, aka shared file hashes. Why is it affiliated with keygens, and random zips???
It establishes connections to multiple external IP addresses. These connections are potentially command-and-control (C2) servers, indicating the malware's attempt to communicate with an external source for instructions or data exfiltration.
Spawns new processes and services, indicating the execution of its payload and attempts to maintain control over the infected system.
It modifies registry entries in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run to ensure it runs every time the system starts.
Changes in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services to manipulate system services, often to disable security-related services or to create new malicious services.
Modifies the key HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE, potentially to affect browser behavior and user credential handling.
View attachment 3764941 View attachment 3764942
The malware creates numerous .tmp files in the user's temporary directory (AppData\Local\Temp). These files are likely used as intermediate stages in the malware's execution process.
The malware uses cmd.exe to execute batch files (.bat) located in the temporary directory. These batch files are used to execute the primary malicious payload.
The malware masquerades as the Google updater to blend in with legitimate processes. This is indicated by paths like C:\Program Files (x86)\Google\Update\.
By creating and executing multiple batch files, the malware ensures persistence and continuous execution, making it harder to remove.
i want to ask , did you download files from patreon directly or from some guy in this forums? , can we confirm if it is injected by strangers to the game or it is programmed by the developer in the gameDO NOT RUN THIS GAME
UNTIL THE DEVELOPER / OP CAN EXPLAIN THESE DETECTIONS, AND FILE OPERATIONS.
You must be registered to see the links
You must be registered to see the links
Both do the same, both have different anti virus results.
The virus one, injects into C:\Program Files (x86)\Google1608_1329478733\bin\updater.exe
View attachment 3764914
Does this really look like something this forum shouldn't look into?
Do I need to manually reverse engineer this executable to prove the developer (OR ORIGINAL POSTER !! ! ) is doing something fishy.
View attachment 3764915
Related parents, aka shared file hashes. Why is it affiliated with keygens, and random zips???
It establishes connections to multiple external IP addresses. These connections are potentially command-and-control (C2) servers, indicating the malware's attempt to communicate with an external source for instructions or data exfiltration.
Spawns new processes and services, indicating the execution of its payload and attempts to maintain control over the infected system.
It modifies registry entries in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run to ensure it runs every time the system starts.
Changes in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services to manipulate system services, often to disable security-related services or to create new malicious services.
Modifies the key HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE, potentially to affect browser behavior and user credential handling.
View attachment 3764941 View attachment 3764942
The malware creates numerous .tmp files in the user's temporary directory (AppData\Local\Temp). These files are likely used as intermediate stages in the malware's execution process.
The malware uses cmd.exe to execute batch files (.bat) located in the temporary directory. These batch files are used to execute the primary malicious payload.
The malware masquerades as the Google updater to blend in with legitimate processes. This is indicated by paths like C:\Program Files (x86)\Google\Update\.
By creating and executing multiple batch files, the malware ensures persistence and continuous execution, making it harder to remove.
thats why im ALSO accusing the original poster, and the "source" of this build.i want to ask , did you download files from patreon directly or from some guy in this forums? , can we confirm if it is injected by strangers to the game or it is programmed by the developer in the game