Analysis
-
max time kernel
108s -
max time network
109s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-08-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
CheatEngine75.exe
Resource
win11-20240802-en
General
-
Target
CheatEngine75.exe
-
Size
28.6MB
-
MD5
e703b8ac5b3601deebbf05843c9a4e97
-
SHA1
ab154e32099776e432b4d2c31366985f27950cf1
-
SHA256
fe6c0d8f90c9c74f2986fe169342e0a5319a3b1ffcf711b513f33db7e28e863a
-
SHA512
8280af1c2455b37c13de60f1d4a4ab26fe7d03bed7f874b074afb4ae365f2380aa71525e7e649e924347c38efd601dd3a6b7924f56aa6c09932f24b5c2f03c65
-
SSDEEP
786432:dTCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFH2:d2EXFhV0KAcNjxAItj2
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
UnifiedStub-installer.exedescription ioc process File created C:\Windows\system32\drivers\rsCamFilter020502.sys UnifiedStub-installer.exe File created C:\Windows\system32\drivers\rsKernelEngine.sys UnifiedStub-installer.exe File created C:\Windows\system32\drivers\rsElam.sys UnifiedStub-installer.exe File opened for modification C:\Windows\system32\drivers\rsElam.sys UnifiedStub-installer.exe -
Manipulates Digital Signatures 1 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
Processes:
cheatengine-x86_64-SSE4-AVX2.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WINTRUST.dll cheatengine-x86_64-SSE4-AVX2.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 27 IoCs
Processes:
CheatEngine75.tmpprod0.exesaBSI.exeWZSetup.exeCheatEngine75.exeCheatEngine75.tmpngs5y5cm.exeUnifiedStub-installer.exe_setup64.tmprsSyncSvc.exersSyncSvc.exeKernelmoduleunloader.exewindowsrepair.exeinstaller.exeinstaller.exeWeatherZeroService.exeWeatherZeroService.exeWeatherZeroService.exeCheat Engine.execheatengine-x86_64-SSE4-AVX2.exeServiceHost.exeUIHost.exeupdater.exeWeatherZero.exersWSC.exersWSC.exeDotNetDataCollector32.exepid process 3364 CheatEngine75.tmp 4328 prod0.exe 2612 saBSI.exe 4988 WZSetup.exe 3652 CheatEngine75.exe 1420 CheatEngine75.tmp 3560 ngs5y5cm.exe 1796 UnifiedStub-installer.exe 1032 _setup64.tmp 4408 rsSyncSvc.exe 732 rsSyncSvc.exe 2396 Kernelmoduleunloader.exe 464 windowsrepair.exe 2716 installer.exe 2184 installer.exe 1932 WeatherZeroService.exe 1116 WeatherZeroService.exe 5040 WeatherZeroService.exe 4760 Cheat Engine.exe 1028 cheatengine-x86_64-SSE4-AVX2.exe 6280 ServiceHost.exe 7132 UIHost.exe 5456 updater.exe 6096 WeatherZero.exe 3328 rsWSC.exe 1984 rsWSC.exe 7688 DotNetDataCollector32.exe -
Loads dropped DLL 43 IoCs
Processes:
CheatEngine75.tmpWZSetup.exeinstaller.exeregsvr32.exeregsvr32.execheatengine-x86_64-SSE4-AVX2.exeUnifiedStub-installer.exeServiceHost.exeUIHost.exeWeatherZero.exepid process 3364 CheatEngine75.tmp 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 4988 WZSetup.exe 2184 installer.exe 4988 WZSetup.exe 4988 WZSetup.exe 6548 regsvr32.exe 3436 regsvr32.exe 1028 cheatengine-x86_64-SSE4-AVX2.exe 4988 WZSetup.exe 4988 WZSetup.exe 1028 cheatengine-x86_64-SSE4-AVX2.exe 1028 cheatengine-x86_64-SSE4-AVX2.exe 1796 UnifiedStub-installer.exe 1028 cheatengine-x86_64-SSE4-AVX2.exe 1028 cheatengine-x86_64-SSE4-AVX2.exe 1028 cheatengine-x86_64-SSE4-AVX2.exe 6280 ServiceHost.exe 1028 cheatengine-x86_64-SSE4-AVX2.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 7132 UIHost.exe 7132 UIHost.exe 6280 ServiceHost.exe 1796 UnifiedStub-installer.exe 6096 WeatherZero.exe 6096 WeatherZero.exe 6096 WeatherZero.exe 6096 WeatherZero.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
icacls.exeicacls.exepid process 3400 icacls.exe 3120 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks for any installed AV software in registry 1 TTPs 6 IoCs
Processes:
CheatEngine75.tmpdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000\SOFTWARE\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000\SOFTWARE\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir CheatEngine75.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
WeatherZero.exedescription ioc process File created C:\Windows\assembly\Desktop.ini WeatherZero.exe File opened for modification C:\Windows\assembly\Desktop.ini WeatherZero.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ip-api.com -
Drops file in System32 directory 64 IoCs
Processes:
cheatengine-x86_64-SSE4-AVX2.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WS2_32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\ntmarta.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\WindowsCodecs.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\oleaut32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\msimg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\imagehlp.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\DWMAPI.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\DWrite.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\PresentationCFFRasterizerNative_v0300.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcp_win.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\psapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\ADVAPI32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\CRYPTBASE.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\GDI32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\SHLWAPI.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\ucrtbase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shell32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\MSCTF.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\IMM32.DLL cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\mswsock.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\TextShaping.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\combase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\profapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\webio.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ws2_32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\combase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\rasapi32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wininet.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\gdi32full.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\UMPDC.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\dataexchange.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\twinapi.appcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\win32u.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\sechost.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\SHCORE.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\KERNEL32.DLL cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\psapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\wow64cpu.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\KERNELBASE.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\CRYPTSP.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\SspiCli.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\OLEAUT32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\rtutils.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ole32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wsock32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\uxtheme.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\kernel.appcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\bcrypt.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\netutils.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\RPCRT4.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\bcryptPrimitives.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\ole32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\gdi32full.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\shell32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\rsaenh.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\NSI.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\PresentationNative_v0300.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcrt.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\uxtheme.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SysWOW64\WINSTA.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\comdlg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\PROPSYS.dll cheatengine-x86_64-SSE4-AVX2.exe -
Drops file in Program Files directory 64 IoCs
Processes:
installer.exeUnifiedStub-installer.exeCheatEngine75.tmpcheatengine-x86_64-SSE4-AVX2.exeServiceHost.exeinstaller.exedescription ioc process File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-pscore-toast-nb-NO.js installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Net.Requests.dll UnifiedStub-installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages_web_view\webadvisor\wa-sstoast-toggle.js installer.exe File created C:\Program Files\Cheat Engine 7.5\autorun\is-236FG.tmp CheatEngine75.tmp File created C:\Program Files\McAfee\WebAdvisor\MFW\packages_web_view\webadvisor\wa-sstoast-toggle-rebranding.html installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-sv-SE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\browsernavigate.luc installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\dll\TextShaping.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\ReasonLabs\EPP\EDR\Microsoft.Win32.Primitives.dll UnifiedStub-installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\System.IO.UnmanagedMemoryStream.dll UnifiedStub-installer.exe File created C:\Program Files\Cheat Engine 7.5\languages\is-P0QC3.tmp CheatEngine75.tmp File created C:\Program Files\ReasonLabs\EPP\System.Diagnostics.StackTrace.dll UnifiedStub-installer.exe File opened for modification C:\Program Files (x86)\WeatherZero\Newtonsoft.Json.dll cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\ReasonLabs\EPP\EDR\System.Security.Cryptography.Csp.dll UnifiedStub-installer.exe File created C:\Program Files\McAfee\WebAdvisor\lookupmanager.dll installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-pscore-toast-es-MX.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\utils\browserutils.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-sr-Latn-CS.js installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\gdi32full.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\McAfee\Webadvisor\Analytics\engine.js ServiceHost.exe File created C:\Program Files\ReasonLabs\EPP\rsEngine.Scan.Detections.dll UnifiedStub-installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\msvcr80.i386.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files (x86)\WeatherZero\PresentationFramework.Aero.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\autorun\ceshare\forms\is-4I066.tmp CheatEngine75.tmp File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-overlay-en-US.js installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\nsi.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files (x86)\WeatherZero\symbols\dll\rasapi32.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files (x86)\WeatherZero\symbols\dll\Newtonsoft.Json.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\spinner_large.gif installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\edgesecuresearchonboarding.js installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\dll\lua53-64.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\wimm32.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-options-pt-PT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-cs-CZ.js installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\System.ObjectModel.dll UnifiedStub-installer.exe File opened for modification C:\Program Files (x86)\WeatherZero\dll\rtutils.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\toggle_on.png installer.exe File created C:\Program Files\McAfee\Temp2150065901\jslang\wa-res-install-pt-PT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\mcafee-logo-2024.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\onboardingballoon.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\firefoxversion.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\wabadgenotificationcounter.luc installer.exe File opened for modification C:\Program Files (x86)\WeatherZero\symbols\dll\PresentationNative_v0300.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\wow64con.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\is-BE377.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\bin\Release\is-62RJA.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-H88QG.tmp CheatEngine75.tmp File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\inst-top.gif installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ext-install-toast-pl-PL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-hu-HU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-ko-KR.js installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\LICENSES.chromium.html UnifiedStub-installer.exe File created C:\Program Files\Cheat Engine 7.5\include\is-QFNGK.tmp CheatEngine75.tmp File opened for modification C:\Program Files (x86)\WeatherZero\gpapi.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\ReasonLabs\EPP\EDR\Dia2Lib.dll UnifiedStub-installer.exe File created C:\Program Files\McAfee\WebAdvisor\logic\providers_selector.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-dialog-balloon-fi-FI.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-score-toast-cs-CZ.js installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\System.Text.Encoding.dll UnifiedStub-installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\autorun\dlls\64\CEJVMTI.dll CheatEngine75.tmp File opened for modification C:\Program Files (x86)\WeatherZero\symbols\dll\imagehlp.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\McAfee\Webadvisor\Analytics\config_manager.js ServiceHost.exe File opened for modification C:\Program Files (x86)\WeatherZero\wow64cpu.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\utils\common_utils.luc installer.exe -
Drops file in Windows directory 33 IoCs
Processes:
cheatengine-x86_64-SSE4-AVX2.exeWeatherZero.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\WPF\wpfgfx_v0300.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Drawing\2.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\f0de3068dfe880013ac1ab7eee9eac23\mscorlib.ni.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.Xml.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.Configuration.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFramework\3.0.0.0__31bf3856ad364e35\PresentationFramework.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.22000.1_none_6ec7c6847ea94424\COMCTL32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\NativeImages_v2.0.50727_32\System\9afc4201297b297bd36f6f288f8ba143\System.ni.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationFramework.Aero\3.0.0.0__31bf3856ad364e35\PresentationFramework.Aero.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ShFusRes.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SMDiagnostics\3.0.0.0__b77a5c561934e089\SMDiagnostics.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsec.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\Fusion.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.ServiceModel.Web\3.5.0.0__31bf3856ad364e35\System.ServiceModel.Web.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly WeatherZero.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_32\PresentationCore\3.0.0.0__31bf3856ad364e35\PresentationCore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.22000.434_none_1630a2eb2777c45d\gdiplus.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.ServiceModel\3.0.0.0__b77a5c561934e089\System.ServiceModel.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\Desktop.ini WeatherZero.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.22000.120_none_9d947278b86cc467\comctl32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WindowsBase\3.0.0.0__31bf3856ad364e35\WindowsBase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationCFFRasterizer\3.0.0.0__31bf3856ad364e35\PresentationCFFRasterizer.dll cheatengine-x86_64-SSE4-AVX2.exe File created C:\Windows\assembly\Desktop.ini WeatherZero.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorjit.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\shfusion.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\culture.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\diasymreader.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Runtime.Serialization\3.0.0.0__b77a5c561934e089\System.Runtime.Serialization.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\assembly\GAC_MSIL\UIAutomationTypes\3.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9680_none_d090cb7c44278b28\MSVCR80.dll cheatengine-x86_64-SSE4-AVX2.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 924 sc.exe 4908 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 6196 3364 WerFault.exe CheatEngine75.tmp 2036 3364 WerFault.exe CheatEngine75.tmp -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
CheatEngine75.exeCheatEngine75.tmpCheat Engine.exeCheatEngine75.exeWeatherZeroService.exeregsvr32.exeWeatherZero.execsc.execvtres.exesaBSI.exeWZSetup.exengs5y5cm.exeKernelmoduleunloader.exeWeatherZeroService.exeWeatherZeroService.exeDotNetDataCollector32.exeCheatEngine75.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cheat Engine.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WeatherZeroService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WeatherZero.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saBSI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WZSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngs5y5cm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kernelmoduleunloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WeatherZeroService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WeatherZeroService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DotNetDataCollector32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.tmp -
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod2_extract\WZSetup.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod2_extract\WZSetup.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
CheatEngine75.tmprunonce.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CheatEngine75.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ CheatEngine75.tmp Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
ServiceHost.exeupdater.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust updater.exe -
Modifies registry class 22 IoCs
Processes:
CheatEngine75.tmpregsvr32.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CT CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\ = "Cheat Engine" CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\ = "McAfee SiteAdvisor MISP Integration" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\win32\\WSSDep.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CETRAINER\ = "CheatEngine" CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\DefaultIcon\ = "C:\\Program Files\\Cheat Engine 7.5\\Cheat Engine.exe,0" CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open\command\ = "\"C:\\Program Files\\Cheat Engine 7.5\\Cheat Engine.exe\" \"%1\"" CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\WSSDep.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CETRAINER CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CT\ = "CheatEngine" CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\DefaultIcon CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open\command CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\ = "McAfee SiteAdvisor MISP Integration" regsvr32.exe -
Processes:
WeatherZero.exesaBSI.exeUnifiedStub-installer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E WeatherZero.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 UnifiedStub-installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 UnifiedStub-installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 UnifiedStub-installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 UnifiedStub-installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 WeatherZero.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 1900000001000000100000005d1b8ff2c30f63f5b536edd400f7f9b40300000001000000140000004efc31460c619ecae59c1bce2c008036d94c84b809000000010000000c000000300a06082b060105050703031d00000001000000100000005467b0adde8d858e30ee517b1a19ecd91400000001000000140000001f00bf46800afc7839b7a5b443d95650bbce963b53000000010000001f000000301d301b060567810c010330123010060a2b0601040182373c0101030200c06200000001000000200000007b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df860b000000010000004200000047006c006f00620061006c005300690067006e00200043006f006400650020005300690067006e0069006e006700200052006f006f007400200052003400350000000f0000000100000030000000c130bba37b8b350e89fd5ed76b4f78777feee220d3b9e729042bef6af46e8e4c1b252e32b3080c681bc9a8a1afdd0a3c200000000100000076050000308205723082035aa00302010202107653feac75464893f5e5d74a483a4ef8300d06092a864886f70d01010c05003053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f7420523435301e170d3230303331383030303030305a170d3435303331383030303030305a3053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f742052343530820222300d06092a864886f70d01010105000382020f003082020a0282020100b62dc530dd7ae8ab903d0372b03a4b991661b2e5ffa5671d371ce57eec9383aa84f5a3439b98458ab863575d9b00880425e9f868924b82d84bc94a03f3a87f6a8f8a6127bda144d0fdf53f22c2a34f918db305b22882915dfb5988050b9706c298f82ca73324ee503a41ccf0a0b07b1d4dd2a8583896e9dff91b91bb8b102cd2c7431da20974a180af7be6330a0c596b8ebcf4ab5a977b7fae55fb84f080fe844cd7e2babdc475a16fbd61107444b29807e274abff68dc6c263ee91fe5e00487ad30d30c8d037c55b816705c24782025eb676788abba4e34986b7011de38cad4bea1c09ce1df1e0201d83be1674384b6cffc74b72f84a3bfba09373d676cb1455c1961ab4183f5ac1deb770d464773cebfbd9595ed9d2b8810fefa58e8a757e1b3cfa85ae907259b12c49e80723d93dc8c94df3b44e62680fcd2c303f08c0cd245d62ee78f989ee604ee426e677e42167162e704f960c664a1b69c81214e2bc66d689486c699747367317a91f2d48c796e7ca6bb7e466f4dc585122bcf9a224408a88537ce07615706171224c0c43173a1983557477e103a45d92da4519098a9a00737c4651aaa1c6b1677f7a797ec3f1930996f31fbea40b2e7d2c4fac9d0f050767459fa8d6d1732bef8e97e03f4e787759ad44a912c850313022b4280f2896a36cfc84ca0ce9ef8cb8dad16a7d3ded59b18a7c6923af18263f12e0e2464df0203010001a3423040300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604141f00bf46800afc7839b7a5b443d95650bbce963b300d06092a864886f70d01010c050003820201005e2bba749734445f764828408493ee016ee9a1b3d68025e67be4bc09913d0ffc76add7d43020bb8f60d091d61cf29cef781a2b943202c12496525202d0f3d1fcf29b396e99e11f8e43417d9a1e5bc95d9a84fc26e687f3747226ada41bd93d3b6a52a03c091e2f1e7bb333b445c7f7acb1af9360ad76aeb8b21578eb836aebffdb46ab24e5ee02fa901f59c02f5dd6b75da45c10b77253f8414eccfa781a254acafe85624361c3b437aa81d2f4d63a0fbd8d597e3047de2b6be72150335fd4679bd4b8679f3c279903ff85438e7312ca20cde861d5b166dc17d6396d0fdbcf2337a182894e1c6b3fd6a0cdaa079d3e4226aad70ceefa47bf1a527ed17581d3c98a62176d4f88a021a0263eaf6dd962301fe99828ae6e8dd58e4c726693808d2ae355c760679042565c22510fb3dc4e39ee4dddd91d7810543b6ed0976f03b51eb22373c612b29a64d0fc958524a8ffdfa1b0dc9140aedf0933abb9dd92b7f1cc91743b69eb67971b90bfe7c7a06f71bb57bfb78f5aed7a406a16cd80842d2fe102d4249443b315fc0c2b1bfd716ffccbbc75173a5e83d2c9b32f1bd59c8d7f54fe7e7ee456a387a79de1595294418f6d5bbe86959aff1a76dd40d2514a70b41f336323773fec271e59e40887ed34824a0f3ffea01dc1f56773458678f4aa29e92787c619dbc61314c33949874da097e06513f59d7756e9dab358c73af2c0cd82 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 UnifiedStub-installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 190000000100000010000000ea6089055218053dd01e37e1d806eedf0300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e0b00000001000000100000005300650063007400690067006f0000001d0000000100000010000000885010358d29a38f059b028559c95f901400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd253000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd9796254832000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd WeatherZero.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
CheatEngine75.tmpsaBSI.exeCheatEngine75.tmpUnifiedStub-installer.exeServiceHost.exepid process 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 3364 CheatEngine75.tmp 2612 saBSI.exe 2612 saBSI.exe 2612 saBSI.exe 2612 saBSI.exe 2612 saBSI.exe 2612 saBSI.exe 2612 saBSI.exe 2612 saBSI.exe 2612 saBSI.exe 2612 saBSI.exe 1420 CheatEngine75.tmp 1420 CheatEngine75.tmp 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 1796 UnifiedStub-installer.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe 6280 ServiceHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
cheatengine-x86_64-SSE4-AVX2.exepid process 1028 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
fltmc.exepid process 5924 fltmc.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
prod0.exeUnifiedStub-installer.exeWeatherZeroService.execheatengine-x86_64-SSE4-AVX2.exewevtutil.exefltmc.exewevtutil.exersWSC.exersWSC.exeWeatherZero.exeDotNetDataCollector32.exedescription pid process Token: SeDebugPrivilege 4328 prod0.exe Token: SeDebugPrivilege 1796 UnifiedStub-installer.exe Token: SeShutdownPrivilege 1796 UnifiedStub-installer.exe Token: SeCreatePagefilePrivilege 1796 UnifiedStub-installer.exe Token: SeTcbPrivilege 5040 WeatherZeroService.exe Token: SeDebugPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTcbPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTcbPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeLoadDriverPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeCreateGlobalPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeLockMemoryPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeSecurityPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTakeOwnershipPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeManageVolumePrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeBackupPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeCreatePagefilePrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeShutdownPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeRestorePrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeIncBasePriorityPrivilege 1028 cheatengine-x86_64-SSE4-AVX2.exe Token: SeDebugPrivilege 1796 UnifiedStub-installer.exe Token: SeSecurityPrivilege 6552 wevtutil.exe Token: SeBackupPrivilege 6552 wevtutil.exe Token: SeLoadDriverPrivilege 5924 fltmc.exe Token: SeSecurityPrivilege 6060 wevtutil.exe Token: SeBackupPrivilege 6060 wevtutil.exe Token: SeDebugPrivilege 3328 rsWSC.exe Token: SeDebugPrivilege 1984 rsWSC.exe Token: SeDebugPrivilege 6096 WeatherZero.exe Token: SeDebugPrivilege 7688 DotNetDataCollector32.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
CheatEngine75.tmpCheatEngine75.tmpcheatengine-x86_64-SSE4-AVX2.exeWeatherZero.exepid process 3364 CheatEngine75.tmp 1420 CheatEngine75.tmp 1028 cheatengine-x86_64-SSE4-AVX2.exe 6096 WeatherZero.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WeatherZero.exepid process 6096 WeatherZero.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
CheatEngine75.exeCheatEngine75.tmpCheatEngine75.exeCheatEngine75.tmpprod0.exengs5y5cm.exenet.exenet.exeUnifiedStub-installer.exesaBSI.exeinstaller.exeWZSetup.exeinstaller.exeregsvr32.exedescription pid process target process PID 408 wrote to memory of 3364 408 CheatEngine75.exe CheatEngine75.tmp PID 408 wrote to memory of 3364 408 CheatEngine75.exe CheatEngine75.tmp PID 408 wrote to memory of 3364 408 CheatEngine75.exe CheatEngine75.tmp PID 3364 wrote to memory of 4328 3364 CheatEngine75.tmp prod0.exe PID 3364 wrote to memory of 4328 3364 CheatEngine75.tmp prod0.exe PID 3364 wrote to memory of 2612 3364 CheatEngine75.tmp saBSI.exe PID 3364 wrote to memory of 2612 3364 CheatEngine75.tmp saBSI.exe PID 3364 wrote to memory of 2612 3364 CheatEngine75.tmp saBSI.exe PID 3364 wrote to memory of 4988 3364 CheatEngine75.tmp WZSetup.exe PID 3364 wrote to memory of 4988 3364 CheatEngine75.tmp WZSetup.exe PID 3364 wrote to memory of 4988 3364 CheatEngine75.tmp WZSetup.exe PID 3364 wrote to memory of 3652 3364 CheatEngine75.tmp CheatEngine75.exe PID 3364 wrote to memory of 3652 3364 CheatEngine75.tmp CheatEngine75.exe PID 3364 wrote to memory of 3652 3364 CheatEngine75.tmp CheatEngine75.exe PID 3652 wrote to memory of 1420 3652 CheatEngine75.exe CheatEngine75.tmp PID 3652 wrote to memory of 1420 3652 CheatEngine75.exe CheatEngine75.tmp PID 3652 wrote to memory of 1420 3652 CheatEngine75.exe CheatEngine75.tmp PID 1420 wrote to memory of 2800 1420 CheatEngine75.tmp net.exe PID 1420 wrote to memory of 2800 1420 CheatEngine75.tmp net.exe PID 4328 wrote to memory of 3560 4328 prod0.exe ngs5y5cm.exe PID 4328 wrote to memory of 3560 4328 prod0.exe ngs5y5cm.exe PID 4328 wrote to memory of 3560 4328 prod0.exe ngs5y5cm.exe PID 3560 wrote to memory of 1796 3560 ngs5y5cm.exe UnifiedStub-installer.exe PID 3560 wrote to memory of 1796 3560 ngs5y5cm.exe UnifiedStub-installer.exe PID 2800 wrote to memory of 1584 2800 net.exe net1.exe PID 2800 wrote to memory of 1584 2800 net.exe net1.exe PID 1420 wrote to memory of 3624 1420 CheatEngine75.tmp net.exe PID 1420 wrote to memory of 3624 1420 CheatEngine75.tmp net.exe PID 3624 wrote to memory of 2756 3624 net.exe net1.exe PID 3624 wrote to memory of 2756 3624 net.exe net1.exe PID 1420 wrote to memory of 4908 1420 CheatEngine75.tmp sc.exe PID 1420 wrote to memory of 4908 1420 CheatEngine75.tmp sc.exe PID 1420 wrote to memory of 924 1420 CheatEngine75.tmp sc.exe PID 1420 wrote to memory of 924 1420 CheatEngine75.tmp sc.exe PID 1420 wrote to memory of 1032 1420 CheatEngine75.tmp _setup64.tmp PID 1420 wrote to memory of 1032 1420 CheatEngine75.tmp _setup64.tmp PID 1420 wrote to memory of 3400 1420 CheatEngine75.tmp icacls.exe PID 1420 wrote to memory of 3400 1420 CheatEngine75.tmp icacls.exe PID 1796 wrote to memory of 4408 1796 UnifiedStub-installer.exe rsSyncSvc.exe PID 1796 wrote to memory of 4408 1796 UnifiedStub-installer.exe rsSyncSvc.exe PID 1420 wrote to memory of 2396 1420 CheatEngine75.tmp Kernelmoduleunloader.exe PID 1420 wrote to memory of 2396 1420 CheatEngine75.tmp Kernelmoduleunloader.exe PID 1420 wrote to memory of 2396 1420 CheatEngine75.tmp Kernelmoduleunloader.exe PID 1420 wrote to memory of 464 1420 CheatEngine75.tmp windowsrepair.exe PID 1420 wrote to memory of 464 1420 CheatEngine75.tmp windowsrepair.exe PID 1420 wrote to memory of 464 1420 CheatEngine75.tmp windowsrepair.exe PID 1420 wrote to memory of 3120 1420 CheatEngine75.tmp icacls.exe PID 1420 wrote to memory of 3120 1420 CheatEngine75.tmp icacls.exe PID 2612 wrote to memory of 2716 2612 saBSI.exe installer.exe PID 2612 wrote to memory of 2716 2612 saBSI.exe installer.exe PID 2716 wrote to memory of 2184 2716 installer.exe installer.exe PID 2716 wrote to memory of 2184 2716 installer.exe installer.exe PID 4988 wrote to memory of 1932 4988 WZSetup.exe WeatherZeroService.exe PID 4988 wrote to memory of 1932 4988 WZSetup.exe WeatherZeroService.exe PID 4988 wrote to memory of 1932 4988 WZSetup.exe WeatherZeroService.exe PID 4988 wrote to memory of 1116 4988 WZSetup.exe WeatherZeroService.exe PID 4988 wrote to memory of 1116 4988 WZSetup.exe WeatherZeroService.exe PID 4988 wrote to memory of 1116 4988 WZSetup.exe WeatherZeroService.exe PID 3364 wrote to memory of 4760 3364 CheatEngine75.tmp Cheat Engine.exe PID 3364 wrote to memory of 4760 3364 CheatEngine75.tmp Cheat Engine.exe PID 3364 wrote to memory of 4760 3364 CheatEngine75.tmp Cheat Engine.exe PID 2184 wrote to memory of 1440 2184 installer.exe regsvr32.exe PID 2184 wrote to memory of 1440 2184 installer.exe regsvr32.exe PID 1440 wrote to memory of 6548 1440 regsvr32.exe regsvr32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\is-94L76.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-94L76.tmp\CheatEngine75.tmp" /SL5="$A0220,29071676,832512,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod0.exe"C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod0.exe" -ip:"dui=ecb443ad-7c99-4a47-9f82-4d321990d32e&dit=20240827005313&is_silent=true&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100&b=&se=true" -vp:"dui=ecb443ad-7c99-4a47-9f82-4d321990d32e&dit=20240827005313&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100&oip=26&ptl=7&dta=true" -dp:"dui=ecb443ad-7c99-4a47-9f82-4d321990d32e&dit=20240827005313&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100" -i -v -d -se=true3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\ngs5y5cm.exe"C:\Users\Admin\AppData\Local\Temp\ngs5y5cm.exe" /silent4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\UnifiedStub-installer.exe.\UnifiedStub-installer.exe /silent5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe"C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -i -bn:ReasonLabs -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -dt:106⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.inf6⤵
- Adds Run key to start application
PID:6300 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r7⤵
- Checks processor information in registry
PID:6492 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o8⤵PID:6640
-
C:\Windows\system32\wevtutil.exe"C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngineEvents.xml6⤵
- Suspicious use of AdjustPrivilegeToken
PID:6552 -
C:\Windows\SYSTEM32\fltmc.exe"fltmc.exe" load rsKernelEngine6⤵
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5924 -
C:\Windows\system32\wevtutil.exe"C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\elam\evntdrv.xml6⤵
- Suspicious use of AdjustPrivilegeToken
PID:6060 -
C:\Program Files\ReasonLabs\EPP\rsWSC.exe"C:\Program Files\ReasonLabs\EPP\rsWSC.exe" -i6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod1_extract\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod1_extract\saBSI.exe" /affid 91082 PaidDistribution=true CountryCode=GB3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod1_extract\installer.exe"C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod1_extract\\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\McAfee\Temp2150065901\installer.exe"C:\Program Files\McAfee\Temp2150065901\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"6⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6548 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"6⤵
- Loads dropped DLL
- Modifies registry class
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod2_extract\WZSetup.exe"C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod2_extract\WZSetup.exe" /S /tpchannelid=1571 /distid=App1233⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe"C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe" install4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe"C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe" start silent4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\CheatEngine75.exe"C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\is-QC4PS.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-QC4PS.tmp\CheatEngine75.tmp" /SL5="$302BE,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SYSTEM32\net.exe"net" stop BadlionAntic5⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAntic6⤵PID:1584
-
C:\Windows\SYSTEM32\net.exe"net" stop BadlionAnticheat5⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAnticheat6⤵PID:2756
-
C:\Windows\SYSTEM32\sc.exe"sc" delete BadlionAntic5⤵
- Launches sc.exe
PID:4908 -
C:\Windows\SYSTEM32\sc.exe"sc" delete BadlionAnticheat5⤵
- Launches sc.exe
PID:924 -
C:\Users\Admin\AppData\Local\Temp\is-BGUQS.tmp\_isetup\_setup64.tmphelper 105 0x3AC5⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:3400 -
C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe"C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Program Files\Cheat Engine 7.5\windowsrepair.exe"C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s5⤵
- Executes dropped EXE
PID:464 -
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:3120 -
C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"4⤵
- Manipulates Digital Signatures
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1028 -
C:\Program Files\Cheat Engine 7.5\DotNetDataCollector32.exe"C:\Program Files\Cheat Engine 7.5\DotNetDataCollector32.exe" cedotnetpipe6096_2406959375⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 23243⤵
- Program crash
PID:6196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 22083⤵
- Program crash
PID:2036
-
C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe"C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -bn:ReasonLabs -dt:101⤵
- Executes dropped EXE
PID:732
-
C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe"C:\Program Files (x86)\WeatherZero\WeatherZeroService.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Program Files (x86)\WeatherZero\WeatherZero.exe"C:\Program Files (x86)\WeatherZero\WeatherZero.exe" /q=8B221CA52051A158FF9E115E672569562⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6096 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iu6x3nir.cmdline"3⤵
- System Location Discovery: System Language Discovery
PID:6624 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES466B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC466A.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:7040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3364 -ip 33641⤵PID:5388
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:6280 -
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7132 -
C:\Program Files\McAfee\WebAdvisor\updater.exe"C:\Program Files\McAfee\WebAdvisor\updater.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5456 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir "C:\Program Files (x86)\McAfee Security Scan" 2>nul2⤵PID:240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3364 -ip 33641⤵PID:7156
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:7764
-
C:\Program Files\ReasonLabs\EPP\rsWSC.exe"C:\Program Files\ReasonLabs\EPP\rsWSC.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Cheat Engine 7.5\Cheat Engine.exeFilesize
389KB
MD5f921416197c2ae407d53ba5712c3930a
SHA16a7daa7372e93c48758b9752c8a5a673b525632b
SHA256e31b233ddf070798cc0381cc6285f6f79ea0c17b99737f7547618dcfd36cdc0e
SHA5120139efb76c2107d0497be9910836d7c19329e4399aa8d46bbe17ae63d56ab73004c51b650ce38d79681c22c2d1b77078a7d7185431882baf3e7bef473ac95dce
-
C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exeFilesize
236KB
MD59af96706762298cf72df2a74213494c9
SHA14b5fd2f168380919524ecce77aa1be330fdef57a
SHA25665fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d
SHA51229a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4
-
C:\Program Files\Cheat Engine 7.5\allochook-i386.dllFilesize
328KB
MD519d52868c3e0b609dbeb68ef81f381a9
SHA1ce365bd4cf627a3849d7277bafbf2f5f56f496dc
SHA256b96469b310ba59d1db320a337b3a8104db232a4344a47a8e5ae72f16cc7b1ff4
SHA5125fbd53d761695de1dd6f0afd0964b33863764c89692345cab013c0b1b6332c24dcf766028f305cc87d864d17229d7a52bf19a299ca136a799053c368f21c8926
-
C:\Program Files\Cheat Engine 7.5\allochook-x86_64.dllFilesize
468KB
MD5daa81711ad1f1b1f8d96dc926d502484
SHA17130b241e23bede2b1f812d95fdb4ed5eecadbfd
SHA2568422be70e0ec59c962b35acf8ad80671bcc8330c9256e6e1ec5c07691388cd66
SHA5129eaa8e04ad7359a30d5e2f9256f94c1643d4c3f3c0dff24d6cd9e31a6f88cb3b470dd98f01f8b0f57bb947adc3d45c35749ed4877c7cbbbcc181145f0c361065
-
C:\Program Files\Cheat Engine 7.5\badassets\scoreboard.pngFilesize
5KB
MD55cff22e5655d267b559261c37a423871
SHA1b60ae22dfd7843dd1522663a3f46b3e505744b0f
SHA256a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9
SHA512e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50
-
C:\Program Files\Cheat Engine 7.5\ced3d10hook.dllFilesize
128KB
MD543dac1f3ca6b48263029b348111e3255
SHA19e399fddc2a256292a07b5c3a16b1c8bdd8da5c1
SHA256148f12445f11a50efbd23509139bf06a47d453e8514733b5a15868d10cc6e066
SHA5126e77a429923b503fc08895995eb8817e36145169c2937dacc2da92b846f45101846e98191aeb4f0f2f13fff05d0836aa658f505a04208188278718166c5e3032
-
C:\Program Files\Cheat Engine 7.5\ced3d10hook64.dllFilesize
140KB
MD50daf9f07847cceb0f0760bf5d770b8c1
SHA1992cc461f67acea58a866a78b6eefb0cbcc3aaa1
SHA256a2ac2ba27b0ed9acc3f0ea1bef9909a59169bc2eb16c979ef8e736a784bf2fa4
SHA512b4dda28721de88a372af39d4dfba6e612ce06cc443d6a6d636334865a9f8ca555591fb36d9829b54bc0fb27f486d4f216d50f68e1c2df067439fe8ebbf203b6a
-
C:\Program Files\Cheat Engine 7.5\ced3d11hook.dllFilesize
137KB
MD542e2bf4210f8126e3d655218bd2af2e4
SHA178efcb9138eb0c800451cf2bcc10e92a3adf5b72
SHA2561e30126badfffb231a605c6764dd98895208779ef440ea20015ab560263dd288
SHA512c985988d0832ce26337f774b160ac369f2957c306a1d82fbbffe87d9062ae5f3af3c1209768cd574182669cd4495dba26b6f1388814c0724a7812218b0b8dc74
-
C:\Program Files\Cheat Engine 7.5\ced3d11hook64.dllFilesize
146KB
MD50eaac872aadc457c87ee995bbf45a9c1
SHA15e9e9b98f40424ad5397fc73c13b882d75499d27
SHA2566f505cc5973687bbda1c2d9ac8a635d333f57c12067c54da7453d9448ab40b8f
SHA512164d1e6ef537d44ac4c0fd90d3c708843a74ac2e08fa2b3f0fdd4a180401210847e0f7bb8ec3056f5dc1d5a54d3239c59fb37914ce7742a4c0eb81578657d24b
-
C:\Program Files\Cheat Engine 7.5\ced3d9hook.dllFilesize
124KB
MD55f1a333671bf167730ed5f70c2c18008
SHA1c8233bbc6178ba646252c6566789b82a3296cab5
SHA256fd2a2b4fe4504c56347c35f24d566cc0510e81706175395d0a2ba26a013c4daf
SHA5126986d93e680b3776eb5700143fc35d60ca9dbbdf83498f8731c673f9fd77c8699a24a4849db2a273aa991b8289e4d6c3142bbde77e11f2faf603df43e8fea105
-
C:\Program Files\Cheat Engine 7.5\ced3d9hook64.dllFilesize
136KB
MD561ba5199c4e601fa6340e46bef0dff2d
SHA17c1a51d6d75b001ba1acde2acb0919b939b392c3
SHA2568783f06f7b123e16042bb0af91ff196b698d3cd2aa930e3ea97cfc553d9fc0f4
SHA5128ce180a622a5788bb66c5f3a4abfde62c858e86962f29091e9c157753088ddc826c67c51ff26567bfe2b75737897f14e6bb17ec89f52b525f6577097f1647d31
-
C:\Program Files\Cheat Engine 7.5\d3dhook.dllFilesize
119KB
MD52a2ebe526ace7eea5d58e416783d9087
SHA15dabe0f7586f351addc8afc5585ee9f70c99e6c4
SHA256e2a7df4c380667431f4443d5e5fc43964b76c8fcb9cf4c7db921c4140b225b42
SHA51294ed0038068abddd108f880df23422e21f9808ce04a0d14299aacc5d573521f52626c0c2752b314cda976f64de52c4d5bcac0158b37d43afb9bc345f31fdbbc0
-
C:\Program Files\Cheat Engine 7.5\d3dhook64.dllFilesize
131KB
MD52af7afe35ab4825e58f43434f5ae9a0f
SHA1b67c51cad09b236ae859a77d0807669283d6342f
SHA2567d82694094c1bbc586e554fa87a4b1ed6ebc9eb14902fd429824dcd501339722
SHA51223b7c6db0cb9c918ad9f28fa0e4e683c7e2495e89a136b75b7e1be6380591da61b6fb4f7248191f28fd3d80c4a391744a96434b4ab96b9531b5ebb0ec970b9d0
-
C:\Program Files\Cheat Engine 7.5\is-MQPKM.tmpFilesize
389KB
MD5e1922ec78c24533ff98477034d1a8998
SHA183c2820e7cd2f700fa8fba83dc80230d600fd31e
SHA25683c8a48ad945f916c5b66a29579401decf5d9306032c9562f52921d39820ccb5
SHA512e175793af96cdd48430f97bb1972e33b34be401e43981064549320d219a406032184238b5d00d453d2671d9ec993699f33543f627dd2c41e2322750647d3bb22
-
C:\Program Files\Cheat Engine 7.5\languages\language.iniFilesize
283B
MD5af5ed8f4fe5370516403ae39200f5a4f
SHA19299e9998a0605182683a58a5a6ab01a9b9bc037
SHA2564aa4f0b75548d45c81d8e876e2db1c74bddfd64091f102706d729b50a7af53a5
SHA512f070049a2fae3223861424e7fe79cbae6601c9bee6a56fadde4485ad3c597dc1f3687e720177ab28564a1faab52b6679e9315f74327d02aa1fb31e7b8233a80f
-
C:\Program Files\Cheat Engine 7.5\libipt-32.dllFilesize
157KB
MD5df443813546abcef7f33dd9fc0c6070a
SHA1635d2d453d48382824e44dd1e59d5c54d735ee2c
SHA256d14911c838620251f7f64c190b04bb8f4e762318cc763d993c9179376228d8ca
SHA5129f9bea9112d9db9bcecfc8e4800b7e8032efb240cbbddaf26c133b4ce12d27b47dc4e90bc339c561714bc972f6e809b2ec9c9e1facc6c223fbac66b089a14c25
-
C:\Program Files\Cheat Engine 7.5\libipt-64.dllFilesize
182KB
MD54a3b7c52ef32d936e3167efc1e920ae6
SHA1d5d8daa7a272547419132ddb6e666f7559dbac04
SHA25626ede848dba071eb76c0c0ef8e9d8ad1c53dfab47ca9137abc9d683032f06ebb
SHA51236d7f8a0a749de049a830cc8c8f0d3962d8dce57b445f5f3c771a86dd11aaa10da5f36f95e55d3dc90900e4dbddd0dcc21052c53aa11f939db691362c42e5312
-
C:\Program Files\Cheat Engine 7.5\luaclient-i386.dllFilesize
197KB
MD59f50134c8be9af59f371f607a6daa0b6
SHA16584b98172cbc4916a7e5ca8d5788493f85f24a7
SHA256dd07117ed80546f23d37f8023e992de560a1f55a76d1eb6dfd9d55baa5e3dad6
SHA5125ccafa2b0e2d20034168ee9a79e8efff64f12f5247f6772815ef4cb9ee56f245a06b088247222c5a3789ae2dcefadbc2c15df4ff5196028857f92b9992b094e0
-
C:\Program Files\Cheat Engine 7.5\luaclient-x86_64.dllFilesize
260KB
MD5dd71848b5bbd150e22e84238cf985af0
SHA135c7aa128d47710cfdb15bb6809a20dbd0f916d8
SHA256253d18d0d835f482e6abbaf716855580eb8fe789292c937301e4d60ead29531d
SHA5120cbf35c9d7b09fb57d8a9079eab726a3891393f12aee8b43e01d1d979509e755b74c0fb677f8f2dfab6b2e34a141f65d0cfbfe57bda0bf7482841ad31ace7790
-
C:\Program Files\Cheat Engine 7.5\overlay.fxFilesize
2KB
MD5650c02fc9f949d14d62e32dd7a894f5e
SHA1fa5399b01aadd9f1a4a5632f8632711c186ec0de
SHA256c4d23db8effb359b4aa4d1e1e480486fe3a4586ce8243397a94250627ba4f8cc
SHA512f2caaf604c271283fc7af3aa9674b9d647c4ac53dffca031dbf1220d3ed2e867943f5409a95f41c61d716879bed7c888735f43a068f1cc1452b4196d611cb76d
-
C:\Program Files\Cheat Engine 7.5\speedhack-i386.dllFilesize
200KB
MD56e00495955d4efaac2e1602eb47033ee
SHA195c2998d35adcf2814ec7c056bfbe0a0eb6a100c
SHA2565e24a5fe17ec001cab7118328a4bff0f2577bd057206c6c886c3b7fb98e0d6d9
SHA5122004d1def322b6dd7b129fe4fa7bbe5d42ab280b2e9e81de806f54313a7ed7231f71b62b6138ac767288fee796092f3397e5390e858e06e55a69b0d00f18b866
-
C:\Program Files\Cheat Engine 7.5\speedhack-x86_64.dllFilesize
256KB
MD519b2050b660a4f9fcb71c93853f2e79c
SHA15ffa886fa019fcd20008e8820a0939c09a62407a
SHA2565421b570fbc1165d7794c08279e311672dc4f42cb7ae1cbddcd7eea0b1136fff
SHA512a93e47387ab0d327b71c3045b3964c7586d0e03dddb2e692f6671fb99659e829591d5f23ce7a95683d82d239ba7d11fb5a123834629a53de5ce5dba6aa714a9a
-
C:\Program Files\Cheat Engine 7.5\vehdebug-i386.dllFilesize
324KB
MD5e9b5905d495a88adbc12c811785e72ec
SHA1ca0546646986aab770c7cf2e723c736777802880
SHA2563eb9cd27035d4193e32e271778643f3acb2ba73341d87fd8bb18d99af3dffdea
SHA5124124180b118149c25f8ea8dbbb2912b4bd56b43f695bf0ff9c6ccc95ade388f1be7d440a791d49e4d5c9c350ea113cf65f839a3c47d705533716acc53dd038f8
-
C:\Program Files\Cheat Engine 7.5\vehdebug-x86_64.dllFilesize
413KB
MD58d487547f1664995e8c47ec2ca6d71fe
SHA1d29255653ae831f298a54c6fa142fb64e984e802
SHA256f50baf9dc3cd6b925758077ec85708db2712999b9027cc632f57d1e6c588df21
SHA51279c230cfe8907df9da92607a2c1ace0523a36c3a13296cb0265329208edc453e293d7fbedbd5410decf81d20a7fe361fdebddadbc1dc63c96130b0bedf5b1d8a
-
C:\Program Files\Cheat Engine 7.5\windowsrepair.exeFilesize
262KB
MD59a4d1b5154194ea0c42efebeb73f318f
SHA1220f8af8b91d3c7b64140cbb5d9337d7ed277edb
SHA2562f3214f799b0f0a2f3955dbdc64c7e7c0e216f1a09d2c1ad5d0a99921782e363
SHA5126eef3254fc24079751fc8c38dda9a8e44840e5a4df1ff5adf076e4be87127075a7fea59ba7ef9b901aaf10eb64f881fc8fb306c2625140169665dd3991e5c25b
-
C:\Program Files\Cheat Engine 7.5\winhook-i386.dllFilesize
201KB
MD5de625af5cf4822db08035cc897f0b9f2
SHA14440b060c1fa070eb5d61ea9aadda11e4120d325
SHA2563cdb85ee83ef12802efdfc9314e863d4696be70530b31e7958c185fc4d6a9b38
SHA51219b22f43441e8bc72507be850a8154321c20b7351669d15af726145c0d34805c7df58f9dc64a29272a4811268308e503e9840f06e51ccdcb33afd61258339099
-
C:\Program Files\Cheat Engine 7.5\winhook-x86_64.dllFilesize
264KB
MD5f9c562b838a3c0620fb6ee46b20b554c
SHA15095f54be57622730698b5c92c61b124dfb3b944
SHA256e08b035d0a894d8bea64e67b1ed0bce27567d417eaaa133e8b231f8a939e581d
SHA512a20bc9a442c698c264fef82aa743d9f3873227d7d55cb908e282fa1f5dcff6b40c5b9ca7802576ef2f5a753fd1c534e9be69464b29af8efec8b019814b875296
-
C:\Program Files\McAfee\WebAdvisor\Analytics\dataConfig.cabFilesize
73KB
MD5bd4e67c9b81a9b805890c6e8537b9118
SHA1f471d69f9f5fbfb23ff7d3c38b5c5d5e5c5acf27
SHA256916f5e284237a9604115709a6274d54cb924b912b365c84322171872502d4bf8
SHA51292e1d4a8a93f0bf68fc17288cd1547b2bb9131b8378fbd1ed67a54963a8974717f772e722477417f4eb6c6bb0b3dfba4e7847b20655c3d451cba04f6134c3ab5
-
C:\Program Files\ReasonLabs\EPP\InstallerLib.dllFilesize
337KB
MD594833c0c365d5be20893f51584579eb9
SHA187ea6e20b3a902494050fa7b223d8b4eb4a11339
SHA25692ea32785a5ae730010b13f640ce313cb3e3704b190cf1d613478500d602d845
SHA512a3b3cd14aacdf4c2dda30b08e064dfd3c2734effb322a98eb64e53241f5a0a663472b36ac72e1477aa619bb7dd03cae8769973937e799cd44da97b0341a43837
-
C:\Program Files\ReasonLabs\EPP\Uninstall.exeFilesize
319KB
MD579638251b5204aa3929b8d379fa296bb
SHA19348e842ba18570d919f62fe0ed595ee7df3a975
SHA2565bedfd5630ddcd6ab6cc6b2a4904224a3cb4f4d4ff0a59985e34eea5cd8cf79d
SHA512ab234d5815b48555ddebc772fae5fa78a64a50053bdf08cc3db21c5f7d0e3154e0726dacfc3ea793a28765aea50c7a73011f880363cbc8d39a1c62e5ed20c5a9
-
C:\Program Files\ReasonLabs\EPP\mc.dllFilesize
1.1MB
MD588c54411a07bf5456c2da9f52c593a25
SHA1dbb538798294231a94378a3adff3ae9be9445a9e
SHA2562694f78a88a55106c7e7d5d15cda03322b029392175cb48ce96c327328a06b59
SHA5120710b6ba00f2ad161b27768ce978a375a16e9654128b41438a26662e269bc8b6937af02062cba43c8af1195e37091a17b279f8b07fa13198499ef03b546d3475
-
C:\Program Files\ReasonLabs\EPP\rsEngine.Core.dllFilesize
350KB
MD50cdb20df7079e4a281a049b7d48d77fa
SHA1449575e96e62be6ae3d9de2b15af663dc4f8ad38
SHA256df22ef68f5315f75837b4ddcf0588e5e85ffd56244b7b319554cafb83b334879
SHA5122872ad4167a861154f763c26a90f712e3292a84074f870ebe114c8925bc7d9522c0dc181f384933bbde915621d9bee78dc44603a7aa37fc21a22abb6ff605bf7
-
C:\Program Files\ReasonLabs\EPP\rsEngine.configFilesize
6KB
MD5e3ef0ebdb9f407b562241a348a8de12c
SHA1968fcfa84c2b11d428b5b97a66db37811ea74068
SHA2566b80aa802239642c55bc1d0f6d174dcd30d0d245b9f30f5f865b4c19bf324919
SHA512af75d6dd7b3cd47fa78f8c525a93e2373eb33bf597375559cc0d31904c681abcc15a6e48bc1c5b456e8c33f000155f7b28f57cfd9841f8d7395295718368fabf
-
C:\Program Files\ReasonLabs\EPP\rsWSC.InstallLogFilesize
606B
MD543fbbd79c6a85b1dfb782c199ff1f0e7
SHA1cad46a3de56cd064e32b79c07ced5abec6bc1543
SHA25619537ccffeb8552c0d4a8e0f22a859b4465de1723d6db139c73c885c00bd03e0
SHA51279b4f5dccd4f45d9b42623ebc7ee58f67a8386ce69e804f8f11441a04b941da9395aa791806bbc8b6ce9a9aa04127e93f6e720823445de9740a11a52370a92ea
-
C:\Program Files\ReasonLabs\EPP\ui\EPP.exeFilesize
2.2MB
MD55cb72bc9f5e2502e47a71fd03a4a2c06
SHA1f2cd06e894a77363b48a84e8c33a99a346262a52
SHA2568702b745f6208a95bea200fff308c7fd7bcaddfea6b22b7764b9298963b21d45
SHA5122877fcb12a903b9bfe53ddfc7cc906ca7eeb788e021ee972c603537a199a692e1e69bdccefe3a242c46a51eedf5b33cf0d879f4b59697f19ffeafb862f46ff78
-
C:\Program Files\ReasonLabs\EPP\x64\elam\rsElam.sysFilesize
19KB
MD58129c96d6ebdaebbe771ee034555bf8f
SHA19b41fb541a273086d3eef0ba4149f88022efbaff
SHA2568bcc210669bc5931a3a69fc63ed288cb74013a92c84ca0aba89e3f4e56e3ae51
SHA512ccd92987da4bda7a0f6386308611afb7951395158fc6d10a0596b0a0db4a61df202120460e2383d2d2f34cbb4d4e33e4f2e091a717d2fc1859ed7f58db3b7a18
-
C:\ProgramData\McAfee\WebAdvisor\LogicModule.dll\log_00200057003F001D0006.txtFilesize
1015B
MD589fc9bae38a65414478d19398f53e447
SHA1f4892098c4622de02aff022d98efceb02aff1dd4
SHA2562ade2516f1d06120b83c3756801c8faae1b89a5b0f4adc4046f7c4ec1b34b4c0
SHA5125617d45145af89be9031f5e22c9d6744410d50bac581dc81b21536c99fead162d29d970ad4b9d61219d900cc0404a3bfd9992df44bb24721a771de13f7f65dcd
-
C:\ProgramData\McAfee\WebAdvisor\LogicModule.dll\log_00200057003F001D0006.txtFilesize
1KB
MD59c8a170e5609b2c4b3a42bbb8cc19828
SHA15c85ac4f7cc309bb50dc944f2e5f4b7052adaaf6
SHA2561a1f29f8615ac0037d7fb4fc75f2edafb27f8591c1bdf695b1add3f2a82b67b7
SHA51246527abdaee6b0c6af6c99343bd8df94ea0b4dff5c3e30789e4092e7c2189becc2361930cf7a1110513c44bd1532a7d7a80665cabf8b5ad3d52204c124f0918e
-
C:\ProgramData\McAfee\WebAdvisor\ServiceHost.exe\log_00200057003F001D0006.txtFilesize
4KB
MD5c376a0791d68b2b4341538aa6e10304c
SHA165eb354035b18befa01907bbff9533fefa6db677
SHA2564afe2049d7eae2b1f4d9d99c09ceb76efbdb92488c264f2011aeb9194627f887
SHA512ae690368ad0ff26420ac845cf7c8bf3cbc20b9b65d69ae237123fff8097fd267b2bc0f7a0e3ac2605f6d4347ad13c231eead9548d7678be95c2da0f22068b657
-
C:\ProgramData\McAfee\WebAdvisor\TaskManager.dll\log_00200057003F001D0006.txtFilesize
3KB
MD503ba47ad78c99d5399e9c4e2f2140869
SHA1031b7366bd46d257b0f2aa3742aa5cbb267655a0
SHA2561f232a2ca950df9e82e5e5a26bb726d5b71d1062fd10ba59608624628d96b2f7
SHA512e37d40587434475948f2060562e47c0f291e7a0f69b4c7ee757cc9d048014f98a8c9ce1e80d4ea9a78c64adca3c4938da6da5153f3a89792bdd6864c2079429d
-
C:\ProgramData\McAfee\WebAdvisor\TaskManager.dll\log_00200057003F001D0006.txtFilesize
4KB
MD5f61b2a58a6e67f2f7daf83d974b4518c
SHA1453e1911e40cd18fbf2bbf817975154573e596ca
SHA256c47da4e57bbfbc0b68ae8ca42e7d0272920e5cedc8286be23f6927e19dd01e86
SHA512a30da583ebe1e00f0faf74904b8ca3e04ba1eff1f94c4bb960e52c5bf482d02df83bd2aa0997fa5f288fd107fcf37afd22940e4dba0e1a93af8705d3fa35a825
-
C:\ProgramData\McAfee\WebAdvisor\WATaskManager.dll\log_00200057003F001D0006.txtFilesize
3KB
MD5982b1fead230c95f5bffca914f3f98e2
SHA163fca45790d7ff3296d5e24bea6d8e3e44abe79a
SHA25693cdeea0aa1dba7e2ee0b8031480cbd67897a8df8841373729ff983cba8d8de2
SHA51211d04bcbe27e1f6dc0cf5bc1eef4a7d2a379e383c12b39be6b33431e9ccc85f5109ad445c7caa34a0e879307a210212b9b8b389390ead353df1e29deac6ac0af
-
C:\ProgramData\McAfee\WebAdvisor\WATaskManager.dll\log_00200057003F001D0006.txtFilesize
4KB
MD5ce45aaed98c0c492c9decf28c8f87a43
SHA11c596f1f825e08275d646ac457d75dcfecc54c43
SHA25622c0f4264f60f9680a6afe21bc61a1fe69cfbbd8825c2906710a2b9bb757fe8a
SHA512e620cbdd341bc4fe33040bf904bf74706e4941187b90c4e2a159019dd9b6a75a9e8869781447d75799fd72356691e28a79457f86260c907f96bdd689d4efcceb
-
C:\ProgramData\McAfee\WebAdvisor\updater.exe\log_00200057003F001D0006.txtFilesize
1KB
MD503d23ae05e953aecf035a9cc2d2846f2
SHA1f5a1d861e082907ba5a725babccdae76bf2b2cac
SHA256b8cb3fc4cad8c6c44ca645cf0cdc01a816986eb8f417b559d7d7b5eea7415599
SHA5124924494699c1aa6e7fa6900781fabacdda20d95b384f6c8d649b36347b2c4e7902f9ef0035788a192a33c3970f740fd41b57fa5223bf46bd114533629a446d2a
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\06cb3dc6-3d04-4a10-9d4f-9f42c6cbafdf\UnifiedStub-installer.exe\assembly\dl3\49405dbd\a8a4ea92_1bf8da01\rsServiceController.DLLFilesize
183KB
MD56ea512fef41805c032b44189d54120cb
SHA124a915d7bcf3ce54f2ecc0fe47281668012148ac
SHA25611b159b40201346571e0cfac60955d9fa4dd4b08cb8b1219b7d10b29689fe7eb
SHA5125b9f8f00aec998f57b8be4502b004704abecfde469967ce0626fd15bd265c60e98422b55d26b8825dc26773ab25a28a99416030daeb8810ae5150e52115f979a
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\06cb3dc6-3d04-4a10-9d4f-9f42c6cbafdf\UnifiedStub-installer.exe\assembly\dl3\4d755a12\a8a4ea92_1bf8da01\rsJSON.DLLFilesize
222KB
MD5f0439e58103c63c8aae325518e6201fd
SHA192bf7d2642c521c7c5f1c86749951cb969c569cb
SHA256a45597f694b22641bc89d170e4ef60a57244eca80e827f37196fb63a4c551c70
SHA5123f6130da5b5f04925e1c1a043b15e7c5f44450149f967249f2e550d32e5166fb2ec5f199e1afdf64ab6d1cf5cd243a9ae23d0a7a62f086fc728858d1c53db283
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\06cb3dc6-3d04-4a10-9d4f-9f42c6cbafdf\UnifiedStub-installer.exe\assembly\dl3\6cfca1f2\e27de392_1bf8da01\rsAtom.DLLFilesize
171KB
MD54a9556a6c10c20f2df0e7ca042c228fe
SHA14985bcba1fd78a42dade6c0606be86d3f6cabdd2
SHA256153bba87ae611a95e5be3dfb53021884413fa54bf950e65a6797b82297d06a50
SHA51269a413e08cde3b421882b4192ae5b3e540e23fe8132d5bf38b1c6a656e68fca7cfedfe302af8a31022b62ca2bc6a2424a04378d418c5ebbba076417e8bec61e7
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\06cb3dc6-3d04-4a10-9d4f-9f42c6cbafdf\UnifiedStub-installer.exe\assembly\dl3\97d236d7\a8a4ea92_1bf8da01\rsLogger.DLLFilesize
183KB
MD5107b5af3ae55b7bc20c41f54075ad02b
SHA1e97ea9f91f101a5b1cceb9631d8fe78e89540df2
SHA2561aa8b4d1b65ee9026c80c8c50ec8d0b2b91d0c6d61d23d10eda1f179e8752c3f
SHA512ab793fbdaddf95fe277c861186610df3946107c8088d8c298b13a20a70107d169836c67f9c5240f268eb63b6bbf3de13553400835562516f2b20e904f8b2efe0
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\Microsoft.Win32.TaskScheduler.dllFilesize
340KB
MD5e6a31390a180646d510dbba52c5023e6
SHA12ac7bac9afda5de2194ca71ee4850c81d1dabeca
SHA256cccc64ba9bbe3897c32f586b898f60ad0495b03a16ee3246478ee35e7f1063ec
SHA5129fd39169769b70a6befc6056d34740629fcf680c9ba2b7d52090735703d9599455c033394f233178ba352199015a384989acf1a48e6a5b765b4b33c5f2971d42
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\Newtonsoft.Json.dllFilesize
701KB
MD54f0f111120d0d8d4431974f70a1fdfe1
SHA1b81833ac06afc6b76fb73c0857882f5f6d2a4326
SHA256d043e6cde1f4d8396978cee2d41658b307be0ca4698c92333814505aa0ccab9a
SHA512e123d2f9f707eb31741ef8615235e714a20c6d754a13a97d0414c46961c3676025633eb1f65881b2d6d808ec06a70459c860411d6dd300231847b01ed0ce9750
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\UnifiedStub-installer.exeFilesize
1.0MB
MD5493d5868e37861c6492f3ac509bed205
SHA11050a57cf1d2a375e78cc8da517439b57a408f09
SHA256dc5bc92e51f06e9c66e3933d98dc8f8d217bc74b71f93d900e4d42b1fb5cc64f
SHA512e7e37075a1c389e0cad24ce2c899e89c4970e52b3f465d372a7bc171587ed1ee7d4f0a6ba44ab40b18fdf0689f4e29dfdbccbabb07e0f004ef2f894cb20d995d
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\rsAtom.dllFilesize
169KB
MD5dc15f01282dc0c87b1525f8792eaf34e
SHA1ad4fdf68a8cffedde6e81954473dcd4293553a94
SHA256cc036bcf74911fe5afb8e9fcc0d52b3f08b4961bcda4e50851eda4159b1c9998
SHA51254ee7b7a638d0defcff3a80f0c87705647b722d3d177bc11e80bfe6062a41f138ef99fc8e4c42337b61c0407469ef684b704f710b8ead92b83a14f609f0bc078
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\rsLogger.dllFilesize
182KB
MD51cfc3fc56fe40842094c7506b165573a
SHA1023b3b389fdfa7a9557623b2742f0f40e4784a5c
SHA256187da6a5ab64c9b814ab8e1775554688ad3842c3f52f5f318291b9a37d846aa2
SHA5126bd1ceaf12950d047a87fd2d9c1884c7ac6e45bd94f11be8df8144ddd3f71db096469d1c775cf1cb8bc7926f922e5a6676b759707053e2332aa66f86c951fbc0
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\rsStubLib.dllFilesize
271KB
MD53bcbeaab001f5d111d1db20039238753
SHA14a9c0048bbbf04aa9fe3dfb9ce3b959da5d960f8
SHA256897131dd2f9d1e08d66ae407fe25618c8affb99b6da54378521bf4403421b01a
SHA512de6cde3ad47e6f3982e089700f6184e147a61926f33ead4e2ff5b00926cfc55eb28be6f63eea53f7d15f555fd820453dd3211f0ba766cb3e939c14bb5e0cfc4c
-
C:\Users\Admin\AppData\Local\Temp\7zS8ED040E7\rsSyncSvc.exeFilesize
798KB
MD5f2738d0a3df39a5590c243025d9ecbda
SHA12c466f5307909fcb3e62106d99824898c33c7089
SHA2566d61ac8384128e2cf3dcd451a33abafab4a77ed1dd3b5a313a8a3aaec2b86d21
SHA5124b5ed5d80d224f9af1599e78b30c943827c947c3dc7ee18d07fe29b22c4e4ecdc87066392a03023a684c4f03adc8951bb5b6fb47de02fb7db380f13e48a7d872
-
C:\Users\Admin\AppData\Local\Temp\is-94L76.tmp\CheatEngine75.tmpFilesize
3.1MB
MD5349c57b17c961abbe59730d3cc5614b2
SHA132278b8621491e587a08f0764501b8b8314fd94c
SHA256de28f1f10d5136dc5b30ccb73750559cca91720533717e9398ee45a44c75481b
SHA51254d54d8b682c8cf9b06452a493e96307bfd9b8193f21e8eb5e89ad4420e1f6e066cf8bdeb70444ebcf2297520a4716ae1910124f21cab98e012f0fd19783c1f5
-
C:\Users\Admin\AppData\Local\Temp\is-BGUQS.tmp\_isetup\_setup64.tmpFilesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\CheatEngine75.exeFilesize
26.1MB
MD5e0f666fe4ff537fb8587ccd215e41e5f
SHA1d283f9b56c1e36b70a74772f7ca927708d1be76f
SHA256f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af
SHA5127f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\RAV_Cross.pngFilesize
74KB
MD5cd09f361286d1ad2622ba8a57b7613bd
SHA14cd3e5d4063b3517a950b9d030841f51f3c5f1b1
SHA256b92a31d4853d1b2c4e5b9d9624f40b439856d0c6a517e100978cbde8d3c47dc8
SHA512f73d60c92644e0478107e0402d1c7b4dfa1674f69b41856f74f937a7b57ceaa2b3be9242f2b59f1fcf71063aac6cbe16c594618d1a8cdd181510de3240f31dff
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\WeatherZero.pngFilesize
29KB
MD59ac6287111cb2b272561781786c46cdd
SHA16b02f2307ec17d9325523af1d27a6cb386c8f543
SHA256ab99cdb7d798cb7b7d8517584d546aa4ed54eca1b808de6d076710c8a400c8c4
SHA512f998a4e0ce14b3898a72e0b8a3f7154fc87d2070badcfa98582e3b570ca83a562d5a0c95f999a4b396619db42ab6269a2bac47702597c5a2c37177441723d837
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\WebAdvisor.pngFilesize
47KB
MD54cfff8dc30d353cd3d215fd3a5dbac24
SHA10f4f73f0dddc75f3506e026ef53c45c6fafbc87e
SHA2560c430e56d69435d8ab31cbb5916a73a47d11ef65b37d289ee7d11130adf25856
SHA5129d616f19c2496be6e89b855c41befc0235e3ce949d2b2ae7719c823f10be7fe0809bddfd93e28735b36271083dd802ae349b3ab7b60179b269d4a18c6cef4139
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\logo.pngFilesize
246KB
MD5f3d1b8cd125a67bafe54b8f31dda1ccd
SHA11c6b6bf1e785ad80fc7e9131a1d7acbba88e8303
SHA25621dfa1ff331794fcb921695134a3ba1174d03ee7f1e3d69f4b1a3581fccd2cdf
SHA512c57d36daa20b1827b2f8f9f98c9fd4696579de0de43f9bbeef63a544561a5f50648cc69220d9e8049164df97cb4b2176963089e14d58a6369d490d8c04354401
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod0.exeFilesize
32KB
MD5772d0e3c1adf91b0518a5c0e4900f012
SHA15799a831c5f9012d77f7496fe8635e5376feb115
SHA256500e7b419b7eedaa9bba3d810bde1e9e0eeeebadb45836188c675875ac805155
SHA5120ed88f53d12f8fee9b79763b7e0b3c48d19ff328e72589ccfcd3e5ab659b1f8e3d93970a9fee6c42ea411bdb4c79b404cf5135a1d102677d9ef2b2168ee71db5
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod1.zipFilesize
515KB
MD5f68008b70822bd28c82d13a289deb418
SHA106abbe109ba6dfd4153d76cd65bfffae129c41d8
SHA256cc6f4faf4e8a9f4d2269d1d69a69ea326f789620fb98078cc98597f3cb998589
SHA512fa482942e32e14011ae3c6762c638ccb0a0e8ec0055d2327c3acc381dddf1400de79e4e9321a39a418800d072e59c36b94b13b7eb62751d3aec990fb38ce9253
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod1_extract\installer.exeFilesize
25.9MB
MD5622b9844fcad806c124c810c1b852b51
SHA1123056b8bf5d09cba8a7dd3344277d1ba5500bac
SHA256f67b177ee10e72a7865b96de49591441def17f7d33015e673d91723f8b447566
SHA512f35ba8609990a7de7bd16e4cc2daf53c3f79badbb06c5770b8c39300624411e3aab743294d94ad987a4db7cb34447a85fea41344e5b5ebc2ed8beb192551ba9d
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod1_extract\saBSI.exeFilesize
1.1MB
MD5143255618462a577de27286a272584e1
SHA1efc032a6822bc57bcd0c9662a6a062be45f11acb
SHA256f5aa950381fbcea7d730aa794974ca9e3310384a95d6cf4d015fbdbd9797b3e4
SHA512c0a084d5c0b645e6a6479b234fa73c405f56310119dd7c8b061334544c47622fdd5139db9781b339bb3d3e17ac59fddb7d7860834ecfe8aad6d2ae8c869e1cb9
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod2.zipFilesize
5.9MB
MD57cc0288a2a8bbe014f9e344f3068c8f1
SHA1eb47d401ae30a308dd66bdcafde06cdd35e25c94
SHA256200e9bc4fcf2c6682ddc8c7f172a0d02befecd25ca882f66c6abc868a54b8975
SHA512869f0a01ef0bcbbfc501c1786e14bffeaa2daaa00210c312874fc67a724c77ef61394bb5854b9a02af654cd045c4d39ae30d73f1b4ec8aa9e531dfeea1714476
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\prod2_extract\WZSetup.exeFilesize
6.0MB
MD53c17f28cc001f6652377d3b5deec10f0
SHA1eeb13cf47836ff0a0d5cc380618f33e7818f9d75
SHA256fa352552306b80f3f897f8f21d8579ae642c97d12298e113ae1adc03902c69b8
SHA512240b31f29d439c09a56d3bf8d4a3ea14f75c2286e209e7df3f4ff301bfa3ad8228d7bebe01acea6f2f702a0ba7ecdb5583b97372725c77ef497e749740f644b3
-
C:\Users\Admin\AppData\Local\Temp\is-E5QQP.tmp\zbShieldUtils.dllFilesize
2.0MB
MD5b83f5833e96c2eb13f14dcca805d51a1
SHA19976b0a6ef3dabeab064b188d77d870dcdaf086d
SHA25600e667b838a4125c8cf847936168bb77bb54580bc05669330cb32c0377c4a401
SHA5128641b351e28b3c61ed6762adbca165f4a5f2ee26a023fd74dd2102a6258c0f22e91b78f4a3e9fba6094b68096001de21f10d6495f497580847103c428d30f7bb
-
C:\Users\Admin\AppData\Local\Temp\is-QC4PS.tmp\CheatEngine75.tmpFilesize
3.1MB
MD59aa2acd4c96f8ba03bb6c3ea806d806f
SHA19752f38cc51314bfd6d9acb9fb773e90f8ea0e15
SHA2561b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb
SHA512b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d
-
C:\Users\Admin\AppData\Local\Temp\ngs5y5cm.exeFilesize
2.4MB
MD540fe1033e69367bd66407989dfdc0465
SHA14dcd6b27f40d2bce4315986f38c18dfd2a60c3b6
SHA256c3d1e73daaf6e576d44753ee975d485cf795cb5f9261a6af0b2cc2c2cf03a287
SHA51260eafa4346684f5c8e49a3507407a8a8ee108d387bb693e81877d376673eb09717debf285a2daa4bccba49dfb436ac4d533c13c4bf78c25c5d71f20d34ff750b
-
C:\Users\Admin\AppData\Local\Temp\nsgD61D.tmp\INetC.dllFilesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
C:\Users\Admin\AppData\Local\Temp\nsgD61D.tmp\WeatherZeroNSISPlugin.dllFilesize
695KB
MD52eaf88651d6de968bf14ec9db52fd3b5
SHA11c37626526572fdb6378aa4bedbf7b941886a9a1
SHA256070190292df544da87f84dc8cf8ecc0a0337085a3fe744fa60ce00a6879b6146
SHA51215754a8f097f9c8d7bda65fb881720af5e4c4db1e35f555563b9bafe6426a6a0e50953a47f628fe3dc0f461e48abbf77db7c997902ff483cf33396d0d8e2cd17
-
memory/408-33-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/408-2-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/408-0-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/1420-1012-0x0000000000400000-0x000000000071B000-memory.dmpFilesize
3.1MB
-
memory/1796-4859-0x000002014E3C0000-0x000002014E3EE000-memory.dmpFilesize
184KB
-
memory/1796-278-0x00000201337D0000-0x0000020133800000-memory.dmpFilesize
192KB
-
memory/1796-299-0x000002014D9E0000-0x000002014DA0E000-memory.dmpFilesize
184KB
-
memory/1796-4823-0x000002014E3C0000-0x000002014E3F0000-memory.dmpFilesize
192KB
-
memory/1796-4874-0x000002014E570000-0x000002014E5A0000-memory.dmpFilesize
192KB
-
memory/1796-4794-0x000002014E4C0000-0x000002014E4FA000-memory.dmpFilesize
232KB
-
memory/1796-3142-0x000002014E460000-0x000002014E4B8000-memory.dmpFilesize
352KB
-
memory/1796-282-0x0000020135040000-0x0000020135062000-memory.dmpFilesize
136KB
-
memory/1796-281-0x000002014DAA0000-0x000002014DB52000-memory.dmpFilesize
712KB
-
memory/1796-310-0x000002014DD70000-0x000002014DDC8000-memory.dmpFilesize
352KB
-
memory/1796-3108-0x000002014E370000-0x000002014E3C0000-memory.dmpFilesize
320KB
-
memory/1796-276-0x0000020134FC0000-0x0000020135006000-memory.dmpFilesize
280KB
-
memory/1796-274-0x0000020133240000-0x000002013334C000-memory.dmpFilesize
1.0MB
-
memory/1984-4963-0x0000018A97E10000-0x0000018A97E32000-memory.dmpFilesize
136KB
-
memory/1984-4958-0x0000018AB0F60000-0x0000018AB12C6000-memory.dmpFilesize
3.4MB
-
memory/1984-4961-0x0000018AB0D70000-0x0000018AB0EEC000-memory.dmpFilesize
1.5MB
-
memory/1984-4962-0x0000018A97DF0000-0x0000018A97E0A000-memory.dmpFilesize
104KB
-
memory/2184-1163-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1181-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1180-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1179-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1187-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1186-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1194-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1192-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1330-0x00007FF7D4130000-0x00007FF7D4140000-memory.dmpFilesize
64KB
-
memory/2184-1326-0x00007FF7D4130000-0x00007FF7D4140000-memory.dmpFilesize
64KB
-
memory/2184-1323-0x00007FF78CD30000-0x00007FF78CD40000-memory.dmpFilesize
64KB
-
memory/2184-1320-0x00007FF7B94A0000-0x00007FF7B94B0000-memory.dmpFilesize
64KB
-
memory/2184-1309-0x00007FF7D4130000-0x00007FF7D4140000-memory.dmpFilesize
64KB
-
memory/2184-1298-0x00007FF7D4130000-0x00007FF7D4140000-memory.dmpFilesize
64KB
-
memory/2184-1296-0x00007FF7D4130000-0x00007FF7D4140000-memory.dmpFilesize
64KB
-
memory/2184-1284-0x00007FF7D4130000-0x00007FF7D4140000-memory.dmpFilesize
64KB
-
memory/2184-1282-0x00007FF7D4130000-0x00007FF7D4140000-memory.dmpFilesize
64KB
-
memory/2184-1266-0x00007FF7D4130000-0x00007FF7D4140000-memory.dmpFilesize
64KB
-
memory/2184-1262-0x00007FF7EDF10000-0x00007FF7EDF20000-memory.dmpFilesize
64KB
-
memory/2184-1251-0x00007FF7B0790000-0x00007FF7B07A0000-memory.dmpFilesize
64KB
-
memory/2184-1236-0x00007FF7EDF10000-0x00007FF7EDF20000-memory.dmpFilesize
64KB
-
memory/2184-1229-0x00007FF7E3530000-0x00007FF7E3540000-memory.dmpFilesize
64KB
-
memory/2184-1228-0x00007FF7B94A0000-0x00007FF7B94B0000-memory.dmpFilesize
64KB
-
memory/2184-1226-0x00007FF7B94A0000-0x00007FF7B94B0000-memory.dmpFilesize
64KB
-
memory/2184-1225-0x00007FF7B94A0000-0x00007FF7B94B0000-memory.dmpFilesize
64KB
-
memory/2184-1223-0x00007FF7B94A0000-0x00007FF7B94B0000-memory.dmpFilesize
64KB
-
memory/2184-1222-0x00007FF7B94A0000-0x00007FF7B94B0000-memory.dmpFilesize
64KB
-
memory/2184-1195-0x00007FF7981E0000-0x00007FF7981F0000-memory.dmpFilesize
64KB
-
memory/2184-1191-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1190-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1189-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1188-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1193-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1185-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1184-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1183-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1182-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1178-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1177-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1171-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1172-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1170-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1168-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1167-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1166-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1165-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1161-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1162-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/2184-1164-0x00007FF79FBB0000-0x00007FF79FBC0000-memory.dmpFilesize
64KB
-
memory/3328-4903-0x000001C5DA8D0000-0x000001C5DA8FE000-memory.dmpFilesize
184KB
-
memory/3328-4920-0x000001C5DC690000-0x000001C5DC6CC000-memory.dmpFilesize
240KB
-
memory/3328-4919-0x000001C5DAD60000-0x000001C5DAD72000-memory.dmpFilesize
72KB
-
memory/3328-4906-0x000001C5DA8D0000-0x000001C5DA8FE000-memory.dmpFilesize
184KB
-
memory/3364-44-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-1021-0x0000000002F30000-0x0000000003070000-memory.dmpFilesize
1.2MB
-
memory/3364-2601-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-6-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-38-0x0000000002F30000-0x0000000003070000-memory.dmpFilesize
1.2MB
-
memory/3364-65-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-319-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-43-0x0000000002F30000-0x0000000003070000-memory.dmpFilesize
1.2MB
-
memory/3364-39-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-25-0x0000000002F30000-0x0000000003070000-memory.dmpFilesize
1.2MB
-
memory/3364-26-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-30-0x0000000002F30000-0x0000000003070000-memory.dmpFilesize
1.2MB
-
memory/3364-31-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-32-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3364-34-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/3652-1013-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/3652-138-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/4328-64-0x0000024531960000-0x0000024531968000-memory.dmpFilesize
32KB
-
memory/4328-66-0x00007FFEE2493000-0x00007FFEE2495000-memory.dmpFilesize
8KB
-
memory/4328-67-0x000002454C4F0000-0x000002454CA18000-memory.dmpFilesize
5.2MB
-
memory/7764-4957-0x000000001B650000-0x000000001B786000-memory.dmpFilesize
1.2MB
-
memory/7764-4956-0x000000001AF40000-0x000000001B314000-memory.dmpFilesize
3.8MB
-
memory/7764-4955-0x000000001AB20000-0x000000001AB40000-memory.dmpFilesize
128KB