download:

download.php

Full analysis: https://app.any.run/tasks/083073ee-0496-4a39-a677-a125a810d473
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: November 08, 2019, 17:45:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
adware
installcore
pup
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines
MD5:

30B0963A41BA4EF9DFEBFA6CAD86845E

SHA1:

DBA6D90562D18C5EC55D4ADE978E9A7562C29341

SHA256:

EF95038E2290B01CAC55FDA5918B58E77155E53A0191B959A230A636B6049E09

SSDEEP:

384:+CMLS5O4/IjlfGKZIJkI7/Pm2DLeQUvrtjM0Mk6uW:+CSSU4/HKZIF7/PVDLeQUvrtjM0Mk6uW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • CheatEngine70.exe (PID: 3768)
      • CheatEngine70.exe (PID: 1252)
      • windowsrepair.exe (PID: 3012)
      • Kernelmoduleunloader.exe (PID: 2436)
      • Cheat Engine.exe (PID: 3016)
      • cheatengine-i386.exe (PID: 944)
      • Tutorial-i386.exe (PID: 2260)
      • Cheat Engine.exe (PID: 2200)
      • Cheat Engine.exe (PID: 600)
      • cheatengine-i386.exe (PID: 2892)
    • Connects to CnC server

      • CheatEngine70.tmp (PID: 3376)
    • INSTALLCORE was detected

      • CheatEngine70.tmp (PID: 3376)
    • Loads dropped or rewritten executable

      • cheatengine-i386.exe (PID: 944)
      • cheatengine-i386.exe (PID: 2892)
  • SUSPICIOUS

    • Creates files in the program directory

      • firefox.exe (PID: 3748)
      • cheatengine-i386.exe (PID: 944)
      • cheatengine-i386.exe (PID: 2892)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 3748)
      • CheatEngine70.exe (PID: 3768)
      • CheatEngine70.exe (PID: 1252)
      • CheatEngine70.tmp (PID: 3376)
    • Reads the Windows organization settings

      • CheatEngine70.tmp (PID: 3376)
    • Reads Environment values

      • CheatEngine70.tmp (PID: 3376)
    • Reads Windows owner or organization settings

      • CheatEngine70.tmp (PID: 3376)
    • Reads internet explorer settings

      • CheatEngine70.tmp (PID: 3376)
    • Modifies the open verb of a shell class

      • CheatEngine70.tmp (PID: 3376)
    • Starts Internet Explorer

      • CheatEngine70.tmp (PID: 3376)
    • Uses ICACLS.EXE to modify access control list

      • CheatEngine70.tmp (PID: 3376)
    • Searches for installed software

      • CheatEngine70.tmp (PID: 3376)
  • INFO

    • Manual execution by user

      • firefox.exe (PID: 252)
      • Cheat Engine.exe (PID: 2200)
      • Cheat Engine.exe (PID: 600)
    • Reads CPU info

      • firefox.exe (PID: 3748)
    • Application launched itself

      • firefox.exe (PID: 3748)
      • firefox.exe (PID: 252)
      • iexplore.exe (PID: 3660)
    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 3748)
    • Reads settings of System Certificates

      • firefox.exe (PID: 3748)
      • pingsender.exe (PID: 3344)
    • Application was dropped or rewritten from another process

      • CheatEngine70.tmp (PID: 960)
      • CheatEngine70.tmp (PID: 3376)
    • Loads dropped or rewritten executable

      • CheatEngine70.tmp (PID: 3376)
    • Creates files in the user directory

      • firefox.exe (PID: 3748)
      • iexplore.exe (PID: 2560)
    • Creates a software uninstall entry

      • CheatEngine70.tmp (PID: 3376)
    • Changes internet zones settings

      • iexplore.exe (PID: 3660)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2560)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2560)
    • Creates files in the program directory

      • CheatEngine70.tmp (PID: 3376)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2560)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

EXIF

HTML

ContentType: text/html; charset=utf-8
Title: Cheat Engine
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
69
Monitored processes
23
Malicious processes
5
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start rundll32.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe cheatengine70.exe cheatengine70.tmp no specs cheatengine70.exe #INSTALLCORE cheatengine70.tmp kernelmoduleunloader.exe windowsrepair.exe no specs icacls.exe no specs cheat engine.exe no specs cheatengine-i386.exe iexplore.exe iexplore.exe tutorial-i386.exe no specs pingsender.exe cheat engine.exe no specs cheat engine.exe cheatengine-i386.exe

Process information

PID
CMD
Path
Indicators
Parent process
252"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
600"C:\Program Files\Cheat Engine 7.0\Cheat Engine.exe" C:\Program Files\Cheat Engine 7.0\Cheat Engine.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
6.3.0.0
Modules
Images
c:\program files\cheat engine 7.0\cheat engine.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
944"C:\Program Files\Cheat Engine 7.0\cheatengine-i386.exe" C:\Program Files\Cheat Engine 7.0\cheatengine-i386.exe
Cheat Engine.exe
User:
admin
Company:
Cheat Engine
Integrity Level:
HIGH
Description:
Cheat Engine
Exit code:
0
Version:
7.0.0.6007
Modules
Images
c:\program files\cheat engine 7.0\cheatengine-i386.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
960"C:\Users\admin\AppData\Local\Temp\is-MHS8M.tmp\CheatEngine70.tmp" /SL5="$7012A,17382706,121344,C:\Users\admin\Downloads\CheatEngine70.exe" C:\Users\admin\AppData\Local\Temp\is-MHS8M.tmp\CheatEngine70.tmpCheatEngine70.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-mhs8m.tmp\cheatengine70.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1152"icacls" "C:\Program Files\Cheat Engine 7.0" /grant *S-1-15-2-1:(OI)(CI)(RX) /TC:\Windows\system32\icacls.exeCheatEngine70.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
1332
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1252"C:\Users\admin\Downloads\CheatEngine70.exe" /SPAWNWND=$301D8 /NOTIFYWND=$7012A C:\Users\admin\Downloads\CheatEngine70.exe
CheatEngine70.tmp
User:
admin
Company:
Cheat Engine
Integrity Level:
HIGH
Description:
Cheat Engine 7.0 Setup
Exit code:
0
Version:
7.0.0.8
Modules
Images
c:\users\admin\downloads\cheatengine70.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1516"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\download.phpC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1744"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3748.3.1054923503\1254435007" -childID 1 -isForBrowser -prefsHandle 1692 -prefMapHandle 1316 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3748 "\\.\pipe\gecko-crash-server-pipe.3748" 1716 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2116"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3748.0.502793132\701979972" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3748 "\\.\pipe\gecko-crash-server-pipe.3748" 1156 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
1
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2200"C:\Program Files\Cheat Engine 7.0\Cheat Engine.exe" C:\Program Files\Cheat Engine 7.0\Cheat Engine.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
6.3.0.0
Modules
Images
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\clbcatq.dll
c:\users\admin\downloads\cheatengine70.exe
c:\windows\system32\wldap32.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\cryptbase.dll
Total events
2 479
Read events
2 270
Write events
201
Delete events
8

Modification events

(PID) Process:(3748) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
37B6701A03000000
(PID) Process:(252) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
12E86D1A03000000
(PID) Process:(3748) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
1
(PID) Process:(3748) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3748) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3748) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3748) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\system32\p2pcollab.dll,-8042
Value:
Peer to Peer Trust
(PID) Process:(3748) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\system32\qagentrt.dll,-10
Value:
System Health Authentication
(PID) Process:(3748) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dnsapi.dll,-103
Value:
Domain Name System (DNS) Server Trust
(PID) Process:(3748) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:@%SystemRoot%\System32\fveui.dll,-843
Value:
BitLocker Drive Encryption
Executable files
61
Suspicious files
220
Text files
249
Unknown types
113

Dropped files

PID
Process
Filename
Type
3748firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4jsonlz4
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_8iKU86PGZDWy3Hg
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:
SHA256:
3748firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\383BBC4A78896CEC6CC84401B37B91E1CBF7E247der
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
51
TCP/UDP connections
109
DNS requests
162
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3748
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
472 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
472 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
472 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
472 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
472 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
472 b
whitelisted
3748
firefox.exe
POST
200
172.217.23.131:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3748
firefox.exe
52.89.218.39:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
3748
firefox.exe
2.16.106.152:80
detectportal.firefox.com
Akamai International B.V.
whitelisted
3748
firefox.exe
54.230.229.64:443
snippets.cdn.mozilla.net
Amazon.com, Inc.
US
unknown
3748
firefox.exe
52.40.98.65:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
3748
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3748
firefox.exe
143.204.101.24:443
firefox.settings.services.mozilla.com
US
suspicious
3748
firefox.exe
172.217.21.234:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
3748
firefox.exe
172.217.18.100:443
www.google.com
Google Inc.
US
whitelisted
3748
firefox.exe
52.89.48.8:443
shavar.services.mozilla.com
Amazon.com, Inc.
US
unknown
3748
firefox.exe
172.217.23.142:443
consent.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 2.16.106.152
  • 2.16.106.209
whitelisted
a1089.dscd.akamai.net
  • 2.16.106.209
  • 2.16.106.152
whitelisted
search.services.mozilla.com
  • 52.89.218.39
  • 52.35.182.58
  • 35.164.109.147
whitelisted
search.r53-2.services.mozilla.com
  • 35.164.109.147
  • 52.35.182.58
  • 52.89.218.39
whitelisted
push.services.mozilla.com
  • 54.191.170.25
whitelisted
autopush.prod.mozaws.net
  • 54.191.170.25
whitelisted
snippets.cdn.mozilla.net
  • 54.230.229.64
  • 54.230.229.21
  • 54.230.229.106
  • 54.230.229.14
whitelisted
d228z91au11ukj.cloudfront.net
  • 54.230.229.14
  • 54.230.229.106
  • 54.230.229.21
  • 54.230.229.64
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cs9.wac.phicdn.net
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
1080
svchost.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
3376
CheatEngine70.tmp
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2
3376
CheatEngine70.tmp
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
3376
CheatEngine70.tmp
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3
3376
CheatEngine70.tmp
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4
7 ETPRO signatures available at the full report
Process
Message
Kernelmoduleunloader.exe
Kernelmodule unloader
Kernelmoduleunloader.exe
Setup. So do not show messages
Kernelmoduleunloader.exe
attempting to unload
Kernelmoduleunloader.exe
SCManager opened
Kernelmoduleunloader.exe
count=0
Kernelmoduleunloader.exe
setup=true
cheatengine-i386.exe
setDPIAware
cheatengine-i386.exe
p3
cheatengine-i386.exe
arm disa6
cheatengine-i386.exe
arm disassembler