Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/09/2024, 16:22

240908-tvd9hsyamh 8

Analysis

  • max time kernel
    433s
  • max time network
    436s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 16:22

General

  • Target

    https://d1vdn3r1396bak.cloudfront.net/installer/796586719579254982/8057286

Malware Config

Signatures

  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 10 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 40 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 21 IoCs
  • Runs net.exe
  • Script User-Agent 4 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://d1vdn3r1396bak.cloudfront.net/installer/796586719579254982/8057286
    1⤵
      PID:3396
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4328,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:1
      1⤵
        PID:5636
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4520,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=3856 /prefetch:1
        1⤵
          PID:5204
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5128,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=4992 /prefetch:8
          1⤵
            PID:1544
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5308,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=5344 /prefetch:8
            1⤵
              PID:2896
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=6084,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6104 /prefetch:1
              1⤵
                PID:1888
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=6352,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:1
                1⤵
                  PID:3120
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6428,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6532 /prefetch:1
                  1⤵
                    PID:3400
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=5784,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6120 /prefetch:8
                    1⤵
                      PID:1340
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6704,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6728 /prefetch:1
                      1⤵
                        PID:5336
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6316,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6424 /prefetch:8
                        1⤵
                          PID:5588
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --field-trial-handle=4888,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6784 /prefetch:8
                          1⤵
                            PID:5692
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --field-trial-handle=4728,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6476 /prefetch:1
                            1⤵
                              PID:4816
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {24AC8F2B-4D4A-4C17-9607-6A4B14068F97} -Embedding
                              1⤵
                                PID:5684
                              • C:\Windows\SysWOW64\DllHost.exe
                                C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:5208
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                1⤵
                                • Modifies Internet Explorer settings
                                • Modifies registry class
                                PID:5068
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=7548,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=7384 /prefetch:8
                                1⤵
                                  PID:2272
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6784,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6492 /prefetch:8
                                  1⤵
                                    PID:2688
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultc22cab61hc24bh4645h9152h3a2925451ea7
                                    1⤵
                                      PID:4048
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                      1⤵
                                      • Drops desktop.ini file(s)
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      PID:1444
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --field-trial-handle=6756,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6764 /prefetch:1
                                      1⤵
                                        PID:4028
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --field-trial-handle=7336,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=7348 /prefetch:1
                                        1⤵
                                          PID:1904
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --field-trial-handle=6828,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=6404 /prefetch:1
                                          1⤵
                                            PID:2256
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --field-trial-handle=6596,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=7764 /prefetch:1
                                            1⤵
                                              PID:3076
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --field-trial-handle=7948,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=7944 /prefetch:1
                                              1⤵
                                                PID:2984
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --field-trial-handle=8124,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=8084 /prefetch:8
                                                1⤵
                                                  PID:5420
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --field-trial-handle=8144,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=8268 /prefetch:8
                                                  1⤵
                                                  • Modifies registry class
                                                  PID:4504
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --field-trial-handle=7644,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=7600 /prefetch:1
                                                  1⤵
                                                    PID:3128
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --field-trial-handle=8336,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=8316 /prefetch:1
                                                    1⤵
                                                      PID:2572
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=7424,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=8396 /prefetch:8
                                                      1⤵
                                                        PID:2964
                                                      • C:\Users\Admin\Downloads\MBSetup.exe
                                                        "C:\Users\Admin\Downloads\MBSetup.exe"
                                                        1⤵
                                                        • Drops file in Drivers directory
                                                        • Checks BIOS information in registry
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:5156
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --field-trial-handle=7656,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=5232 /prefetch:8
                                                        1⤵
                                                          PID:3876
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --field-trial-handle=7656,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=5232 /prefetch:8
                                                          1⤵
                                                            PID:4508
                                                          • C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe
                                                            "C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe"
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:5196
                                                          • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                            "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\SelectImport.docx" /o ""
                                                            1⤵
                                                            • Checks processor information in registry
                                                            • Enumerates system info in registry
                                                            • Suspicious behavior: AddClipboardFormatListener
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:4128
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:3184
                                                            • C:\Users\Admin\Downloads\CheatEngine75.exe
                                                              "C:\Users\Admin\Downloads\CheatEngine75.exe"
                                                              1⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:5212
                                                              • C:\Users\Admin\AppData\Local\Temp\is-FITKV.tmp\CheatEngine75.tmp
                                                                "C:\Users\Admin\AppData\Local\Temp\is-FITKV.tmp\CheatEngine75.tmp" /SL5="$4031A,29071676,832512,C:\Users\Admin\Downloads\CheatEngine75.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4104
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window
                                                              1⤵
                                                              • Enumerates system info in registry
                                                              • Modifies data under HKEY_USERS
                                                              • Modifies registry class
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:3896
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x238,0x23c,0x240,0x234,0x260,0x7ff9c6eed198,0x7ff9c6eed1a4,0x7ff9c6eed1b0
                                                                2⤵
                                                                  PID:4684
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2276,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=2272 /prefetch:2
                                                                  2⤵
                                                                    PID:1668
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1924,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=2312 /prefetch:3
                                                                    2⤵
                                                                      PID:3588
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2508,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=2484 /prefetch:8
                                                                      2⤵
                                                                        PID:1392
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4460,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=4492 /prefetch:8
                                                                        2⤵
                                                                          PID:852
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4460,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=4492 /prefetch:8
                                                                          2⤵
                                                                            PID:2096
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4116,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=4720 /prefetch:8
                                                                            2⤵
                                                                              PID:5956
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4212,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=4804 /prefetch:8
                                                                              2⤵
                                                                                PID:5308
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4160,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=2140 /prefetch:8
                                                                                2⤵
                                                                                  PID:4356
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4608,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=4872 /prefetch:8
                                                                                  2⤵
                                                                                    PID:4628
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --field-trial-handle=3840,i,9930160630787108300,6741939771026093150,262144 --variations-seed-version --mojo-platform-channel-handle=3868 /prefetch:8
                                                                                    2⤵
                                                                                      PID:5464
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"
                                                                                    1⤵
                                                                                      PID:1008
                                                                                    • C:\Users\Admin\Downloads\CheatEngine75.exe
                                                                                      "C:\Users\Admin\Downloads\CheatEngine75.exe"
                                                                                      1⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2388
                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-ULGGM.tmp\CheatEngine75.tmp
                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-ULGGM.tmp\CheatEngine75.tmp" /SL5="$80364,29071676,832512,C:\Users\Admin\Downloads\CheatEngine75.exe"
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:3592
                                                                                    • C:\Windows\system32\taskmgr.exe
                                                                                      "C:\Windows\system32\taskmgr.exe" /0
                                                                                      1⤵
                                                                                      • Checks SCSI registry key(s)
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      • Suspicious use of SendNotifyMessage
                                                                                      PID:5508
                                                                                    • C:\Users\Admin\Downloads\CheatEngine75.exe
                                                                                      "C:\Users\Admin\Downloads\CheatEngine75.exe"
                                                                                      1⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:5608
                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-VVJJ5.tmp\CheatEngine75.tmp
                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-VVJJ5.tmp\CheatEngine75.tmp" /SL5="$5031A,29071676,832512,C:\Users\Admin\Downloads\CheatEngine75.exe"
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Checks for any installed AV software in registry
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Checks processor information in registry
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:5644
                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-0QCGN.tmp\CheatEngine75.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-0QCGN.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:5492
                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-Q93J6.tmp\CheatEngine75.tmp
                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-Q93J6.tmp\CheatEngine75.tmp" /SL5="$303F4,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-0QCGN.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in Program Files directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Modifies registry class
                                                                                            PID:5888
                                                                                            • C:\Windows\SYSTEM32\net.exe
                                                                                              "net" stop BadlionAntic
                                                                                              5⤵
                                                                                                PID:3840
                                                                                                • C:\Windows\system32\net1.exe
                                                                                                  C:\Windows\system32\net1 stop BadlionAntic
                                                                                                  6⤵
                                                                                                    PID:4144
                                                                                                • C:\Windows\SYSTEM32\net.exe
                                                                                                  "net" stop BadlionAnticheat
                                                                                                  5⤵
                                                                                                    PID:3352
                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                      C:\Windows\system32\net1 stop BadlionAnticheat
                                                                                                      6⤵
                                                                                                        PID:2912
                                                                                                    • C:\Windows\SYSTEM32\sc.exe
                                                                                                      "sc" delete BadlionAntic
                                                                                                      5⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:1088
                                                                                                    • C:\Windows\SYSTEM32\sc.exe
                                                                                                      "sc" delete BadlionAnticheat
                                                                                                      5⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:4000
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-B2ST3.tmp\_isetup\_setup64.tmp
                                                                                                      helper 105 0x45C
                                                                                                      5⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:5652
                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                      "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                                                                                                      5⤵
                                                                                                      • Modifies file permissions
                                                                                                      PID:3000
                                                                                                    • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe
                                                                                                      "C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP
                                                                                                      5⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:1624
                                                                                                    • C:\Program Files\Cheat Engine 7.5\windowsrepair.exe
                                                                                                      "C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s
                                                                                                      5⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:2180
                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                      "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                                                                                                      5⤵
                                                                                                      • Modifies file permissions
                                                                                                      PID:2464
                                                                                                • C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe
                                                                                                  "C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"
                                                                                                  3⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1440
                                                                                                  • C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe
                                                                                                    "C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"
                                                                                                    4⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • Drops file in System32 directory
                                                                                                    • Drops file in Program Files directory
                                                                                                    • Drops file in Windows directory
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:980

                                                                                            Network

                                                                                            MITRE ATT&CK Enterprise v15

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe

                                                                                              Filesize

                                                                                              389KB

                                                                                              MD5

                                                                                              f921416197c2ae407d53ba5712c3930a

                                                                                              SHA1

                                                                                              6a7daa7372e93c48758b9752c8a5a673b525632b

                                                                                              SHA256

                                                                                              e31b233ddf070798cc0381cc6285f6f79ea0c17b99737f7547618dcfd36cdc0e

                                                                                              SHA512

                                                                                              0139efb76c2107d0497be9910836d7c19329e4399aa8d46bbe17ae63d56ab73004c51b650ce38d79681c22c2d1b77078a7d7185431882baf3e7bef473ac95dce

                                                                                            • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe

                                                                                              Filesize

                                                                                              236KB

                                                                                              MD5

                                                                                              9af96706762298cf72df2a74213494c9

                                                                                              SHA1

                                                                                              4b5fd2f168380919524ecce77aa1be330fdef57a

                                                                                              SHA256

                                                                                              65fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d

                                                                                              SHA512

                                                                                              29a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4

                                                                                            • C:\Program Files\Cheat Engine 7.5\allochook-i386.dll

                                                                                              Filesize

                                                                                              328KB

                                                                                              MD5

                                                                                              19d52868c3e0b609dbeb68ef81f381a9

                                                                                              SHA1

                                                                                              ce365bd4cf627a3849d7277bafbf2f5f56f496dc

                                                                                              SHA256

                                                                                              b96469b310ba59d1db320a337b3a8104db232a4344a47a8e5ae72f16cc7b1ff4

                                                                                              SHA512

                                                                                              5fbd53d761695de1dd6f0afd0964b33863764c89692345cab013c0b1b6332c24dcf766028f305cc87d864d17229d7a52bf19a299ca136a799053c368f21c8926

                                                                                            • C:\Program Files\Cheat Engine 7.5\allochook-x86_64.dll

                                                                                              Filesize

                                                                                              468KB

                                                                                              MD5

                                                                                              daa81711ad1f1b1f8d96dc926d502484

                                                                                              SHA1

                                                                                              7130b241e23bede2b1f812d95fdb4ed5eecadbfd

                                                                                              SHA256

                                                                                              8422be70e0ec59c962b35acf8ad80671bcc8330c9256e6e1ec5c07691388cd66

                                                                                              SHA512

                                                                                              9eaa8e04ad7359a30d5e2f9256f94c1643d4c3f3c0dff24d6cd9e31a6f88cb3b470dd98f01f8b0f57bb947adc3d45c35749ed4877c7cbbbcc181145f0c361065

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\addtonewgroup.lua

                                                                                              Filesize

                                                                                              1KB

                                                                                              MD5

                                                                                              3e20f1013fb48a67fe59bede7b8e341b

                                                                                              SHA1

                                                                                              8c8a4cb49c3b29db2c47f84aafd0416101722bfe

                                                                                              SHA256

                                                                                              96e4429192f9ab26f8bf9f9429f36b388aa69c3624781c61ea6df7e1bca9b49b

                                                                                              SHA512

                                                                                              99cf3f88c8b06da0dbe8085dee796bec7a9533990a55fbce7524a4f941b5ecf0e8ec975a4b032eb2aaabd116c0804995a75036c98a5e4058f25d78d08a11f3f2

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\alternateSpeedhack.LUA

                                                                                              Filesize

                                                                                              7KB

                                                                                              MD5

                                                                                              459b793e0dc43a993f03d8b612f67cec

                                                                                              SHA1

                                                                                              f14ae9afbe97af534a11bf98ac1cc096269f1474

                                                                                              SHA256

                                                                                              e2cbb4c2f46305bb07d84222231012fd4c800fe8e1b43e0aa1af9b6c5d111f7f

                                                                                              SHA512

                                                                                              1740068e3419d153ecbd9d1a6aada20aabe71915e7422dce1a83e616e8d2a1084922a81741591a682531e1f8146e437d8688521c7707a4909e5721768a3f956e

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\autosave.lua

                                                                                              Filesize

                                                                                              9KB

                                                                                              MD5

                                                                                              40d6bfe593194cf938e19622a3c13a5e

                                                                                              SHA1

                                                                                              761257e8ef492431cf0e04dbca396fabb25fe1ae

                                                                                              SHA256

                                                                                              c4cef60489b067c8e7abcdd5594643a27d0720b21523753dd462d53024287116

                                                                                              SHA512

                                                                                              1d1aaa9de74b0bb08cc4ceced5dbfa4c589347eac098d7ae013d5a1beaae0eeaca4d314e2591560c6df14a93dd4e9316ca317d21efadcca57d11eee72f4c6e16

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\bigendian.lua

                                                                                              Filesize

                                                                                              7KB

                                                                                              MD5

                                                                                              e76fcd2ecd5b956d4579a676aa3eea01

                                                                                              SHA1

                                                                                              49ecba5ccc531a40ad7805a126d38b44b4a36576

                                                                                              SHA256

                                                                                              0339ba0043af5c058cf3a19de9f90312d18f6bb2728f454ef403b531bd57ae42

                                                                                              SHA512

                                                                                              8443c213d4a626a358631f76a0cc4c106543ce58c94d34a96b88574b3e32ae742f28878b259a17823ca07ec521b06e32e572e7bc77e10951bc0984b07c0571c6

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\ceshare\ceshare_account.lua

                                                                                              Filesize

                                                                                              6KB

                                                                                              MD5

                                                                                              0b5180bd64689788ebeaa8e705a264ac

                                                                                              SHA1

                                                                                              43a5cc401ee6c4ff4a94697112b1bc1d4345fc19

                                                                                              SHA256

                                                                                              8fd38a5e6c0408ca77e0e7a0ee179b4391758ec6da94ea289e3a2cbc1ab1ec59

                                                                                              SHA512

                                                                                              cc26e2e36b93bf89aa16c744b2db60d855de616db7a67f4fb24135545104459338c3edeab42bb316b1ecb0db9e31970b1415a1bf638ea3e53ae31471330aeadb

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\ceshare\ceshare_comments.lua

                                                                                              Filesize

                                                                                              3KB

                                                                                              MD5

                                                                                              0d4d1b597712015ef1b0ec8adc26495f

                                                                                              SHA1

                                                                                              3584779c06619f545b47a27703aa2f47455d50de

                                                                                              SHA256

                                                                                              89c8fccc16d2aa0a3004dc1b477a5c1dcbba539769b2a4558f7c7d9b9809b133

                                                                                              SHA512

                                                                                              ae26bbb2c3f74c143a01ec3b296a26699c679d51bc68c8c7b8c460616d1a0aa065500ebca83e972a720bd7a3c5a7b63a673eaecef1391a2e717208ef8da0796f

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\ceshare\ceshare_fulltablelist.lua

                                                                                              Filesize

                                                                                              12KB

                                                                                              MD5

                                                                                              665bb2e55e2a13157d1dbfef05d1b905

                                                                                              SHA1

                                                                                              408fea33f574bd0fa9e4cb71958363398e0699bc

                                                                                              SHA256

                                                                                              da6ecce3db7d305813ffe80ca994663d43f1068f0fb67399a4c66d1f28684bfa

                                                                                              SHA512

                                                                                              8fe95e22680e1e802d0ceeecbbd6b098526468b8cf4d838301d2833247d94e4f3b3a4b76a68f9faaa2177b42ff2ffea2df46ef56a4a0ce501d126135ce8ee985

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\ceshare\ceshare_permissions.lua

                                                                                              Filesize

                                                                                              3KB

                                                                                              MD5

                                                                                              65c8d4eddfe05267a72eae3ddb2cf02a

                                                                                              SHA1

                                                                                              eef2928d355c8b669f8854da37162ba1fe32740a

                                                                                              SHA256

                                                                                              15b0c7682e5e8d2e2c2b8cb00c0c03b7dfa9439ac80c37f8e96a4f86652246f9

                                                                                              SHA512

                                                                                              1c151d5a44482362430fbc6ed4550671ad96e768942e4ec2a4c487182bed9d0326a0d40a1ac43f2c8a3de1e18e33b055ce7126d80fee9b5b7091ed83a22a41ad

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\ceshare\ceshare_processlistextention.lua

                                                                                              Filesize

                                                                                              9KB

                                                                                              MD5

                                                                                              607a7c1ab93026d94916f21779d0d645

                                                                                              SHA1

                                                                                              3d5a64b256fc44086e6e190ea0bc45b5999e1979

                                                                                              SHA256

                                                                                              ea61eea6289c2feba7b7d0cc24db5277e383102f24784e6bf7254af41829599c

                                                                                              SHA512

                                                                                              d6749e2dbe46466a1cb1c464ce3f237836ef6b572ef897c7f5c9d12f80a6c0c7a5dfea54c3499a91e14b29c8bbf0809cce433c379f9e5dc0072e436f641c59ad

                                                                                            • C:\Program Files\Cheat Engine 7.5\autorun\ceshare\ceshare_publish.lua

                                                                                              Filesize

                                                                                              20KB

                                                                                              MD5

                                                                                              87cd08b16891e0dbe3d47bb71ca91691

                                                                                              SHA1

                                                                                              55d98338b4aa0df3566cd2e721b3d3f86a3836aa

                                                                                              SHA256

                                                                                              6bfd35aa64ab566ddb68d0675ad3b4a093649010a9c30df3a30a7f9dc2ed7702

                                                                                              SHA512

                                                                                              847becf1d3066a3e185001035b68496b91876bdeb323734782c41fc9b2bdf665bf33c728cebbe78e820654d87b1969c09b5d1faed7498538cb5f761984108614

                                                                                            • C:\Program Files\Cheat Engine 7.5\badassets\scoreboard.png

                                                                                              Filesize

                                                                                              5KB

                                                                                              MD5

                                                                                              5cff22e5655d267b559261c37a423871

                                                                                              SHA1

                                                                                              b60ae22dfd7843dd1522663a3f46b3e505744b0f

                                                                                              SHA256

                                                                                              a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9

                                                                                              SHA512

                                                                                              e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50

                                                                                            • C:\Program Files\Cheat Engine 7.5\ced3d10hook.dll

                                                                                              Filesize

                                                                                              128KB

                                                                                              MD5

                                                                                              43dac1f3ca6b48263029b348111e3255

                                                                                              SHA1

                                                                                              9e399fddc2a256292a07b5c3a16b1c8bdd8da5c1

                                                                                              SHA256

                                                                                              148f12445f11a50efbd23509139bf06a47d453e8514733b5a15868d10cc6e066

                                                                                              SHA512

                                                                                              6e77a429923b503fc08895995eb8817e36145169c2937dacc2da92b846f45101846e98191aeb4f0f2f13fff05d0836aa658f505a04208188278718166c5e3032

                                                                                            • C:\Program Files\Cheat Engine 7.5\ced3d10hook64.dll

                                                                                              Filesize

                                                                                              140KB

                                                                                              MD5

                                                                                              0daf9f07847cceb0f0760bf5d770b8c1

                                                                                              SHA1

                                                                                              992cc461f67acea58a866a78b6eefb0cbcc3aaa1

                                                                                              SHA256

                                                                                              a2ac2ba27b0ed9acc3f0ea1bef9909a59169bc2eb16c979ef8e736a784bf2fa4

                                                                                              SHA512

                                                                                              b4dda28721de88a372af39d4dfba6e612ce06cc443d6a6d636334865a9f8ca555591fb36d9829b54bc0fb27f486d4f216d50f68e1c2df067439fe8ebbf203b6a

                                                                                            • C:\Program Files\Cheat Engine 7.5\ced3d11hook.dll

                                                                                              Filesize

                                                                                              137KB

                                                                                              MD5

                                                                                              42e2bf4210f8126e3d655218bd2af2e4

                                                                                              SHA1

                                                                                              78efcb9138eb0c800451cf2bcc10e92a3adf5b72

                                                                                              SHA256

                                                                                              1e30126badfffb231a605c6764dd98895208779ef440ea20015ab560263dd288

                                                                                              SHA512

                                                                                              c985988d0832ce26337f774b160ac369f2957c306a1d82fbbffe87d9062ae5f3af3c1209768cd574182669cd4495dba26b6f1388814c0724a7812218b0b8dc74

                                                                                            • C:\Program Files\Cheat Engine 7.5\ced3d11hook64.dll

                                                                                              Filesize

                                                                                              146KB

                                                                                              MD5

                                                                                              0eaac872aadc457c87ee995bbf45a9c1

                                                                                              SHA1

                                                                                              5e9e9b98f40424ad5397fc73c13b882d75499d27

                                                                                              SHA256

                                                                                              6f505cc5973687bbda1c2d9ac8a635d333f57c12067c54da7453d9448ab40b8f

                                                                                              SHA512

                                                                                              164d1e6ef537d44ac4c0fd90d3c708843a74ac2e08fa2b3f0fdd4a180401210847e0f7bb8ec3056f5dc1d5a54d3239c59fb37914ce7742a4c0eb81578657d24b

                                                                                            • C:\Program Files\Cheat Engine 7.5\ced3d9hook.dll

                                                                                              Filesize

                                                                                              124KB

                                                                                              MD5

                                                                                              5f1a333671bf167730ed5f70c2c18008

                                                                                              SHA1

                                                                                              c8233bbc6178ba646252c6566789b82a3296cab5

                                                                                              SHA256

                                                                                              fd2a2b4fe4504c56347c35f24d566cc0510e81706175395d0a2ba26a013c4daf

                                                                                              SHA512

                                                                                              6986d93e680b3776eb5700143fc35d60ca9dbbdf83498f8731c673f9fd77c8699a24a4849db2a273aa991b8289e4d6c3142bbde77e11f2faf603df43e8fea105

                                                                                            • C:\Program Files\Cheat Engine 7.5\ced3d9hook64.dll

                                                                                              Filesize

                                                                                              136KB

                                                                                              MD5

                                                                                              61ba5199c4e601fa6340e46bef0dff2d

                                                                                              SHA1

                                                                                              7c1a51d6d75b001ba1acde2acb0919b939b392c3

                                                                                              SHA256

                                                                                              8783f06f7b123e16042bb0af91ff196b698d3cd2aa930e3ea97cfc553d9fc0f4

                                                                                              SHA512

                                                                                              8ce180a622a5788bb66c5f3a4abfde62c858e86962f29091e9c157753088ddc826c67c51ff26567bfe2b75737897f14e6bb17ec89f52b525f6577097f1647d31

                                                                                            • C:\Program Files\Cheat Engine 7.5\d3dhook.dll

                                                                                              Filesize

                                                                                              119KB

                                                                                              MD5

                                                                                              2a2ebe526ace7eea5d58e416783d9087

                                                                                              SHA1

                                                                                              5dabe0f7586f351addc8afc5585ee9f70c99e6c4

                                                                                              SHA256

                                                                                              e2a7df4c380667431f4443d5e5fc43964b76c8fcb9cf4c7db921c4140b225b42

                                                                                              SHA512

                                                                                              94ed0038068abddd108f880df23422e21f9808ce04a0d14299aacc5d573521f52626c0c2752b314cda976f64de52c4d5bcac0158b37d43afb9bc345f31fdbbc0

                                                                                            • C:\Program Files\Cheat Engine 7.5\d3dhook64.dll

                                                                                              Filesize

                                                                                              131KB

                                                                                              MD5

                                                                                              2af7afe35ab4825e58f43434f5ae9a0f

                                                                                              SHA1

                                                                                              b67c51cad09b236ae859a77d0807669283d6342f

                                                                                              SHA256

                                                                                              7d82694094c1bbc586e554fa87a4b1ed6ebc9eb14902fd429824dcd501339722

                                                                                              SHA512

                                                                                              23b7c6db0cb9c918ad9f28fa0e4e683c7e2495e89a136b75b7e1be6380591da61b6fb4f7248191f28fd3d80c4a391744a96434b4ab96b9531b5ebb0ec970b9d0

                                                                                            • C:\Program Files\Cheat Engine 7.5\is-QSKCF.tmp

                                                                                              Filesize

                                                                                              12.2MB

                                                                                              MD5

                                                                                              810cb586e00809bdb9125bf270c68f3a

                                                                                              SHA1

                                                                                              116f9b1d3e53a36f17765f05f8af8e3317771a88

                                                                                              SHA256

                                                                                              5f86d04426dc8381619ccd7f909790e0d10e491daad7749130fb7e4d69dd0860

                                                                                              SHA512

                                                                                              dfb78928f40e1ea15172cc30b0fdef34601c8bb39ed2db17f2d18d79e142a478279789fbd18dc7525595981709a0ab1516cf3edc0d294ab2503d3f48a163ba0d

                                                                                            • C:\Program Files\Cheat Engine 7.5\languages\language.ini

                                                                                              Filesize

                                                                                              283B

                                                                                              MD5

                                                                                              af5ed8f4fe5370516403ae39200f5a4f

                                                                                              SHA1

                                                                                              9299e9998a0605182683a58a5a6ab01a9b9bc037

                                                                                              SHA256

                                                                                              4aa4f0b75548d45c81d8e876e2db1c74bddfd64091f102706d729b50a7af53a5

                                                                                              SHA512

                                                                                              f070049a2fae3223861424e7fe79cbae6601c9bee6a56fadde4485ad3c597dc1f3687e720177ab28564a1faab52b6679e9315f74327d02aa1fb31e7b8233a80f

                                                                                            • C:\Program Files\Cheat Engine 7.5\libipt-32.dll

                                                                                              Filesize

                                                                                              157KB

                                                                                              MD5

                                                                                              df443813546abcef7f33dd9fc0c6070a

                                                                                              SHA1

                                                                                              635d2d453d48382824e44dd1e59d5c54d735ee2c

                                                                                              SHA256

                                                                                              d14911c838620251f7f64c190b04bb8f4e762318cc763d993c9179376228d8ca

                                                                                              SHA512

                                                                                              9f9bea9112d9db9bcecfc8e4800b7e8032efb240cbbddaf26c133b4ce12d27b47dc4e90bc339c561714bc972f6e809b2ec9c9e1facc6c223fbac66b089a14c25

                                                                                            • C:\Program Files\Cheat Engine 7.5\libipt-64.dll

                                                                                              Filesize

                                                                                              182KB

                                                                                              MD5

                                                                                              4a3b7c52ef32d936e3167efc1e920ae6

                                                                                              SHA1

                                                                                              d5d8daa7a272547419132ddb6e666f7559dbac04

                                                                                              SHA256

                                                                                              26ede848dba071eb76c0c0ef8e9d8ad1c53dfab47ca9137abc9d683032f06ebb

                                                                                              SHA512

                                                                                              36d7f8a0a749de049a830cc8c8f0d3962d8dce57b445f5f3c771a86dd11aaa10da5f36f95e55d3dc90900e4dbddd0dcc21052c53aa11f939db691362c42e5312

                                                                                            • C:\Program Files\Cheat Engine 7.5\luaclient-i386.dll

                                                                                              Filesize

                                                                                              197KB

                                                                                              MD5

                                                                                              9f50134c8be9af59f371f607a6daa0b6

                                                                                              SHA1

                                                                                              6584b98172cbc4916a7e5ca8d5788493f85f24a7

                                                                                              SHA256

                                                                                              dd07117ed80546f23d37f8023e992de560a1f55a76d1eb6dfd9d55baa5e3dad6

                                                                                              SHA512

                                                                                              5ccafa2b0e2d20034168ee9a79e8efff64f12f5247f6772815ef4cb9ee56f245a06b088247222c5a3789ae2dcefadbc2c15df4ff5196028857f92b9992b094e0

                                                                                            • C:\Program Files\Cheat Engine 7.5\luaclient-x86_64.dll

                                                                                              Filesize

                                                                                              260KB

                                                                                              MD5

                                                                                              dd71848b5bbd150e22e84238cf985af0

                                                                                              SHA1

                                                                                              35c7aa128d47710cfdb15bb6809a20dbd0f916d8

                                                                                              SHA256

                                                                                              253d18d0d835f482e6abbaf716855580eb8fe789292c937301e4d60ead29531d

                                                                                              SHA512

                                                                                              0cbf35c9d7b09fb57d8a9079eab726a3891393f12aee8b43e01d1d979509e755b74c0fb677f8f2dfab6b2e34a141f65d0cfbfe57bda0bf7482841ad31ace7790

                                                                                            • C:\Program Files\Cheat Engine 7.5\overlay.fx

                                                                                              Filesize

                                                                                              2KB

                                                                                              MD5

                                                                                              650c02fc9f949d14d62e32dd7a894f5e

                                                                                              SHA1

                                                                                              fa5399b01aadd9f1a4a5632f8632711c186ec0de

                                                                                              SHA256

                                                                                              c4d23db8effb359b4aa4d1e1e480486fe3a4586ce8243397a94250627ba4f8cc

                                                                                              SHA512

                                                                                              f2caaf604c271283fc7af3aa9674b9d647c4ac53dffca031dbf1220d3ed2e867943f5409a95f41c61d716879bed7c888735f43a068f1cc1452b4196d611cb76d

                                                                                            • C:\Program Files\Cheat Engine 7.5\speedhack-i386.dll

                                                                                              Filesize

                                                                                              200KB

                                                                                              MD5

                                                                                              6e00495955d4efaac2e1602eb47033ee

                                                                                              SHA1

                                                                                              95c2998d35adcf2814ec7c056bfbe0a0eb6a100c

                                                                                              SHA256

                                                                                              5e24a5fe17ec001cab7118328a4bff0f2577bd057206c6c886c3b7fb98e0d6d9

                                                                                              SHA512

                                                                                              2004d1def322b6dd7b129fe4fa7bbe5d42ab280b2e9e81de806f54313a7ed7231f71b62b6138ac767288fee796092f3397e5390e858e06e55a69b0d00f18b866

                                                                                            • C:\Program Files\Cheat Engine 7.5\speedhack-x86_64.dll

                                                                                              Filesize

                                                                                              256KB

                                                                                              MD5

                                                                                              19b2050b660a4f9fcb71c93853f2e79c

                                                                                              SHA1

                                                                                              5ffa886fa019fcd20008e8820a0939c09a62407a

                                                                                              SHA256

                                                                                              5421b570fbc1165d7794c08279e311672dc4f42cb7ae1cbddcd7eea0b1136fff

                                                                                              SHA512

                                                                                              a93e47387ab0d327b71c3045b3964c7586d0e03dddb2e692f6671fb99659e829591d5f23ce7a95683d82d239ba7d11fb5a123834629a53de5ce5dba6aa714a9a

                                                                                            • C:\Program Files\Cheat Engine 7.5\vehdebug-i386.dll

                                                                                              Filesize

                                                                                              324KB

                                                                                              MD5

                                                                                              e9b5905d495a88adbc12c811785e72ec

                                                                                              SHA1

                                                                                              ca0546646986aab770c7cf2e723c736777802880

                                                                                              SHA256

                                                                                              3eb9cd27035d4193e32e271778643f3acb2ba73341d87fd8bb18d99af3dffdea

                                                                                              SHA512

                                                                                              4124180b118149c25f8ea8dbbb2912b4bd56b43f695bf0ff9c6ccc95ade388f1be7d440a791d49e4d5c9c350ea113cf65f839a3c47d705533716acc53dd038f8

                                                                                            • C:\Program Files\Cheat Engine 7.5\vehdebug-x86_64.dll

                                                                                              Filesize

                                                                                              413KB

                                                                                              MD5

                                                                                              8d487547f1664995e8c47ec2ca6d71fe

                                                                                              SHA1

                                                                                              d29255653ae831f298a54c6fa142fb64e984e802

                                                                                              SHA256

                                                                                              f50baf9dc3cd6b925758077ec85708db2712999b9027cc632f57d1e6c588df21

                                                                                              SHA512

                                                                                              79c230cfe8907df9da92607a2c1ace0523a36c3a13296cb0265329208edc453e293d7fbedbd5410decf81d20a7fe361fdebddadbc1dc63c96130b0bedf5b1d8a

                                                                                            • C:\Program Files\Cheat Engine 7.5\windowsrepair.exe

                                                                                              Filesize

                                                                                              262KB

                                                                                              MD5

                                                                                              9a4d1b5154194ea0c42efebeb73f318f

                                                                                              SHA1

                                                                                              220f8af8b91d3c7b64140cbb5d9337d7ed277edb

                                                                                              SHA256

                                                                                              2f3214f799b0f0a2f3955dbdc64c7e7c0e216f1a09d2c1ad5d0a99921782e363

                                                                                              SHA512

                                                                                              6eef3254fc24079751fc8c38dda9a8e44840e5a4df1ff5adf076e4be87127075a7fea59ba7ef9b901aaf10eb64f881fc8fb306c2625140169665dd3991e5c25b

                                                                                            • C:\Program Files\Cheat Engine 7.5\winhook-i386.dll

                                                                                              Filesize

                                                                                              201KB

                                                                                              MD5

                                                                                              de625af5cf4822db08035cc897f0b9f2

                                                                                              SHA1

                                                                                              4440b060c1fa070eb5d61ea9aadda11e4120d325

                                                                                              SHA256

                                                                                              3cdb85ee83ef12802efdfc9314e863d4696be70530b31e7958c185fc4d6a9b38

                                                                                              SHA512

                                                                                              19b22f43441e8bc72507be850a8154321c20b7351669d15af726145c0d34805c7df58f9dc64a29272a4811268308e503e9840f06e51ccdcb33afd61258339099

                                                                                            • C:\Program Files\Cheat Engine 7.5\winhook-x86_64.dll

                                                                                              Filesize

                                                                                              264KB

                                                                                              MD5

                                                                                              f9c562b838a3c0620fb6ee46b20b554c

                                                                                              SHA1

                                                                                              5095f54be57622730698b5c92c61b124dfb3b944

                                                                                              SHA256

                                                                                              e08b035d0a894d8bea64e67b1ed0bce27567d417eaaa133e8b231f8a939e581d

                                                                                              SHA512

                                                                                              a20bc9a442c698c264fef82aa743d9f3873227d7d55cb908e282fa1f5dcff6b40c5b9ca7802576ef2f5a753fd1c534e9be69464b29af8efec8b019814b875296

                                                                                            • C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe

                                                                                              Filesize

                                                                                              8.6MB

                                                                                              MD5

                                                                                              f35a6782aea69cda718cc378504db826

                                                                                              SHA1

                                                                                              5fc4028de1c51089d9f487caa02a78d4d42266fd

                                                                                              SHA256

                                                                                              20f89ddb4dd26f98ce006ae2034a87e1c2347788697e0fdb68b87c95af0b680c

                                                                                              SHA512

                                                                                              5a5dcf1ecb32addf5fa9ffbce583fbdb4714e5b87553abd57723cb1b199c54bbaf038db1a7ee1cb095b1aad878f8d17919b55cb093c4a869d7356aaf28fb3a4f

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                                              Filesize

                                                                                              2B

                                                                                              MD5

                                                                                              99914b932bd37a50b983c5e7c90ae93b

                                                                                              SHA1

                                                                                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                              SHA256

                                                                                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                              SHA512

                                                                                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                              Filesize

                                                                                              5KB

                                                                                              MD5

                                                                                              d6cd826b9c9f410b24a1f2101efa9d29

                                                                                              SHA1

                                                                                              9592e06529dcef1f2430f53a120b68516de2ccae

                                                                                              SHA256

                                                                                              5220b96c7f2651cd928baf0f67dbabf4a7d5f0e8ff7f4f2fe98e1de25a122fe2

                                                                                              SHA512

                                                                                              cedf42f21e78ae0cb02b25b426d2fd5e2b97c62068fb85b02a49122c591a91a375ae522607535132338fdd0bae2062bd138347ca94d657c3ae2474699552a030

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                              Filesize

                                                                                              5KB

                                                                                              MD5

                                                                                              7cf85519cb488667867e39b580a2a62f

                                                                                              SHA1

                                                                                              179248703c16912ddde0bfa0aa9e0dd5e9092204

                                                                                              SHA256

                                                                                              0db7be2f94870ce9e1b1065cbd7935de931461e4096aa05ec60e0e521e91ca74

                                                                                              SHA512

                                                                                              03ad4ad81b65f751f4d8470af8ac6786e66cbf2906877bbaf0079a231536f4e00809fcbd739b0657fd468d352ee3d7cc0f760f6d9c47a0a7a2dd8905672ba207

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                              Filesize

                                                                                              2B

                                                                                              MD5

                                                                                              d751713988987e9331980363e24189ce

                                                                                              SHA1

                                                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                                                              SHA256

                                                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                              SHA512

                                                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                                              Filesize

                                                                                              40B

                                                                                              MD5

                                                                                              20d4b8fa017a12a108c87f540836e250

                                                                                              SHA1

                                                                                              1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                                              SHA256

                                                                                              6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                                              SHA512

                                                                                              507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                              Filesize

                                                                                              13KB

                                                                                              MD5

                                                                                              16400e2f70ba93830f9d2340a28a17b3

                                                                                              SHA1

                                                                                              56b4f1dbeb224af54cbee6be31e68eb23a83c3e9

                                                                                              SHA256

                                                                                              fdb7069f8dd46908d3f35e3d358100a7a640f642c2c93c43dbb431aa6b6c7d18

                                                                                              SHA512

                                                                                              e57097cd63334c9dc55ab2eab61ccb8e37ece8f05b0789a75f6c7869fa4709e4eeceb782d09f1d4b4a040055526893cec54621b460c63c05790f0ed72b9cdaa2

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                              Filesize

                                                                                              30KB

                                                                                              MD5

                                                                                              1497b7665814119095175aef30ba1da4

                                                                                              SHA1

                                                                                              b847da7ebe5d619349d93ee88008d43284e134ea

                                                                                              SHA256

                                                                                              38f5e197599197843d0da3f117899b8fc5d68a27ef263586af046d2160744f6e

                                                                                              SHA512

                                                                                              84ea4bfb116b09c9ab26f486620692c556ddf5dd6219b5c594ffbe9052de1059ca7f07a758563792521254ae378f17e52fdee226641605dc55094145a2f2338e

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                              Filesize

                                                                                              76KB

                                                                                              MD5

                                                                                              0e2ef0edbcedc9c9bb9b7a0fcd8e259d

                                                                                              SHA1

                                                                                              f09275dfccc168db2061210a6e3921e78cb1ade2

                                                                                              SHA256

                                                                                              2d689e739875e75712746b99c1a130f630cc15192e675cac51f2df4b1ebcfcd3

                                                                                              SHA512

                                                                                              f93b60755fbde8611a14c3cad0fb6e926bfd4e7f63e15f432d0872b9e463f0707892067d0720a142bcdd1760f8812c534c607c19e9ac5cbca00c8f67870e8597

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                              Filesize

                                                                                              80KB

                                                                                              MD5

                                                                                              1d0e1ad43ac497c1dda8679f7dc19894

                                                                                              SHA1

                                                                                              c54eae4a0f6dff6255dbf28a47bdca353b328f8c

                                                                                              SHA256

                                                                                              cc0f6ad2793af7e1f0310fead00c0c7ccca03178da8befbff3234b2b563f6459

                                                                                              SHA512

                                                                                              0be11d1758cbfcf823486bb973b471d26a23cd4b335f41766356cc8ab74e8a165597653161694da1210b79bd0f83e5a6c05458ce85a03fa3a8cff7bf24e74aaf

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                              Filesize

                                                                                              76KB

                                                                                              MD5

                                                                                              8f40fe7d8b97670319672aa635fa203b

                                                                                              SHA1

                                                                                              57c2d88b4c68f6425308c6ea00984de1ec40a968

                                                                                              SHA256

                                                                                              2509fc2828a692d9e4d548dd7382f16dff794217bc896bb64751059e44899c42

                                                                                              SHA512

                                                                                              72a0d0a86335b0e51f0c75cbbadb98cf8a918e9ac8062a4e2e5bcd80c01b1ff54e0755f95e2d846a19abd0cec77dacfeecc84f3b07c425e52448162177e213b3

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

                                                                                              Filesize

                                                                                              2KB

                                                                                              MD5

                                                                                              2299492153d806277dd7c4587ab1603e

                                                                                              SHA1

                                                                                              ff6a6c612e2f1f1606774d48639cd231dfd3ec5d

                                                                                              SHA256

                                                                                              dccdbdeda63c98a83ea23972596d1bed38f91e33edee260bd021a241b201714e

                                                                                              SHA512

                                                                                              72aff1060ff993835d29c9e4c2da2c1bb2afa16b7b00e5ec9076e1b883575de28d678e45d39b463ae48210b81f50500c1bd9cbfa62ae08d9b49391e935340df0

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

                                                                                              Filesize

                                                                                              2KB

                                                                                              MD5

                                                                                              8e8d8432fb9077ae99374f0652ecfdaa

                                                                                              SHA1

                                                                                              8487681bc079c35fe648376924d7848f9b60ee45

                                                                                              SHA256

                                                                                              e97eddbb8e197cbc4cbfbe13dd6258f022928ad966ffb07c19418160aff36b14

                                                                                              SHA512

                                                                                              df99209cb494399f6f4c8d7d13453650ff9cd2ba52ec31ed1854c8784431c4c2f8de342569eed573a31d9e623dafb0e35762eb58b6c841741da39d943ca889af

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-0QCGN.tmp\CheatEngine75.exe

                                                                                              Filesize

                                                                                              26.1MB

                                                                                              MD5

                                                                                              e0f666fe4ff537fb8587ccd215e41e5f

                                                                                              SHA1

                                                                                              d283f9b56c1e36b70a74772f7ca927708d1be76f

                                                                                              SHA256

                                                                                              f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af

                                                                                              SHA512

                                                                                              7f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-0QCGN.tmp\RAV_Cross.png

                                                                                              Filesize

                                                                                              74KB

                                                                                              MD5

                                                                                              cd09f361286d1ad2622ba8a57b7613bd

                                                                                              SHA1

                                                                                              4cd3e5d4063b3517a950b9d030841f51f3c5f1b1

                                                                                              SHA256

                                                                                              b92a31d4853d1b2c4e5b9d9624f40b439856d0c6a517e100978cbde8d3c47dc8

                                                                                              SHA512

                                                                                              f73d60c92644e0478107e0402d1c7b4dfa1674f69b41856f74f937a7b57ceaa2b3be9242f2b59f1fcf71063aac6cbe16c594618d1a8cdd181510de3240f31dff

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-0QCGN.tmp\WeatherZero.png

                                                                                              Filesize

                                                                                              29KB

                                                                                              MD5

                                                                                              9ac6287111cb2b272561781786c46cdd

                                                                                              SHA1

                                                                                              6b02f2307ec17d9325523af1d27a6cb386c8f543

                                                                                              SHA256

                                                                                              ab99cdb7d798cb7b7d8517584d546aa4ed54eca1b808de6d076710c8a400c8c4

                                                                                              SHA512

                                                                                              f998a4e0ce14b3898a72e0b8a3f7154fc87d2070badcfa98582e3b570ca83a562d5a0c95f999a4b396619db42ab6269a2bac47702597c5a2c37177441723d837

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-0QCGN.tmp\WebAdvisor.png

                                                                                              Filesize

                                                                                              47KB

                                                                                              MD5

                                                                                              4cfff8dc30d353cd3d215fd3a5dbac24

                                                                                              SHA1

                                                                                              0f4f73f0dddc75f3506e026ef53c45c6fafbc87e

                                                                                              SHA256

                                                                                              0c430e56d69435d8ab31cbb5916a73a47d11ef65b37d289ee7d11130adf25856

                                                                                              SHA512

                                                                                              9d616f19c2496be6e89b855c41befc0235e3ce949d2b2ae7719c823f10be7fe0809bddfd93e28735b36271083dd802ae349b3ab7b60179b269d4a18c6cef4139

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-0QCGN.tmp\logo.png

                                                                                              Filesize

                                                                                              246KB

                                                                                              MD5

                                                                                              f3d1b8cd125a67bafe54b8f31dda1ccd

                                                                                              SHA1

                                                                                              1c6b6bf1e785ad80fc7e9131a1d7acbba88e8303

                                                                                              SHA256

                                                                                              21dfa1ff331794fcb921695134a3ba1174d03ee7f1e3d69f4b1a3581fccd2cdf

                                                                                              SHA512

                                                                                              c57d36daa20b1827b2f8f9f98c9fd4696579de0de43f9bbeef63a544561a5f50648cc69220d9e8049164df97cb4b2176963089e14d58a6369d490d8c04354401

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-ANTQ0.tmp\zbShieldUtils.dll

                                                                                              Filesize

                                                                                              2.0MB

                                                                                              MD5

                                                                                              b83f5833e96c2eb13f14dcca805d51a1

                                                                                              SHA1

                                                                                              9976b0a6ef3dabeab064b188d77d870dcdaf086d

                                                                                              SHA256

                                                                                              00e667b838a4125c8cf847936168bb77bb54580bc05669330cb32c0377c4a401

                                                                                              SHA512

                                                                                              8641b351e28b3c61ed6762adbca165f4a5f2ee26a023fd74dd2102a6258c0f22e91b78f4a3e9fba6094b68096001de21f10d6495f497580847103c428d30f7bb

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-B2ST3.tmp\_isetup\_setup64.tmp

                                                                                              Filesize

                                                                                              6KB

                                                                                              MD5

                                                                                              e4211d6d009757c078a9fac7ff4f03d4

                                                                                              SHA1

                                                                                              019cd56ba687d39d12d4b13991c9a42ea6ba03da

                                                                                              SHA256

                                                                                              388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95

                                                                                              SHA512

                                                                                              17257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-FITKV.tmp\CheatEngine75.tmp

                                                                                              Filesize

                                                                                              3.1MB

                                                                                              MD5

                                                                                              349c57b17c961abbe59730d3cc5614b2

                                                                                              SHA1

                                                                                              32278b8621491e587a08f0764501b8b8314fd94c

                                                                                              SHA256

                                                                                              de28f1f10d5136dc5b30ccb73750559cca91720533717e9398ee45a44c75481b

                                                                                              SHA512

                                                                                              54d54d8b682c8cf9b06452a493e96307bfd9b8193f21e8eb5e89ad4420e1f6e066cf8bdeb70444ebcf2297520a4716ae1910124f21cab98e012f0fd19783c1f5

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-Q93J6.tmp\CheatEngine75.tmp

                                                                                              Filesize

                                                                                              3.1MB

                                                                                              MD5

                                                                                              9aa2acd4c96f8ba03bb6c3ea806d806f

                                                                                              SHA1

                                                                                              9752f38cc51314bfd6d9acb9fb773e90f8ea0e15

                                                                                              SHA256

                                                                                              1b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb

                                                                                              SHA512

                                                                                              b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d

                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                                                              Filesize

                                                                                              339B

                                                                                              MD5

                                                                                              341ea1e0f03196d8dd944d47b7c3f665

                                                                                              SHA1

                                                                                              ab2b7bda02720a57e6ff2365ee6c3227ec1b7fff

                                                                                              SHA256

                                                                                              171dde41683f27b952772bb8b9de4c3b2d5c3b3f1883d34e9903d73f6a77b1e4

                                                                                              SHA512

                                                                                              ab2d0825fa0fd34dc35964189141e43b9926c03873cc8f8ed426292d8c3e29cee4b44bdd88b9063701386447b41a15d1735ed1d02ba41eb9f50204fe4101e4bd

                                                                                            • C:\Users\Admin\Videos\Captures\desktop.ini

                                                                                              Filesize

                                                                                              190B

                                                                                              MD5

                                                                                              b0d27eaec71f1cd73b015f5ceeb15f9d

                                                                                              SHA1

                                                                                              62264f8b5c2f5034a1e4143df6e8c787165fbc2f

                                                                                              SHA256

                                                                                              86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

                                                                                              SHA512

                                                                                              7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

                                                                                            • memory/2388-244-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                              Filesize

                                                                                              864KB

                                                                                            • memory/2388-209-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                              Filesize

                                                                                              864KB

                                                                                            • memory/2388-225-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                              Filesize

                                                                                              864KB

                                                                                            • memory/3592-226-0x0000000000400000-0x000000000071C000-memory.dmp

                                                                                              Filesize

                                                                                              3.1MB

                                                                                            • memory/4104-99-0x0000000000400000-0x000000000071C000-memory.dmp

                                                                                              Filesize

                                                                                              3.1MB

                                                                                            • memory/4128-82-0x00007FF9E9BA0000-0x00007FF9E9BEB000-memory.dmp

                                                                                              Filesize

                                                                                              300KB

                                                                                            • memory/4128-66-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-23-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-25-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-24-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-26-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-27-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-28-0x00007FF9AA300000-0x00007FF9AA310000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-29-0x00007FF9AA300000-0x00007FF9AA310000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-64-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-67-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-65-0x00007FF9AC690000-0x00007FF9AC6A0000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-72-0x00007FF9EB4A0000-0x00007FF9EB4A8000-memory.dmp

                                                                                              Filesize

                                                                                              32KB

                                                                                            • memory/4128-71-0x00007FF9DE580000-0x00007FF9DE594000-memory.dmp

                                                                                              Filesize

                                                                                              80KB

                                                                                            • memory/4128-79-0x00007FF9E9210000-0x00007FF9E921C000-memory.dmp

                                                                                              Filesize

                                                                                              48KB

                                                                                            • memory/4128-78-0x00007FF9E7880000-0x00007FF9E78AF000-memory.dmp

                                                                                              Filesize

                                                                                              188KB

                                                                                            • memory/4128-76-0x00007FF9EBEC0000-0x00007FF9EBEC8000-memory.dmp

                                                                                              Filesize

                                                                                              32KB

                                                                                            • memory/4128-75-0x00007FF9E3AF0000-0x00007FF9E3AFB000-memory.dmp

                                                                                              Filesize

                                                                                              44KB

                                                                                            • memory/4128-73-0x00007FF9E2990000-0x00007FF9E2A98000-memory.dmp

                                                                                              Filesize

                                                                                              1.0MB

                                                                                            • memory/4128-68-0x00007FF9E56A0000-0x00007FF9E56D6000-memory.dmp

                                                                                              Filesize

                                                                                              216KB

                                                                                            • memory/4128-69-0x00007FF9E2960000-0x00007FF9E2970000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4128-70-0x00007FF9E8880000-0x00007FF9E88A5000-memory.dmp

                                                                                              Filesize

                                                                                              148KB

                                                                                            • memory/4128-74-0x00007FF9E9410000-0x00007FF9E947A000-memory.dmp

                                                                                              Filesize

                                                                                              424KB

                                                                                            • memory/5212-266-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                              Filesize

                                                                                              864KB

                                                                                            • memory/5212-85-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                              Filesize

                                                                                              864KB

                                                                                            • memory/5212-98-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                              Filesize

                                                                                              864KB

                                                                                            • memory/5508-230-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-229-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-238-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-236-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-239-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-237-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-235-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-228-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-240-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5508-234-0x0000018826280000-0x0000018826281000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5608-267-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                              Filesize

                                                                                              864KB

                                                                                            • memory/5608-284-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                              Filesize

                                                                                              864KB

                                                                                            • memory/5644-285-0x0000000000400000-0x000000000071C000-memory.dmp

                                                                                              Filesize

                                                                                              3.1MB

                                                                                            • memory/5644-309-0x0000000000400000-0x000000000071C000-memory.dmp

                                                                                              Filesize

                                                                                              3.1MB

                                                                                            • memory/5644-307-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                                                              Filesize

                                                                                              1.2MB

                                                                                            • memory/5644-293-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                                                              Filesize

                                                                                              1.2MB