download: | CheatEngine71.exe |
Full analysis: | https://app.any.run/tasks/d4c31c99-2473-41c0-8942-2d9ed545e60d |
Verdict: | Malicious activity |
Analysis date: | July 12, 2020, 08:49:32 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 7CA7C30961328CCB7C1DABB572976F33 |
SHA1: | 299FEFF2644991498D65FE9FC59099E715C59443 |
SHA256: | 8D073591D3777ABE813459633FEE2C2812192D8F6154227F50264FEE616B4311 |
SSDEEP: | 393216:wGQDevWDkHk+hotioyhE/u9Ho7H/mGaXjYr/l6BPCpf7M8DhID3vOTJdWSlKZN:HQxgHkAEFu9IzYjG/oaxMmIDfOTJISlG |
.exe | | | Win32 Executable (generic) (42.6) |
---|---|---|
.exe | | | Win16/32 Executable Delphi generic (19.5) |
.exe | | | Generic Win/DOS Executable (18.9) |
.exe | | | DOS Executable Generic (18.9) |
ProductVersion: | 7.1.0.9 |
---|---|
ProductName: | Cheat Engine |
LegalCopyright: | Cheat Engine |
FileVersion: | 7.1.0.9 |
FileDescription: | Cheat Engine Setup |
CompanyName: | Cheat Engine |
Comments: | This installation was built with Inno Setup. |
CharacterSet: | Unicode |
LanguageCode: | Neutral |
FileSubtype: | - |
ObjectFileType: | Executable application |
FileOS: | Win32 |
FileFlags: | (none) |
FileFlagsMask: | 0x003f |
ProductVersionNumber: | 7.1.0.9 |
FileVersionNumber: | 7.1.0.9 |
Subsystem: | Windows GUI |
SubsystemVersion: | 5 |
ImageVersion: | 6 |
OSVersion: | 5 |
EntryPoint: | 0x117dc |
UninitializedDataSize: | - |
InitializedDataSize: | 53760 |
CodeSize: | 66560 |
LinkerVersion: | 2.25 |
PEType: | PE32 |
TimeStamp: | 2016:04:06 16:39:04+02:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 06-Apr-2016 14:39:04 |
Detected languages: |
|
Comments: | This installation was built with Inno Setup. |
CompanyName: | Cheat Engine |
FileDescription: | Cheat Engine Setup |
FileVersion: | 7.1.0.9 |
LegalCopyright: | Cheat Engine |
ProductName: | Cheat Engine |
ProductVersion: | 7.1.0.9 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0050 |
Pages in file: | 0x0002 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x000F |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x001A |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000100 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 8 |
Time date stamp: | 06-Apr-2016 14:39:04 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0000F244 | 0x0000F400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.37521 |
.itext | 0x00011000 | 0x00000F64 | 0x00001000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.7322 |
.data | 0x00012000 | 0x00000C88 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.29672 |
.bss | 0x00013000 | 0x000056BC | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x00019000 | 0x00000E04 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.59781 |
.tls | 0x0001A000 | 0x00000008 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x0001B000 | 0x00000018 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.204488 |
.rsrc | 0x0001C000 | 0x0000B200 | 0x0000B200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.14412 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 5.13965 | 1580 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.47151 | 1384 | UNKNOWN | Dutch - Netherlands | RT_ICON |
3 | 3.91708 | 744 | UNKNOWN | Dutch - Netherlands | RT_ICON |
4 | 3.91366 | 2216 | UNKNOWN | Dutch - Netherlands | RT_ICON |
4091 | 2.56031 | 104 | UNKNOWN | UNKNOWN | RT_STRING |
4092 | 3.25287 | 212 | UNKNOWN | UNKNOWN | RT_STRING |
4093 | 3.26919 | 164 | UNKNOWN | UNKNOWN | RT_STRING |
4094 | 3.33268 | 684 | UNKNOWN | UNKNOWN | RT_STRING |
4095 | 3.34579 | 844 | UNKNOWN | UNKNOWN | RT_STRING |
4096 | 3.28057 | 660 | UNKNOWN | UNKNOWN | RT_STRING |
advapi32.dll |
comctl32.dll |
kernel32.dll |
oleaut32.dll |
user32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2392 | "C:\Users\admin\AppData\Local\Temp\CheatEngine71.exe" | C:\Users\admin\AppData\Local\Temp\CheatEngine71.exe | explorer.exe | |
User: admin Company: Cheat Engine Integrity Level: MEDIUM Description: Cheat Engine Setup Exit code: 0 Version: 7.1.0.9 | ||||
3428 | "C:\Users\admin\AppData\Local\Temp\is-2UFVE.tmp\CheatEngine71.tmp" /SL5="$20138,22591019,121344,C:\Users\admin\AppData\Local\Temp\CheatEngine71.exe" | C:\Users\admin\AppData\Local\Temp\is-2UFVE.tmp\CheatEngine71.tmp | — | CheatEngine71.exe |
User: admin Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 | ||||
2912 | "C:\Users\admin\AppData\Local\Temp\CheatEngine71.exe" /SPAWNWND=$20132 /NOTIFYWND=$20138 | C:\Users\admin\AppData\Local\Temp\CheatEngine71.exe | CheatEngine71.tmp | |
User: admin Company: Cheat Engine Integrity Level: HIGH Description: Cheat Engine Setup Exit code: 0 Version: 7.1.0.9 | ||||
3476 | "C:\Users\admin\AppData\Local\Temp\is-L0SJU.tmp\CheatEngine71.tmp" /SL5="$3013C,22591019,121344,C:\Users\admin\AppData\Local\Temp\CheatEngine71.exe" /SPAWNWND=$20132 /NOTIFYWND=$20138 | C:\Users\admin\AppData\Local\Temp\is-L0SJU.tmp\CheatEngine71.tmp | CheatEngine71.exe | |
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 | ||||
2716 | "C:\Program Files\Cheat Engine 7.1\Kernelmoduleunloader.exe" /SETUP | C:\Program Files\Cheat Engine 7.1\Kernelmoduleunloader.exe | CheatEngine71.tmp | |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3144 | "C:\Program Files\Cheat Engine 7.1\windowsrepair.exe" /s | C:\Program Files\Cheat Engine 7.1\windowsrepair.exe | — | CheatEngine71.tmp |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
348 | "icacls" "C:\Program Files\Cheat Engine 7.1" /grant *S-1-15-2-1:(OI)(CI)(RX) /T | C:\Windows\system32\icacls.exe | — | CheatEngine71.tmp |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 1332 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2876 | "C:\Program Files\Cheat Engine 7.1\ceregreset.exe" -silent -dontdeletecustomtypes -dontdeleteversioncheck | C:\Program Files\Cheat Engine 7.1\ceregreset.exe | — | CheatEngine71.tmp |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3368 | "C:\Program Files\Cheat Engine 7.1\Cheat Engine.exe" | C:\Program Files\Cheat Engine 7.1\Cheat Engine.exe | — | CheatEngine71.tmp |
User: admin Integrity Level: HIGH Exit code: 0 Version: 6.3.0.0 | ||||
180 | "C:\Program Files\Cheat Engine 7.1\cheatengine-i386.exe" | C:\Program Files\Cheat Engine 7.1\cheatengine-i386.exe | Cheat Engine.exe | |
User: admin Company: Cheat Engine Integrity Level: HIGH Description: Cheat Engine Version: 7.1.0.6341 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3476 | CheatEngine71.tmp | C:\Users\admin\AppData\Local\Temp\00160D33.log | — | |
MD5:— | SHA256:— | |||
3476 | CheatEngine71.tmp | C:\Users\admin\AppData\Local\Temp\is-M10S7.tmp\ywotwxsdesej.dll | executable | |
MD5:B382C0F4256C94B07D8E2899D04DD707 | SHA256:0D1999B3811EDEDF369CD2B6B4531193071068BEF9386B46E1E1C2A56AD131D2 | |||
2912 | CheatEngine71.exe | C:\Users\admin\AppData\Local\Temp\is-L0SJU.tmp\CheatEngine71.tmp | executable | |
MD5:7106914495C87FFCEA0D5600C205D061 | SHA256:1C31DA35128DB77EB6248275C5033CDDC69F7A6C45C21FA192EB1CCFF91759E6 | |||
2392 | CheatEngine71.exe | C:\Users\admin\AppData\Local\Temp\is-2UFVE.tmp\CheatEngine71.tmp | executable | |
MD5:7106914495C87FFCEA0D5600C205D061 | SHA256:1C31DA35128DB77EB6248275C5033CDDC69F7A6C45C21FA192EB1CCFF91759E6 | |||
3476 | CheatEngine71.tmp | C:\Users\admin\AppData\Local\Temp\nsd144517142160\css\sdk-ui\browse.css | text | |
MD5:6009D6E864F60AEA980A9DF94C1F7E1C | SHA256:5EF48A8C8C3771B4F233314D50DD3B5AFDCD99DD4B74A9745C8FE7B22207056D | |||
3476 | CheatEngine71.tmp | C:\Users\admin\AppData\Local\Temp\nsd144517142160\locale\BE.locale | text | |
MD5:411748400CD72340BCF29E34F539340A | SHA256:2C9E5A82C1EDABE537C04C330A87332FAA1188A4BA3394084E756E9AB2F0066A | |||
3476 | CheatEngine71.tmp | C:\Users\admin\AppData\Local\Temp\nsd144517142160\locale\AZ.locale | text | |
MD5:90A482EF6F51D900B5F3FBBFDEEEDD8B | SHA256:254679039A064418809EB8C9187C0D6588A0F2E44C671B77F79C82806C900750 | |||
3476 | CheatEngine71.tmp | C:\Users\admin\AppData\Local\Temp\nsd144517142160\locale\BG.locale | text | |
MD5:C77A1F22BC00991DB483DAAD060C21B9 | SHA256:F3CFC4B300D6AC056CD21934C9A4CEFBFDE6531905323F08BF1985F9F3867DA9 | |||
3476 | CheatEngine71.tmp | C:\Users\admin\AppData\Local\Temp\nsd144517142160\css\sdk-ui\checkbox.css | text | |
MD5:64773C6B0E3413C81AEBC46CCE8C9318 | SHA256:B09504C1BF0486D3EC46500592B178A3A6C39284672AF8815C3687CC3D29560D | |||
3476 | CheatEngine71.tmp | C:\Users\admin\AppData\Local\Temp\nsd144517142160\css\sdk-ui\images\button-bg.png | image | |
MD5:98B1DE48DFA64DC2AA1E52FACFBEE3B0 | SHA256:2693930C474FE640E2FE8D6EF98ABE2ECD303D2392C3D8B2E006E8942BA8F534 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3476 | CheatEngine71.tmp | GET | 200 | 34.252.94.12:80 | http://rp.ginihehen.com/ | IE | — | — | malicious |
3476 | CheatEngine71.tmp | POST | 200 | 52.212.91.170:80 | http://rp.ginihehen.com/ | IE | — | — | malicious |
3476 | CheatEngine71.tmp | POST | 200 | 54.229.112.10:80 | http://os.ginihehen.com/ | IE | binary | 907 Kb | whitelisted |
180 | cheatengine-i386.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQrBBNpPfHTPX6Jy6BVzyBPnBWMnQQUPnQtH89FdQR%2BP8Cihz5MQ4NRE8YCEApHW9r3lUwb8nfH7cb2GTo%3D | US | der | 278 b | whitelisted |
3476 | CheatEngine71.tmp | POST | 200 | 52.212.91.170:80 | http://rp.ginihehen.com/ | IE | — | — | malicious |
180 | cheatengine-i386.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2Fz5hY5qj0aEmX0H4s05bY%3D | US | der | 1.47 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3476 | CheatEngine71.tmp | 54.229.112.10:80 | os.ginihehen.com | Amazon.com, Inc. | IE | malicious |
— | — | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
— | — | 52.212.91.170:80 | rp.ginihehen.com | Amazon.com, Inc. | IE | malicious |
180 | cheatengine-i386.exe | 104.20.174.30:443 | cheatengine.org | Cloudflare Inc | US | shared |
3476 | CheatEngine71.tmp | 34.252.94.12:80 | rp.ginihehen.com | Amazon.com, Inc. | IE | malicious |
3476 | CheatEngine71.tmp | 52.212.91.170:80 | rp.ginihehen.com | Amazon.com, Inc. | IE | malicious |
Domain | IP | Reputation |
---|---|---|
rp.ginihehen.com |
| malicious |
os.ginihehen.com |
| whitelisted |
cheatengine.org |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
Process | Message |
---|---|
Kernelmoduleunloader.exe | Kernelmodule unloader |
Kernelmoduleunloader.exe | Setup. So do not show messages |
Kernelmoduleunloader.exe | attempting to unload |
Kernelmoduleunloader.exe | SCManager opened |
Kernelmoduleunloader.exe | count=0 |
Kernelmoduleunloader.exe | setup=true |
cheatengine-i386.exe | setDPIAware |
cheatengine-i386.exe | p3 |
cheatengine-i386.exe | DisassemblerThumb init |
cheatengine-i386.exe | arm disassembler |