Analysis
-
max time kernel
2616s -
max time network
2617s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 15:17
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Downloads MZ/PE file
-
Manipulates Digital Signatures 1 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File opened for modification C:\Windows\System32\WINTRUST.dll cheatengine-x86_64-SSE4-AVX2.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Pixel Worlds Installer (1).exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Cheat Engine.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Cheat Engine.exe -
Executes dropped EXE 12 IoCs
pid Process 5112 CheatEngine75.exe 1320 CheatEngine75.tmp 3840 Pixel Worlds Installer (1).exe 4224 CheatEngine75.exe 1600 CheatEngine75.tmp 3944 _setup64.tmp 876 Kernelmoduleunloader.exe 4208 windowsrepair.exe 3036 Cheat Engine.exe 1840 cheatengine-x86_64-SSE4-AVX2.exe 3492 Cheat Engine.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe -
Loads dropped DLL 15 IoCs
pid Process 1320 CheatEngine75.tmp 1840 cheatengine-x86_64-SSE4-AVX2.exe 1840 cheatengine-x86_64-SSE4-AVX2.exe 1840 cheatengine-x86_64-SSE4-AVX2.exe 1840 cheatengine-x86_64-SSE4-AVX2.exe 1840 cheatengine-x86_64-SSE4-AVX2.exe 1840 cheatengine-x86_64-SSE4-AVX2.exe 1840 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2416 icacls.exe 2624 icacls.exe -
Checks for any installed AV software in registry 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Browser\Installed CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\Browser\Installed CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Avira\Browser\Installed CheatEngine75.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 468 api.ipify.org 470 api.ipify.org -
pid Process 4056 GameBarPresenceWriter.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\KERNELBASE.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\gdi32full.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\sechost.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\bcryptPrimitives.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\MFPlat.DLL cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\Windows.Devices.Sensors.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\CLIPC.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\Windows.Networking.HostName.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\FirewallAPI.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\WLDAP32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcrt.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\kernel.appcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\windows.ui.core.textinput.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\DefaultDeviceManager.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\apphelp.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shell32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\comdlg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\twinapi.appcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\WindowManagementAPI.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\dxgi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\Windows.Storage.ApplicationData.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\Windows.Media.Devices.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\certca.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\RPCRT4.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\opengl32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\sechost.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\windows.storage.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\TextInputFramework.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\windows.storage.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\RMCLIENT.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\rsaenh.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\edputil.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\SspiCli.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\MSASN1.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\psapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\GDI32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\IMM32.DLL cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\MFReadWrite.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\setupapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\fwbase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\uxtheme.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ole32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\PROPSYS.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\OLEAUT32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\rometadata.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\Windows.Perception.Stub.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\BiWinrt.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\mswsock.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\DNSAPI.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\Windows.ApplicationModel.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\Windows.Globalization.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\mlang.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\imm32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\bcryptPrimitives.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\InputHost.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\DevDispItemProvider.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\powrprof.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\Windows.Gaming.Input.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\GLU32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\msimg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\combase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\imm32.dll cheatengine-x86_64-SSE4-AVX2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\gdi32full.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\wbemcomn.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\autorun\is-STF2M.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\DLL\iphlpapi.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\psapi.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\dll\lua53-64.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\user32.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\dll\gdi32full.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\WindowManagementAPI.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\symbols\dll\ExecModelClient.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Mono\MonoDataCollector\is-NPONV.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\example-c\is-MMJDR.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\winnsi.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\dll\ntasn1.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\is-EQSSD.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\win32u.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Mono\MonoDataCollector\is-K8HI0.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\UxTheme.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\include\is-DFMC9.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\winapi\is-8TFJP.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\ceshare\forms\is-M4NSD.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\plugins\is-TE6D0.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\dll\apphelp.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\version.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\Windows.Gaming.Input.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\dll\setupapi.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\include\is-LKQ2O.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\winapi\is-E6816.tmp CheatEngine75.tmp File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\dll\Windows.Web.Http.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\combase.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\is-USAOJ.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\dlls\src\Java\CEJVMTI\CEJVMTI\is-5G1HO.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\UxTheme.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\dll\cfgmgr32.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\CoreUIComponents.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\symbols\dll\DefaultDeviceManager.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\rsaenh.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\ntasn1.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\win32\dbghelp.dll CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\sec_api\is-KB6Q9.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\symbols\dll\UMPDC.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\dll\wshbth.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\mskeyprotect.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\autorun\is-IHGLC.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\ceshare\images\is-A07M5.tmp CheatEngine75.tmp File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\UnityPlayer_UAP_x64_master_il2cpp.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\dll\CertEnroll.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\include\is-8ACQD.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\is-ME9OG.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\opengl32.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\ocx\hhctrl.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\dll\OneCoreUAPCommonProxyStub.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\is-3NOJM.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\dll\imm32.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\symbols\dll\shlwapi.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\wshbth.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\languages\is-IJAUO.tmp CheatEngine75.tmp File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\devobj.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\WinTypes.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\symbols\dll\MFReadWrite.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\audioses.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\Cheat Engine 7.5\is-5PFTP.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\shell32.pdb cheatengine-x86_64-SSE4-AVX2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\comctl32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\comctl32.dll cheatengine-x86_64-SSE4-AVX2.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2736 sc.exe 5056 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kernelmoduleunloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsrepair.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cheat Engine.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cheat Engine.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en-US Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en-US Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003 Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en-US Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en-US Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\ Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en-US Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\ Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\ Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en-US Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000A Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\ Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009\en Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0003\ Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Pixel Worlds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 Pixel Worlds.exe -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CheatEngine75.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ CheatEngine75.tmp Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Pixel Worlds.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Pixel Worlds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Pixel Worlds.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "28" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "35" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "72" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "77" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "3" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "7" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "71" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "80" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "22" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "51" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "30" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "47" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "87" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133721830651797961" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "6" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "58" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "61" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "76" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "27" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "37" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "44" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "46" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "62" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "69" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "82" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "89" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Direct3D svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "36" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "64" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "66" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "67" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "68" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "54" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "60" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "13" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "23" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "45" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "48" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "73" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "74" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "11" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "26" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "5" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "16" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "34" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "55" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "19" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "25" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "50" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "53" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "83" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "86" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "90" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "17" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "39" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "70" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "78" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "85" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "21" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "32" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "12" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "29" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\LastTelemetryChangeStamp = "65" svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open\command CheatEngine75.tmp Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\trust\CTLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Root\CTLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Root\CRLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Pixel Worlds.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open CheatEngine75.tmp Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA\CTLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Root\Certificates Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA\CRLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Internet Settings Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA\CTLs Pixel Worlds.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\shell\open\command\ = "\"C:\\Program Files\\Cheat Engine 7.5\\Cheat Engine.exe\" \"%1\"" CheatEngine75.tmp Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft Pixel Worlds.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14 = 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 Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\MuiCache Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Disallowed\CRLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\trust Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Internet Settings\Cache\Extensible Cache Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Root\CTLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA\Certificates Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Disallowed Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\trust\CTLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Root\Certificates Pixel Worlds.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2412658365-3084825385-3340777666-1000\{AA9967EE-BBD0-44F3-97E8-A706C5DEFFE9} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\DefaultIcon CheatEngine75.tmp Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Disallowed\Certificates Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Disallowed Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Pixel Worlds.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2412658365-3084825385-3340777666-1000\{C20661BF-2128-4AA0-98B8-3A8120ABA9DC} svchost.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Pixel Worlds.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2412658365-3084825385-3340777666-1000\{9C0BB3CF-6E59-4B40-8D37-5BA50F424A8F} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CT CheatEngine75.tmp Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\TrustedPeople Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Pixel Worlds.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\DefaultIcon\ = "C:\\Program Files\\Cheat Engine 7.5\\Cheat Engine.exe,0" CheatEngine75.tmp Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Disallowed\CTLs Pixel Worlds.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2412658365-3084825385-3340777666-1000\{0721D497-E7D9-4801-86D7-C1333BA36BE5} svchost.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\MuiCache Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\trust\CRLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Disallowed\Certificates Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\trust\CRLs Pixel Worlds.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CETRAINER CheatEngine75.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CETRAINER\ = "CheatEngine" CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine CheatEngine75.tmp Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Root Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\TrustedPeople Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\trust\Certificates Pixel Worlds.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\ = "Cheat Engine" CheatEngine75.tmp Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Root Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Internet Settings\Cache Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\trust\Certificates Pixel Worlds.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2412658365-3084825385-3340777666-1000\{04F6775D-BF66-4B4E-9591-55F185DAAF77} svchost.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Disallowed\CRLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\Root\CRLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14 Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA\Certificates Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\CA\CRLs Pixel Worlds.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\gametroopers.pixelworlds_334sksj6ker18\Software\Microsoft\SystemCertificates\trust Pixel Worlds.exe -
Runs net.exe
-
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 230 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 256 Cheat Engine 7.5 : luascript-ceshare HTTP User-Agent header 256 Cheat Engine 7.5 : luascript-CEVersionCheck -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 692 Pixel Worlds.exe 728 Pixel Worlds.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1136 chrome.exe 1136 chrome.exe 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1320 CheatEngine75.tmp 1600 CheatEngine75.tmp 1600 CheatEngine75.tmp 1840 cheatengine-x86_64-SSE4-AVX2.exe 1840 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2384 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe Token: SeShutdownPrivilege 1136 chrome.exe Token: SeCreatePagefilePrivilege 1136 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1600 CheatEngine75.tmp 1320 CheatEngine75.tmp 1840 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe 1136 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 692 Pixel Worlds.exe 5100 OpenWith.exe 728 Pixel Worlds.exe 5088 OpenWith.exe 3492 Cheat Engine.exe 2384 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 264 1136 chrome.exe 85 PID 1136 wrote to memory of 264 1136 chrome.exe 85 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 2124 1136 chrome.exe 86 PID 1136 wrote to memory of 992 1136 chrome.exe 87 PID 1136 wrote to memory of 992 1136 chrome.exe 87 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88 PID 1136 wrote to memory of 4700 1136 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.cheatengine.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe7d49cc40,0x7ffe7d49cc4c,0x7ffe7d49cc582⤵PID:264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1580,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=276 /prefetch:22⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2444 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3640,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4348,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4900,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4988,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5176,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5452,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6040,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6052,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=6440,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=6696,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6684 /prefetch:12⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6408,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5980,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6760 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5572,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6856 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=3144,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6836 /prefetch:12⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5004,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6804 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6472,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6548 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5516,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4420,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5508,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6776 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5596,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4516,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3228 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6448,i,3075360095777415903,16808377726834317246,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3232 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4460
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x394 0x31c1⤵PID:2932
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1200
-
C:\Users\Admin\Downloads\CheatEngine75.exe"C:\Users\Admin\Downloads\CheatEngine75.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\is-RF369.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-RF369.tmp\CheatEngine75.tmp" /SL5="$C01FE,29019964,780800,C:\Users\Admin\Downloads\CheatEngine75.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\is-H8EVU.tmp\CheatEngine75.exe"C:\Users\Admin\AppData\Local\Temp\is-H8EVU.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\is-SUQSB.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-SUQSB.tmp\CheatEngine75.tmp" /SL5="$301FC,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-H8EVU.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1600 -
C:\Windows\SYSTEM32\net.exe"net" stop BadlionAntic5⤵PID:4320
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAntic6⤵PID:388
-
-
-
C:\Windows\SYSTEM32\net.exe"net" stop BadlionAnticheat5⤵PID:2056
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAnticheat6⤵PID:2424
-
-
-
C:\Windows\SYSTEM32\sc.exe"sc" delete BadlionAntic5⤵
- Launches sc.exe
PID:2736
-
-
C:\Windows\SYSTEM32\sc.exe"sc" delete BadlionAnticheat5⤵
- Launches sc.exe
PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\is-MFCQ5.tmp\_isetup\_setup64.tmphelper 105 0x4185⤵
- Executes dropped EXE
PID:3944
-
-
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:2416
-
-
C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe"C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:876
-
-
C:\Program Files\Cheat Engine 7.5\windowsrepair.exe"C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4208
-
-
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:2624
-
-
-
-
C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1840
-
-
-
-
C:\Users\Admin\Downloads\Pixel Worlds Installer (1).exe"C:\Users\Admin\Downloads\Pixel Worlds Installer (1).exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:3840
-
C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\Pixel Worlds.exe"C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\Pixel Worlds.exe" -ServerName:App.AppX62w4340tkz8xw8jecmsysne0bnas1srd.mca1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:692
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:4056
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:4932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:1332
-
C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\Pixel Worlds.exe"C:\Program Files\WindowsApps\GAMETROOPERS.PixelWorlds_1.8.30.0_x64__334sksj6ker18\Pixel Worlds.exe" -ServerName:App.AppX62w4340tkz8xw8jecmsysne0bnas1srd.mca1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:728
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k GraphicsPerfSvcGroup -s GraphicsPerfSvc1⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:4800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
PID:1160
-
C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3492 -
C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"2⤵
- Manipulates Digital Signatures
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:4436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:3852
Network
MITRE ATT&CK Enterprise v15
Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
5Software Discovery
1Security Software Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5f921416197c2ae407d53ba5712c3930a
SHA16a7daa7372e93c48758b9752c8a5a673b525632b
SHA256e31b233ddf070798cc0381cc6285f6f79ea0c17b99737f7547618dcfd36cdc0e
SHA5120139efb76c2107d0497be9910836d7c19329e4399aa8d46bbe17ae63d56ab73004c51b650ce38d79681c22c2d1b77078a7d7185431882baf3e7bef473ac95dce
-
Filesize
328KB
MD519d52868c3e0b609dbeb68ef81f381a9
SHA1ce365bd4cf627a3849d7277bafbf2f5f56f496dc
SHA256b96469b310ba59d1db320a337b3a8104db232a4344a47a8e5ae72f16cc7b1ff4
SHA5125fbd53d761695de1dd6f0afd0964b33863764c89692345cab013c0b1b6332c24dcf766028f305cc87d864d17229d7a52bf19a299ca136a799053c368f21c8926
-
Filesize
468KB
MD5daa81711ad1f1b1f8d96dc926d502484
SHA17130b241e23bede2b1f812d95fdb4ed5eecadbfd
SHA2568422be70e0ec59c962b35acf8ad80671bcc8330c9256e6e1ec5c07691388cd66
SHA5129eaa8e04ad7359a30d5e2f9256f94c1643d4c3f3c0dff24d6cd9e31a6f88cb3b470dd98f01f8b0f57bb947adc3d45c35749ed4877c7cbbbcc181145f0c361065
-
Filesize
5KB
MD55cff22e5655d267b559261c37a423871
SHA1b60ae22dfd7843dd1522663a3f46b3e505744b0f
SHA256a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9
SHA512e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50
-
Filesize
128KB
MD543dac1f3ca6b48263029b348111e3255
SHA19e399fddc2a256292a07b5c3a16b1c8bdd8da5c1
SHA256148f12445f11a50efbd23509139bf06a47d453e8514733b5a15868d10cc6e066
SHA5126e77a429923b503fc08895995eb8817e36145169c2937dacc2da92b846f45101846e98191aeb4f0f2f13fff05d0836aa658f505a04208188278718166c5e3032
-
Filesize
140KB
MD50daf9f07847cceb0f0760bf5d770b8c1
SHA1992cc461f67acea58a866a78b6eefb0cbcc3aaa1
SHA256a2ac2ba27b0ed9acc3f0ea1bef9909a59169bc2eb16c979ef8e736a784bf2fa4
SHA512b4dda28721de88a372af39d4dfba6e612ce06cc443d6a6d636334865a9f8ca555591fb36d9829b54bc0fb27f486d4f216d50f68e1c2df067439fe8ebbf203b6a
-
Filesize
137KB
MD542e2bf4210f8126e3d655218bd2af2e4
SHA178efcb9138eb0c800451cf2bcc10e92a3adf5b72
SHA2561e30126badfffb231a605c6764dd98895208779ef440ea20015ab560263dd288
SHA512c985988d0832ce26337f774b160ac369f2957c306a1d82fbbffe87d9062ae5f3af3c1209768cd574182669cd4495dba26b6f1388814c0724a7812218b0b8dc74
-
Filesize
146KB
MD50eaac872aadc457c87ee995bbf45a9c1
SHA15e9e9b98f40424ad5397fc73c13b882d75499d27
SHA2566f505cc5973687bbda1c2d9ac8a635d333f57c12067c54da7453d9448ab40b8f
SHA512164d1e6ef537d44ac4c0fd90d3c708843a74ac2e08fa2b3f0fdd4a180401210847e0f7bb8ec3056f5dc1d5a54d3239c59fb37914ce7742a4c0eb81578657d24b
-
Filesize
124KB
MD55f1a333671bf167730ed5f70c2c18008
SHA1c8233bbc6178ba646252c6566789b82a3296cab5
SHA256fd2a2b4fe4504c56347c35f24d566cc0510e81706175395d0a2ba26a013c4daf
SHA5126986d93e680b3776eb5700143fc35d60ca9dbbdf83498f8731c673f9fd77c8699a24a4849db2a273aa991b8289e4d6c3142bbde77e11f2faf603df43e8fea105
-
Filesize
136KB
MD561ba5199c4e601fa6340e46bef0dff2d
SHA17c1a51d6d75b001ba1acde2acb0919b939b392c3
SHA2568783f06f7b123e16042bb0af91ff196b698d3cd2aa930e3ea97cfc553d9fc0f4
SHA5128ce180a622a5788bb66c5f3a4abfde62c858e86962f29091e9c157753088ddc826c67c51ff26567bfe2b75737897f14e6bb17ec89f52b525f6577097f1647d31
-
Filesize
119KB
MD52a2ebe526ace7eea5d58e416783d9087
SHA15dabe0f7586f351addc8afc5585ee9f70c99e6c4
SHA256e2a7df4c380667431f4443d5e5fc43964b76c8fcb9cf4c7db921c4140b225b42
SHA51294ed0038068abddd108f880df23422e21f9808ce04a0d14299aacc5d573521f52626c0c2752b314cda976f64de52c4d5bcac0158b37d43afb9bc345f31fdbbc0
-
Filesize
131KB
MD52af7afe35ab4825e58f43434f5ae9a0f
SHA1b67c51cad09b236ae859a77d0807669283d6342f
SHA2567d82694094c1bbc586e554fa87a4b1ed6ebc9eb14902fd429824dcd501339722
SHA51223b7c6db0cb9c918ad9f28fa0e4e683c7e2495e89a136b75b7e1be6380591da61b6fb4f7248191f28fd3d80c4a391744a96434b4ab96b9531b5ebb0ec970b9d0
-
Filesize
12.2MB
MD56f45f16a31d26b9e4ec5a5e534539243
SHA149d97c4de87fd57cb486cef9b0a0607c3a6a2289
SHA256780ac4462a17914e8e0ab60a6bbdf28be32bd644af5f51425e32b0db901bdeab
SHA51250bca38815ea5f5d89cbe3fb282fa290c13832087a93ddb659b7a3004abdfc840188753dd23d177c6a03836d7b86c20f34e33a334f3f2b5d3339ba0d25908835
-
Filesize
157KB
MD5df443813546abcef7f33dd9fc0c6070a
SHA1635d2d453d48382824e44dd1e59d5c54d735ee2c
SHA256d14911c838620251f7f64c190b04bb8f4e762318cc763d993c9179376228d8ca
SHA5129f9bea9112d9db9bcecfc8e4800b7e8032efb240cbbddaf26c133b4ce12d27b47dc4e90bc339c561714bc972f6e809b2ec9c9e1facc6c223fbac66b089a14c25
-
Filesize
182KB
MD54a3b7c52ef32d936e3167efc1e920ae6
SHA1d5d8daa7a272547419132ddb6e666f7559dbac04
SHA25626ede848dba071eb76c0c0ef8e9d8ad1c53dfab47ca9137abc9d683032f06ebb
SHA51236d7f8a0a749de049a830cc8c8f0d3962d8dce57b445f5f3c771a86dd11aaa10da5f36f95e55d3dc90900e4dbddd0dcc21052c53aa11f939db691362c42e5312
-
Filesize
197KB
MD59f50134c8be9af59f371f607a6daa0b6
SHA16584b98172cbc4916a7e5ca8d5788493f85f24a7
SHA256dd07117ed80546f23d37f8023e992de560a1f55a76d1eb6dfd9d55baa5e3dad6
SHA5125ccafa2b0e2d20034168ee9a79e8efff64f12f5247f6772815ef4cb9ee56f245a06b088247222c5a3789ae2dcefadbc2c15df4ff5196028857f92b9992b094e0
-
Filesize
260KB
MD5dd71848b5bbd150e22e84238cf985af0
SHA135c7aa128d47710cfdb15bb6809a20dbd0f916d8
SHA256253d18d0d835f482e6abbaf716855580eb8fe789292c937301e4d60ead29531d
SHA5120cbf35c9d7b09fb57d8a9079eab726a3891393f12aee8b43e01d1d979509e755b74c0fb677f8f2dfab6b2e34a141f65d0cfbfe57bda0bf7482841ad31ace7790
-
Filesize
200KB
MD56e00495955d4efaac2e1602eb47033ee
SHA195c2998d35adcf2814ec7c056bfbe0a0eb6a100c
SHA2565e24a5fe17ec001cab7118328a4bff0f2577bd057206c6c886c3b7fb98e0d6d9
SHA5122004d1def322b6dd7b129fe4fa7bbe5d42ab280b2e9e81de806f54313a7ed7231f71b62b6138ac767288fee796092f3397e5390e858e06e55a69b0d00f18b866
-
Filesize
256KB
MD519b2050b660a4f9fcb71c93853f2e79c
SHA15ffa886fa019fcd20008e8820a0939c09a62407a
SHA2565421b570fbc1165d7794c08279e311672dc4f42cb7ae1cbddcd7eea0b1136fff
SHA512a93e47387ab0d327b71c3045b3964c7586d0e03dddb2e692f6671fb99659e829591d5f23ce7a95683d82d239ba7d11fb5a123834629a53de5ce5dba6aa714a9a
-
Filesize
324KB
MD5e9b5905d495a88adbc12c811785e72ec
SHA1ca0546646986aab770c7cf2e723c736777802880
SHA2563eb9cd27035d4193e32e271778643f3acb2ba73341d87fd8bb18d99af3dffdea
SHA5124124180b118149c25f8ea8dbbb2912b4bd56b43f695bf0ff9c6ccc95ade388f1be7d440a791d49e4d5c9c350ea113cf65f839a3c47d705533716acc53dd038f8
-
Filesize
413KB
MD58d487547f1664995e8c47ec2ca6d71fe
SHA1d29255653ae831f298a54c6fa142fb64e984e802
SHA256f50baf9dc3cd6b925758077ec85708db2712999b9027cc632f57d1e6c588df21
SHA51279c230cfe8907df9da92607a2c1ace0523a36c3a13296cb0265329208edc453e293d7fbedbd5410decf81d20a7fe361fdebddadbc1dc63c96130b0bedf5b1d8a
-
Filesize
262KB
MD59a4d1b5154194ea0c42efebeb73f318f
SHA1220f8af8b91d3c7b64140cbb5d9337d7ed277edb
SHA2562f3214f799b0f0a2f3955dbdc64c7e7c0e216f1a09d2c1ad5d0a99921782e363
SHA5126eef3254fc24079751fc8c38dda9a8e44840e5a4df1ff5adf076e4be87127075a7fea59ba7ef9b901aaf10eb64f881fc8fb306c2625140169665dd3991e5c25b
-
Filesize
201KB
MD5de625af5cf4822db08035cc897f0b9f2
SHA14440b060c1fa070eb5d61ea9aadda11e4120d325
SHA2563cdb85ee83ef12802efdfc9314e863d4696be70530b31e7958c185fc4d6a9b38
SHA51219b22f43441e8bc72507be850a8154321c20b7351669d15af726145c0d34805c7df58f9dc64a29272a4811268308e503e9840f06e51ccdcb33afd61258339099
-
Filesize
264KB
MD5f9c562b838a3c0620fb6ee46b20b554c
SHA15095f54be57622730698b5c92c61b124dfb3b944
SHA256e08b035d0a894d8bea64e67b1ed0bce27567d417eaaa133e8b231f8a939e581d
SHA512a20bc9a442c698c264fef82aa743d9f3873227d7d55cb908e282fa1f5dcff6b40c5b9ca7802576ef2f5a753fd1c534e9be69464b29af8efec8b019814b875296
-
Filesize
649B
MD5e4c70c00d5a7b9643f9c09136910ee32
SHA18cdbb1d8d8e4e13dbc71b6306f92e791b6e57fd5
SHA25649e6e185b532d61dfdd8924e29777def7627f56534a7f1e127e88fa122095126
SHA512c331848cbe56edd5c7a19e6d8759c676d36d38ec52653ed48b0b5bbdfb2e0b6a39166b5c5a7fa577b97e87ae2521affba2f65f019b87e41c2f4b0c20d53e6e9a
-
Filesize
1.0MB
MD5c315fdfeca7f4fff62bd596addd8f1a5
SHA1b7f7b9f189eeff5d4fac36cbd4e677c872e9a803
SHA2564d27c9196b67843fd079d002e755a3a4619964d4cc74f049f7ee4fe72129d37b
SHA512a7db071eb22903361c401021e6ae837ca480c484905d966a73e27bac5823f6c899a6268897f546637cf32682d050250e8ce0777a20e91ade78b9e2321b0b2032
-
Filesize
1KB
MD5595aaa50d84f3f69bbe4a31ac6ba90f8
SHA1fc2f2d12c7a10f3b7d9b8aeeebf7e58c31c8cfc6
SHA256460669b96531430d21e80fa312eded41ff65aa82d54d1e80f2677ce14a374c30
SHA512956d471b0fd86c698921f92a03a1700b1419ec23054d31a425673a3c32819cc59aae30099f7733b895eda377a5b47c3b57bf2688af4d3a7870d83cd1ca7b7dad
-
Filesize
264KB
MD515d033f0292c18a33386477893351736
SHA19df992893211ff489518d21af6103a569d51623f
SHA256601b6015a1bb40da092e1980d082968427c2b58a0c633992d4db6dfaec0a0c5e
SHA512d9dfa681804c4cbc88fde7cea0a333b6ee57a0c901564c239582719446e193d30847269f55a2be5512101087036cc6f2c6d2827ed638bbe0698f383f9cf1f5a8
-
Filesize
9KB
MD5e81312d551c4bbc6f06800ea9a868599
SHA1433ba91eb7fd4c0f97e3f3521384616560e1a0f8
SHA2568ff9dc05b4db55c75d2c9fa8e7a385ba869a191532224995c4a756653a06a3bd
SHA512b1472c283c099e281923c5d07153ccc4228287e65b04dd275311fb175ebc26358cf81ee307dc593a40a07a28132f7fc512c2e9fced9e76293b0392299ae480d5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5dd2c4043e32c6ee130479a49c8cf650f
SHA1cb7a50ee3225a7d853b8570885110f7213920a7c
SHA256c02783b74f78e7da33b093eaaaeffddfd6f1fb662b33bae0127ce59926081e9b
SHA5121faacbf6c0c689ad980b4a4cd674d90531e155523c80094db744b423c74f18c45ad86d2755e9fa83b6a787b5b8c39a33349016be54827db5a54396a1863acd6f
-
Filesize
2KB
MD57935dc3d14199bb44e995b8d784f4631
SHA177178dd9ddff4c90f28dccd34d2146416786e180
SHA25664a941d40b17c1e1e058bb2a4e973551244b216c47272ba392d38b01f151aafd
SHA5124342563c38670b98ce452e21bcebd5148ad41ffd386f9dbb74debd2203596b819a1bf36a866962b11eba6563c12b824337f59e9062ca0d28b62b17cf2bb793bf
-
Filesize
2KB
MD512240783fed84041056b034caa2b20a6
SHA1af351cfdb2949f56548f8e445064939b0b54b929
SHA256c65ebf0da792e3cac4ac5234279d80da9ec4726b96263ad2215118dfc21420d1
SHA512f747f3ff194632c6d42dd3a6fc0844c30babfc051e5646c3eb33f6d6c08493b89a3db79fa54c0e9ad735a5d43601a1313f2acda2efe2661886e04cd12a4fb135
-
Filesize
10KB
MD56b746cd4b58ea29fb17eed1db2bf7240
SHA1b2d56c88d732135db1437b57bc8b3c967026f3a7
SHA256e9a344ae20c58421dc30e72ec28bba4f5e4055afaaada7ffbf43db38080040c3
SHA512a874091ddd34aee48ceebc59280a68b7442b56a712e6f67d296b657d639a382bd6ff565e5198b105c0cc0f9960ba70f8b2ce1a00ff1d7d3229c7a798453e059f
-
Filesize
10KB
MD5376cd9866c2931992964cf430b4e966d
SHA13b4807edf960f5b346e3f4edf9dcb2dd6149a113
SHA2562f09a9f2a10f308e1bc8946a505045d04987f8590c8a988fcf9102ddc6b6c740
SHA5128f425649404879a7102270ca1adf5a5c0731b9ef2b9e973cb215fd020a4d33c25045ecc57181715c3673f9a06d2e5ee387bcc8d8d417bf747fa55d3d128fa49c
-
Filesize
9KB
MD565c443bedf76a056809f1c96e02afae1
SHA14b3c6b19eab7540099418374869c2fa20c36da2c
SHA2560fbdc6296e8bb34b36534c4eb506d9529b34f6940d18a6f5cdc2f286c55d9f16
SHA5123f21656a8ab51cbdba181169bd4f8417e5ca00ea76c769d38534b2a63ba43e4e1ff429ea3e4d7b987853065c3b80c1ab59bd9698738265d1ecf40feb483fe324
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\96834f72-f1a7-4f98-b1a6-fddaed9b9063\index-dir\the-real-index
Filesize72B
MD515fa5ed3a329e9c3197a79dddcef854e
SHA185a68bd003d940afcafb59e07059d03bf62c5edd
SHA256f7f44d5d20d312407999499be051acb694d374926342c1c0cd5ce06df87adf62
SHA51209ac1b9f81f486763db1c6e483cd41823529c97fe1c7486ab5a0da50c37d6ad535227636384c4fd0e6656db07ac85e015c091bb093d325e2f6a78c0b27958de7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\96834f72-f1a7-4f98-b1a6-fddaed9b9063\index-dir\the-real-index~RFe585649.TMP
Filesize48B
MD5f8b215a80b47f869e459f0fc6a2d1818
SHA1c4e2edb7c9b8d52d4a9a4527a1390b10bf3474ba
SHA25626727958fc4e63bd633b0d805b0e8ee127ebe07dbaa82363fdcc8b6e1a9700d4
SHA51277307c29e992548c9a8cd78987b8e07af43f5254cedacf3361448338e1b57676f030473b3b829ca70cad860764f73b5af59aab983bcc3de4cfc68cd2ee914c8f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\fc20bc80-df5b-4d47-9913-74bdcd43297a\index-dir\the-real-index
Filesize1KB
MD5f57771f671206056749f4d1a5c30f60a
SHA192a3605d2e169ed354c9b5b26e7473afb71e567a
SHA2562eb2f199cb02d35a3fd1b65bcccf35c12978f20d94d36a618ef6c399b340ff83
SHA5120c6e490480575eac0fe249384efe627fb589120777264dcdf54062e1bad7baf46410a769726e1d94cbe1d7a3c46e3ddfa187b847e794689cb46d619deea8ea83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\fc20bc80-df5b-4d47-9913-74bdcd43297a\index-dir\the-real-index~RFe585b89.TMP
Filesize48B
MD5d94c7fb10c0172f73434fec73183dc05
SHA12233e42ea6a8ffa9d7ce216962c0b860fff425e9
SHA2564813c5ca483474e75a59fda31074d00f73e7a6fd9d4d45b3d3da3ef1af38fb8a
SHA512a7e57d8f434c480f8dcc804f8f951cf751d685afa9167477514bc1cccd5eea0e48997f0c62c764547ccf5a8300f120bad2f5e25dba6ae1667d7eef8962aa1c11
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize237B
MD5414ba3f2264415418c5916cd9cb63f94
SHA1fd122be62cfa205dd53e6034f7af1217bed55da1
SHA2563d765cf45ae5a7b00e4e6f2983a044685029b4d9a565034f8c48a044e009dbab
SHA512059a29320fd42fcf90520b39e65289b9215c52f8b71cf1b47b27e9072568f19bd9f2b47930ac3fbcda625b56bf27e949a37c9cbefd505fc4af17c625816bd467
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize234B
MD5c75abcfab8aad2de12174a23948223fe
SHA1e8d03ffa65145ddcc22597db038efc3e5ce5b5bb
SHA256cbfb48e5ab95996362fb792a7a194f3465b82a78cf3e84d1de1d94e122a2bc3d
SHA5124e814aecddb822dc26dc3349f7cb691be8e6f2fa24d59de85d8238f0b8ebe2fdf620b65a88b8aab18edac54f322f71c392d4d268a9efacb40b29af392daf248b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt~RFe5807ea.TMP
Filesize142B
MD58e53eebecffc3a86aa3bf404cbdcf243
SHA1ce5a740adc565f1da1fdc9554619327c57f97ed9
SHA2564336a1447dcbeb82b31e5841fe07f3d9894a5b80c928eb07bd1398b71b15bd3c
SHA512d544154e3c212a9e4e912f2927cd58367f7d303cef9227cdb916181a7490d5d35455024ec045aeb3291e9b8fafb54d97a6b62510db914460f07b7ca12da52bc8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5d4a57c0b3749d8a77d82b6fd79c1fddb
SHA11d0b84101cfec97eacc7213b49119a1aab0195d9
SHA256a4038736916b189ffb22e285231eb61eb81326e3efc93f630bb2413d66d7cf71
SHA51249d456ec3e5841fd0c15c4052b8724c2961c6dc697efd97a9d099055ce650f404d4202077e98ff05805d66a4a290b4725e3a8b8b70f563a28b33b5fcd156c7bb
-
Filesize
99KB
MD58b1dc736775c4e23d02e9f22d2f7f2c3
SHA157edc2cd31583b0b5fc63cb0f73d257cf5d4a6ab
SHA256bc8c410d626f4e5b0ebc5a3b92fba193758bbeed2ac2dfc794ca6251d3b1319c
SHA5122fa9da15b97c814ef2596aaeb1d8ad30c092b476f878acab762f57fe3b8782e912b63227c52a05bbc0f305a4e37b64d9901f826f7b3fde0f558a286800e4bbb3
-
Filesize
99KB
MD58f420e72ef02e6cd0c964e99ab6ca336
SHA103196b4652fadc16f4e945f681e0605114c1fb8a
SHA256f4ec33a79cedfdc75d3bdbdf90703a57f9bc3c06de8b03eb096933ae52aa8c6c
SHA5121a171b939a46df8adf9a0f7c026e91f3eb354e75fe0014127ace7f588e19577e8f3470ff2b2b677a18811db47217dd0f15cd78e855d60386412f6f6f1e2579e4
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\DEVTODEV_bb056e9d-8a46-0008-a9e9-76d03ec0b8ed.data
Filesize397B
MD5f2a94ad5b9027abe00001c1c44dded92
SHA1529f4c6eb64c50dc6f054be612cfbf6bcf1ad8aa
SHA2567dec4072e0f9e57e87dffc9ddbdc59efc0b4e8cf869c45bbb94d8761e362da84
SHA512a7c9f297065c4dad7e653da17b5e94dcb28baf7e7811a0fff472ffc72b46437a809890ed0d82ee7003cd6aebbf59714d2c7c81c32d46ec76812a979b216dfdd2
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\DEVTODEV_bb056e9d-8a46-0008-a9e9-76d03ec0b8ed.data
Filesize295B
MD53b481fa2d2974dbc47009a47a0b20225
SHA1be5dc57ce3405afc42bd49ddaeff1c3b17e87dd0
SHA2560138abdd5f8b9b93fd6c271a9fe8f221127cbcc1ed601709bee59994b615053a
SHA51247ff14d3994f5a484a1c6964fb65a62744dbb95e2f38f855244f0b668b409a429bab60f3eaeb6acee9f3ec785f0de064f6eda029e81622ca831e9ab1e1cb4fe9
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\DEVTODEV_bb056e9d-8a46-0008-a9e9-76d03ec0b8ed.data
Filesize369B
MD5d15454508825075be37b8a5a50cc3c9b
SHA103df870755ac05e1144f0baaddb014999da2ceff
SHA256b8ac353d8f2f425f69c4a6565e81b72bdaedabc4390eea39722c074a7b773e99
SHA51209ebb949da216536b7e350f3674b53b8c75d2b97291ae17268f91fa19d0cca696ef3c0db01557313cc8d47bc264a8c8bdd70829a8ba91c6ae6c4ccb55feab38a
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\DEVTODEV_bb056e9d-8a46-0008-a9e9-76d03ec0b8ed.data
Filesize293B
MD51b7708634fa3c832859a36fa74da3625
SHA1262e193bd3a3e1e842acd483f0651dc915193f9a
SHA2569b275ff076415aef9c67127a1a881af52cdea28ff511a89bd79d6f4038dd0c43
SHA51244ea31c052162cc157020c897d0f534ba47fdebfacaa0895356871697f6f53aa7a3dcca678f8071c00d62cb79ae3c9df6c0065c59b84162d6a131f30b479cd6b
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\DEVTODEV_bb056e9d-8a46-0008-a9e9-76d03ec0b8ed.data
Filesize294B
MD538e2fa211f12da60461168392e1c598a
SHA11e8ee5fc1c46d0c6ff8f430efdde4b97b6988589
SHA25660e12cc7b2e2d616938c185f63dafbfafacc38d249822eec0a7d9bf0422049f9
SHA51270fa3225eea69ed44b7195b6728801f309e75b695c9fcde613ece1e4183b2b72c5ba2d03f264878ee9d2700d760d25e2b1c8c88f95ea2ae612db2b3815326ecb
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\Unity\5fcfaf06-477f-4bc8-b78c-951dab60db02\Analytics\ArchivedEvents\172770957700002.8d3f8ad0\g
Filesize1B
MD5c81e728d9d4c2f636f067f89cc14862c
SHA1da4b9237bacccdf19c0760cab7aec4a8359010b0
SHA256d4735e3a265e16eee03f59718b9b5d03019c07d8b6c51f90da3a666eec13ab35
SHA51240b244112641dd78dd4f93b6c9190dd46e0099194d5a44257b7efad6ef9ff4683da1eda0244448cb343aa688f5d3efd7314dafe580ac0bcbf115aeca9e8dc114
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\Unity\5fcfaf06-477f-4bc8-b78c-951dab60db02\Analytics\ArchivedEvents\172770957700002.8d3f8ad0\s
Filesize455B
MD5701ed654849fb24861b8d0a05a9f02d3
SHA15eecf47d507e62fd785f19b4a2550ab5361e70aa
SHA25696e27e0c0e9ed1d787d177b0979ad95c0a09e8fd02c972ae1bf6d28505316644
SHA51269ad580160aa893827a2b48694822ca1ba8a18e0a83ea964d83bf080f52ddd21af19c537acdce08a2f74183f1c4efe3a1cd1a34fba459a82c4e11fc8c5dbdb32
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\Unity\5fcfaf06-477f-4bc8-b78c-951dab60db02\Analytics\ArchivedEvents\172770996200003.0db2e883\c
Filesize1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\Unity\5fcfaf06-477f-4bc8-b78c-951dab60db02\Analytics\ArchivedEvents\172770996200003.0db2e883\s
Filesize456B
MD5922db9f4cdd47ccf12f1c4b080613149
SHA1fa51f8802cd21bdad35a0d0fa875a651833bfb83
SHA256c21880f1492c5cc4271a5bcfe4c4cdf459276998817c4890be82b0cc329e31be
SHA512c936690a13a811b45e9025f3e7ae4095af94c41bfe5ebd9ecc0db8d17dd19455d23eab5d8019efd8dc8b449a4f677e0ae78d525df8e7cc78721dae43b1c2689d
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\devtodev\bb056e9d-8a46-0008-a9e9-76d03ec0b8ed\networkStorage.dat
Filesize372B
MD590859e8ea18b85b860ea2c4a618aba7f
SHA1fc593f1a15d205f28d28fda2416f1d4c68450a7a
SHA25672896f4a93b4011be4fd0d38e6761df4e08fd904d245e9cdf5b3b9cd587ac96c
SHA512b30aa18947f9acdb212848e0357a5421c1f25e40a1feba9687220e8ae7d339ea0eaa02fc48d540a3af4d315b14e6b3a2bfd5ea016d34ab7fdffb5938e9766b30
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\devtodev\bb056e9d-8a46-0008-a9e9-76d03ec0b8ed\usersStorage.dat
Filesize1010B
MD5d8a3bec9145e5228f0b779a7af323c90
SHA13bf7b41d76a823a649aac6a40664530bf17ff06f
SHA256e00723127b3a0b3ffba1cd3db7c209129c15e31e46f2b6a657753d7f3c1462df
SHA512485631fde6dc31ac404e108780809059e9158a29ee9d99551db64e488643c81fd21a26aed6c8cc8accaa8d930b87157a7756ee25de26573c9542c4873ed48885
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5d355b89d4edca5fd34ae61d57915f6d1
SHA160e0ff0f4c0330135df9425e1e9e6ff415059ad1
SHA256b389df39cb954afa40f5229465b4e75edad914e1179da545f486fd87dc4deac3
SHA512bb7bb97e7c7bf5b0eb734f63e6ba09c343bb2b03651b2932e86683a14f35399d55af8e3732aac8ca5b66ee588260acc59f275177bd9d96a4b8975426b740d663
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5dd1c3e4117c0d421f962e1201064e0f9
SHA1fedf2090dc6f4a1655cadb61d8304d85b59997ab
SHA256aea8b375c017705affe497a9641e7fa5ea31c50e889a60c80eb77c7a787289d1
SHA5124482f0d0057368251853e44e717ea5174b7806b1fa16aab2a49b06e0e9302c55fd6ff69c70ecd638a0e733417375a0655e6b9c5e223bb915234c1ab0434082b8
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD55ec3ba45e667be3493f506672782adfa
SHA1b822bf2eb7d4576662d9ec3e6fb4bb937dd1bd64
SHA25640f0e50a4d08c8f6053779426e170cffd497a695aceb99e7913bb65b1fdb6f9d
SHA5125778c7e72e8fdcaeab913ac3564e6fb6d10760628879efed5774170a739d8c5adc291ff5b8e3aef230531d54f9aad1683cbe4924842a35f17b731df48381314a
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5a9d2615596b47518eead5430136d51b9
SHA1fef5ae8aa4ddfb9da42bbf6a314b7900c7a593e3
SHA2567f4d2989092d2e2e80388e675aef0e6d7fb64027b3d54bedee63187f04441f8d
SHA51278a4c36944fd435bb25970c3443ed13f9cc3b0c5dbc1264fe6d7a9b8198c04738d83cd129ac64dd3e4ee23b7d8c18ec4f45d6506e500a154b35872b2dafe39d2
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize269B
MD54cfb766fe21603531f1283e63c066059
SHA1ef224cac7a65d8b52a5c4d963d49e6885d96756b
SHA25615f406b7805234f9a54df290da800696da93f9ee9daa5303c47eb219de177548
SHA5128846b8e6bf5bf3101d3d717e089c3aea7858aab1c52681359f4c9e81c426ea05a3f0909e7a1ba0876032904f25027da2c3dcdb68036ce46d7187ac037dde276a
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize306B
MD59b1e6e89b631e9a5152fa73837ff197c
SHA120bbb04f7bf8d9f12b38fe57a68128e48088bde8
SHA256f2dad3497b61b0784cc4770c8c6f6298abc84b28693ad578f119130b7e37da8f
SHA5123b6f22a74df6de3f1c4763e50ad3c74477c5d4c6554a94db33d0a7c64e86075c44459fe7716b58fd829ecce5c822e55d1f6eef88fd6ac10bb92d09cccae4f4af
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5fc1f536818e27e9e0ee9646dc514dc64
SHA1d224796d03520d1b257330b0d4ec3184e998ea50
SHA25685c0708ba8b25b1dd7e7cdacc0b10fa85aa43a3f67bc40cd2c12f1813e58dc7e
SHA5120491e830a662ffbd51a1a01ffea9540c0195b7444b6fbdb59480d447815eb7e37e95355b1aa1b46c53887f6e9a3317ad8ea19dc2bf41eb5d9515b50d74104a6d
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5cd844edc4620ece6da8704e26b6ae8d5
SHA17fb5f256cb59e6878c7bfc160c468f8a4abd32b4
SHA25646a57ed0ab919b40765da6a2159f4478b1cd5d1cb8931f23dc272de945002adc
SHA5120be654d87f3107c0d3a191af479bb93bcb52c3795f00037d424d83efadbb6451a5898244e957e71431f5ba836b80824f368ce8953835244f72ab1e65550bd760
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD59d7ad32c758606bf9f150c3aa810e69f
SHA18568f53737a4eab5ad33a5cfab072a8bc362f862
SHA2561e2361a301e4a6e5d662d4e0a29d6e2437667c39badca90f7011fd0ac9a6fbce
SHA5122dc740f44668c905483a4d6b9f1d54128a87ef349cb5627e6e4353aa8319173140d31c4ff22c569eb104f718110d0fefabb9509c9fa644b1e0ac2f3ffdbe0f3b
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize335B
MD588d50b57aea4a02a30fd60ac1de65680
SHA17a180ca35e9be85de703c1f03b64e5f7f94eaeed
SHA256c15c08d0d120fe70039768f96c8e169184a9398e02b9064ed4d12514817ce2f3
SHA5128ac50d221fc0081bf9e8821bf90670c569279a7dc45fdf57ed3c907185c3f933dff409ff3a3c96d68a1220f0b5d72b370ea1079a78c4ac5c21da62cbc7094fa5
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize377B
MD50de38ac56993479adf7691ed652d8a50
SHA1335075fa9a52960406654ac277640aaa0ea41bcf
SHA256c8af6c3a79f54253243d2141e276e105baa17601b9399b644baedefcd71f79d9
SHA51243b3583320b97b4ac5e4c1f1bf6f8419247daa7ef42fa11125aa9371d43853657f56e3be31aa10f7c13d4326ec6f7a3e86dbef8fb36d8d86f87160a67685f4e2
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5b2479b4c984548a36e9160cb52809c55
SHA18fb1295c99c26841d14e3e014e3dd5a9a5b8027f
SHA256c9904c77f00f6683ba885b93a8f44e83125e15feb29f3dfcc13bede66cdbdb12
SHA5124393503ab14265edbfa3e812eef0f7a2e615831f5593b6fd7911dd2de91362d0e9032d0067c405e7bf743014385fe93a8070d372277daf9dc4315a7b0397d33f
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5f96929a7ab9fa8ca5cd877a3dbd75831
SHA18f9aebaecc682794a2c2346e543edbfeedfafc33
SHA256553c51d9cc8f3c75a2d5e88e372fcf7062866f9c5bbe5eafc1f05fd50900a9f0
SHA5127532cd66b25c70127702e194e75af5dbb59e2b3854e6d95f0252163c9d02c49a75a64edae732ecee49ee7ff3d633f764f2850d6bf295aa6d035ec872b6178251
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5d1fbe5a9598017b5dcadb49c3972415a
SHA1eed07c292066d0fab8449b373aa8bf120c450797
SHA256adafcb3eab980b61a9276d80ade300a0767b924c8a26b3f79d643c01f1cc6d9d
SHA5128bd996b14c6aa78bbaa62e998acde85fd0ca4c92476d4f24a73df5f0f8a14339587ef9bd5a286440a77770ab041414475340e0b4aada36d3dda70d18fc84aa61
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5b14bc252998710865fe412cf3b608185
SHA155bcc4afca8220faf61541a11f62d129a47a0a1c
SHA256df259cd3ece190a10f2aa411bc39f19eea786eae7c79d0c1896eddfa8b34db96
SHA512cf3ff6f662f9a30309dae36c0c07f84788cc6f576e8c899cf8f3ba5613aa37d05a90abdfd9bad66faef971668cf747761d15007b78af5fe9bb7b3d46d0d5585a
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5650f0b309c485dbbc28406b6bc85e8bc
SHA1e13bc41fc9fef2654a1d4afa7d5747da7a2687bc
SHA2566d5ce78ba742f38815bccbce3e538ac85f49aee3a513e8bca5e87231a5593259
SHA5120fdf12851a819e84dc0dc80a1f203406841ad4dcffa5c026dcbb9a5c1a965ccbd8019e28141b04c15973cc6c79325f49214b5567c540a7916df7f2401385efea
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD566ff70fed51d51b8b10c0aef3b4ec5d8
SHA1b4364fab447c7dd33d25406ab45623b11aa2ed28
SHA256560b5519b275770d28f05bb2df7b02ad225e0a05026c286096a751a0f237d46c
SHA512892df641300a4b74cdeead26be73719b8bce40fb43c3d10008da8c4c86abb935522426b22e258cfbd4bbceef29a0a0de1c44e947b7671e651a4faa4cee1361ce
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5246343dc7d6a78cc3babc2e3931fba13
SHA18ffd439b83e0c9873090c04c25d1bce76876d00a
SHA256736ca00ea961472f864d0179f52700f6fc7243caa528a32b2c3f8205f3a63890
SHA512496ddc847220599feff7d12e5ac7476124265a752dad7df54592887a891afa0d873909cfda320064cebe331630ee4700335ab6e2427a739fe28f227ab6848fd4
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5624f3caefab4d897c364ad8e154a8d68
SHA1871fea840ad58055e18574f34ab8a559db2fee42
SHA2569473cb4680030b3d6e82a9036ed8895371b51c4f002b36afac5fe60d51e0b68d
SHA5127afe7f0944df6edd7dfdfe4516f39c72b2c4894f80c6657e2a85d9d5c03e7f609c585b9070ec12fa906f0e73bdbcf42e3eb83394fb99d5c4ed32fbfe88f57573
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD527d85c76f12c64814e5f8a6398e8ca4f
SHA188fa67f7d17df092ee424cdb1dd6a42a59c4f37c
SHA2563f43424b385ea9742386a157a4a345438b73ca9cbdb06812214efda000d55e6f
SHA51204cffc775b72cb16f9cdefc0d917f0a91803115040ed2a107bcae8b5ed8b5f98b3fe5e27b53978cf96e87ec4f5058e313c58a23628d6625c4d056d7da1aec83a
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5d935ae2d8e7646ac57fb45ed7600ef38
SHA143ea86414718cfdd16745780b9ff08ec5c7d6f2c
SHA2564d6137f4fa1c4c92f70f2d6b44923c9750db5aee6512fbd89f88205589c8e354
SHA5121ddd0a03af562acc7276de26543c8145f22269dfb00aa8b342ba0d214a2d7038a3a2ca42a8f6b8dee474cdaaa89b91a7a59d65f3c19bda652432b590fe3b9449
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD58eca35f5f228c791375682f23cd20f6e
SHA1bc02c85e93dc97bc7d9441f4528902681c35803b
SHA2566378a0ad1c50c23547e6162319ef54d18bca63fe40d06edd16ff2ec388441a0d
SHA512cc487b2214ab060b6083b24b52b511f68a8de76694872cd68f8c8a45bc989041d92503e59ca324d5d39e0233126fc9733fed6e22412ccbb45b38c87d8f15543a
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD57eb38957b917cf5bf18b341559b7bb76
SHA1f1f49d5885c0402ddd408bb1c262db26a7844a59
SHA256f9359d1a99eae23f1f914580bf077bf2a4700c3f3772cc3476504ce7d36ed102
SHA5125b9222e6c415da29c41e8476f24758d54b0d4a43f3a3c8f5d69cddee604ae37a6776356df293a6f3c28f600a47f27f6436d4b177e655ac6f80808d0fe8076e8c
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD575094c4ef4cc0005b106fa2c2039f285
SHA1a6b7996a6ac1bee6b4caf466b7431dadd48aef65
SHA2569b1713aa366edf59ee98da263bb5d21c7552d0e9a05f65e2ba78485040ac1991
SHA512b626576da037abdd8a5f756cf548a30d40cd82a39dbe69e77e7ee3f954e709601a430a4d89fdcba67fad2a787a151dd24fcf8f57da582f120f6c7d9798a2ceb0
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5d06c87b94bc66ad5103e1a43e6f9195f
SHA1adc0e79bb7c076443e37a0e9f58e2d19c7fcd040
SHA256866abee38e70c77cb2f98e6caba13d3b2741207748420d3ee7d42deef71785b7
SHA5120abdb99046386d38e871ada6526adeb2b991d3d52dbd5446eccf0c4c6372be9eaa411974bd43444322ccff8aa1087c597dcee2841b22fd7c294656246f2ed441
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5204a00b57afd36171ec52128ffdb4e69
SHA1e59deada13e2be1f018e0fd164121e9e22a0b49c
SHA2565c22fa8913bcd97ac695a3e078e6cd136b340000ddc708d8d73862757484c288
SHA512f9628af7465c373a9e3bdff90b825b4a3d5d0bbfe8e1d7baa8a09dfa8f30a6f9c4a716d3de318ed254ad6a7207a25d5eb57fad6f7ccaa37c4ea8c76628f7ff04
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5f39362d484b584018997137a8ee51189
SHA1bf7eacdfd65e3ddd10b1b77d8fe606832fb760a1
SHA25696c3d399861ba61de9c7b5f4da30e72874d3553f5e0e39d411edf4619ec379b0
SHA512b61215bbc9424972becfaedc9935b40893be18104ea0ae681ed8298361e05b32cb138a706ca28c2a852543ccd1ed1793e6d89a428c23e73c5cb81fb576093209
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD594fb7e58d52a2a7ad8e0d62b769e2f28
SHA11c66f2575c314ee214cfea83eacf8b25c5ed1a79
SHA256660d2082ac83b8bebb8cfc844585871905b717e140124fde8478b7c26f901ed9
SHA512295033d1e9b86eefbdc1763e3fca51385669c0f38654ecba1e49309ecb4bf2ab4a5755032a56acc3fc58271e842f4d732dc7aa05e82ceb11d600c523e5ca8b28
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD568144419252e79444e4e96b7b60f0e8b
SHA17e0e3a419b83b5af9f751e4710211da36c253c26
SHA2561c7f0dbb0e33b96c2e86da66d4bddb0e9b6da3d887109beeed997c04ebf8ded6
SHA512e0c7e5b8ddd4abb6ddfbd7be1ffc825710b176eb42e828ff3216849cc79e3ed2776bd0b73e986d96978a8760d64ee86af2600cac4181b46bd9cbab1b5ea1d666
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize5KB
MD511aa2e619824607e7bee4cc85db11246
SHA1bb08b23ddd6a7eef4c6e42aee7343f7277fe1749
SHA2561b9f1b0e623ee720f3f1ffb50b641acbe8565e22c2d2802b35c936bdfa05d4c4
SHA512d8df5352bc7edeedcf1167d743142e60f27790f6d1f216cbf2a8ca6af28f14add61c31b9b4b79ed78002014aae19e8e078c2cbd6295fee64393d3458a75fbefc
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD5fb5d67d4586962d5752ef3c402dbda58
SHA1ea5f2173845a51347ee995c1f76240271e8e9b2e
SHA2568abdf24ff30dcd10616b5f32bbe8c14a48e130f802ecc4fde4083a3d37d1cd06
SHA51270a664e35797b3afbaf3e8e3a092db9643e68157d3b625a85b09233bce306b15750bca1d0218172be9694a9fd6d63aa6945aba3feebcd4c7ff0bb072df558935
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize5KB
MD55c5b39e3f43106c8233a29e7fff3d79f
SHA16f69838577a7ce6606cdadea7c08a4e000a57c4c
SHA25646ade0a09c58609b95d928c647f84cb9d104368ec5c62e454a67e7f0c78ad817
SHA512e3f3010db16ca5a790c9745a69f084f4872bcc99d646fffe393af10bc359bdab4b18c0073f0ed31b4066aadf498c3336d977f3525e29ef3e79b6aad6649442f3
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize4KB
MD59c5b06405faf71ca70264ea6c4008129
SHA123747e94d46ec3e52f4c3990c0d4365f94258062
SHA2563bd3ff07181b532d337484ad592af11452926ccd3d4a23aac7c08115eac9b050
SHA512938557dec105a8ff07f88e840297ae51fc27c64498b5e0c10937b9c1fbb7205b707390978920fb9d97a3bb7cd9649e99623b44246eef5cb1de7d3828b1c3221c
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize5KB
MD5fe70ed88747d40e29aef68c2ab62baff
SHA1617e489a1b940192d8352083ed85378967e87bb5
SHA2565812124257553a2d4ecf38aafe240ff62240599a030dce0d03ac0a5e73191c24
SHA5123b4d5e257dae538e25bb5b1978ec1578bb08d694efefe00426455730d46cdbe848b54dc7fa10639f44da388c221bda4fca26d49c0efb50e8969e74091eadf2c8
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat
Filesize5KB
MD5949ff089f14da2603f61856327652f4e
SHA17d678eedb1963faa01ebaabbc628f689f6d1b410
SHA256fa4963ddb5003853e5654b8b74b0f37ebdf4364809bd95e5bd40fd3d8c273b2f
SHA512aa40fb65295a7a4c55a23ade54158ca79cce51a1c18a11278fee8e8b44a0d0e52e3eccd568f81c6f88863a9787ce2454836c8f166c6a30d0b3f415dcbd7966f1
-
C:\Users\Admin\AppData\Local\Packages\GAMETROOPERS.PixelWorlds_334sksj6ker18\LocalState\playerprefs.dat.bak
Filesize210B
MD5efbcd29f5af46ec1a3de89e85bb06be4
SHA1083de1cf7d1acd72baa67c36f55fe647b6ae3481
SHA256a9e3dac70926c37c821bb4d9b13732a3843cd179acdc80d062280e630d78a481
SHA5126513eebba58f6bbffa4303bdfae2a9fbd1d9e9fe37b77f80116c8bd7434396e3b33fd8f2822fe2d9467a35100827e33cd8ed68eab6643305db43af8051e5a912
-
Filesize
767B
MD534cca4c81b7d2610baf89f9ad0f23950
SHA16ffe0c17586df7f1c737324005832734c1bbdb24
SHA256b503dc997f4ec6f3b29f0e786428ab263d6556e867b0f60a45852cbf1e4eaa42
SHA5124089e96dd24fb201f83e1eaf020c5d4906d09dac0177d05e6c7b983bc093e940f0c0b5da3f70219dbb81315e9f3f80508d4b0a4b14185417184c8b4db32718ce
-
C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{974FEAD0-B189-4EF5-A668-4FE6A1285A99}\ADDRESSES.TMP.FILETEST
Filesize28B
MD5b6d520474c5e852738d57bd6249b22b6
SHA1c0511c70f85357ae6011b46a55ab51d15d114502
SHA256029e56ad5c2da0b8f305c3c2ad73204822e5f64e1aaea803bfd3fbc57bd47e91
SHA512b2807d55711acf86adc2b347f5edca567e84c9be2c2da48d68788b8cb30a991584d9a626b2af40a72c632625b05c62a8647e0edc119717b85b63d2224f5e41da
-
Filesize
380B
MD5401235c19897cbd2da44c8e02a35843b
SHA11735eaba113ca36eba04e6d2696235bf30e79cb9
SHA25613b6ace1e33dba14705dd1a5a0c494ca1388cbadf78634b1e944b99dd42ef2cb
SHA512d538377e3b5c127f93b15055b3d34d7995282585b9feb92fa69bf45cb0592a3b066e7ac4b376cebb995094ca8c08b988afb94f91d3667d60f8c771921d491e54
-
Filesize
1KB
MD5a10f31fa140f2608ff150125f3687920
SHA1ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b
SHA25628c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6
SHA512cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12
-
Filesize
26.1MB
MD5e0f666fe4ff537fb8587ccd215e41e5f
SHA1d283f9b56c1e36b70a74772f7ca927708d1be76f
SHA256f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af
SHA5127f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a
-
Filesize
74KB
MD5cd09f361286d1ad2622ba8a57b7613bd
SHA14cd3e5d4063b3517a950b9d030841f51f3c5f1b1
SHA256b92a31d4853d1b2c4e5b9d9624f40b439856d0c6a517e100978cbde8d3c47dc8
SHA512f73d60c92644e0478107e0402d1c7b4dfa1674f69b41856f74f937a7b57ceaa2b3be9242f2b59f1fcf71063aac6cbe16c594618d1a8cdd181510de3240f31dff
-
Filesize
246KB
MD5f3d1b8cd125a67bafe54b8f31dda1ccd
SHA11c6b6bf1e785ad80fc7e9131a1d7acbba88e8303
SHA25621dfa1ff331794fcb921695134a3ba1174d03ee7f1e3d69f4b1a3581fccd2cdf
SHA512c57d36daa20b1827b2f8f9f98c9fd4696579de0de43f9bbeef63a544561a5f50648cc69220d9e8049164df97cb4b2176963089e14d58a6369d490d8c04354401
-
Filesize
2.0MB
MD5b83f5833e96c2eb13f14dcca805d51a1
SHA19976b0a6ef3dabeab064b188d77d870dcdaf086d
SHA25600e667b838a4125c8cf847936168bb77bb54580bc05669330cb32c0377c4a401
SHA5128641b351e28b3c61ed6762adbca165f4a5f2ee26a023fd74dd2102a6258c0f22e91b78f4a3e9fba6094b68096001de21f10d6495f497580847103c428d30f7bb
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
2.9MB
MD59be071ab621cbca1d6ad6622a7bf0ef7
SHA1b75d20ddbdf2c0d062445ad63a205d06f630bdff
SHA256e02abc3295b9ca6cfaec064a377f6dc14bba2c3577e8bf675b8430b275d23a56
SHA51238a083d4c561c415e3a74f711e6f5323c0c500bc477ccf27147a76576023ede208e32117caa18d6df8e85cbd7fb0011735051493ec53ca1b0dbea76285780f88
-
Filesize
3.1MB
MD59aa2acd4c96f8ba03bb6c3ea806d806f
SHA19752f38cc51314bfd6d9acb9fb773e90f8ea0e15
SHA2561b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb
SHA512b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d
-
Filesize
28.5MB
MD5752277e8f6b2accf68cba46efe1ec393
SHA1d6f2fc8cdca65d02ecee13c7c6fe4453bf75a9e0
SHA256e9e4a03f66cace12c08545330894aaa5e1defdbf97f6dd779111b5a4dc339c53
SHA512d4ab6d6b58a888c486c78632a878ba0a6a28ba80a32cfee972bfebb5847b13934565cb99fdd882d008358970c10cf50c45d24ee8ef8df7c3fe8e67c49d0d7676
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c