CHEAT DETECTION
**Guide by: primeRizz**This is a general guide. I am also learning and will improve it in the future.
1. OUTSTANDING TOOLS
Powerful tools for forensic analysis, memory inspection, and detecting hidden cheats.
• OSForensics – Download\ Search files, recover deleted items, detect cheat installers.
• Volatility Workbench – Download\ GUI for memory forensics; inspect RAM for hidden processes and
injected code.
• FTK Imager – Download\ Capture memory (memdump), preview hidden files, folders, and registry
entries.
• Magnet RAM Capture – Download\ Capture live RAM to detect memory-only cheats.
• Canary – Download\ Real-time process monitor, detects DLL injections and suspicious activity.
2. GENERAL TOOLS
Lightweight tools for investigating executed programs, services, and cached apps.
• BAM-Parse – Download\ Parses Windows BagMRU and BAM entries to show recently executed programs
and file usage.
• Prefetch-Parser – Download\ Analyzes Windows Prefetch files to identify recently run programs.
• Paths-Parser – Download\ Parses Windows path and MRU records to track executed files.
• Journal-Trace – Download\ Reads NTFS USN journal to track file creation and deletion events.
• WinLiveInfo.exe – Download\ Displays live information about running processes, user activity, and
active sessions.
• Service-Execution.exe – Download\ Lists executed services and their associated binaries.
• CachedProgramsList.exe – Download\ Shows programs stored in Windows cache.
1
• Eric Zimmerman Tools – Download\ Forensic utilities for parsing logs, registries, timelines, and memory
artifacts.
• Nirsoft Tools – Download\ Inspect browser history, network connections, passwords, and system
artifacts.
3. NETWORK TOOLS
Tools for monitoring, capturing, and analyzing network activity related to cheats.
• GlassWire – Download\ Visual network monitor with alerts for new connections.
• NetworkMiner – Download\ Passive packet capture and host/port analysis.
• HxD – Download\ Hex editor for analyzing raw data in files, memory, and network captures.
• Volatility Workbench – Download\ Memory inspection for hidden network or memory-resident cheats.
4. COMMAND PROMPT & POWERSHELL COMMANDS
4.1 Command Prompt
• System Info: systeminfo | find /i "install date"
• Deleted Executables:
fsutil usn readjournal c: csv | findstr /i /c:.exe | findstr /i /c:0x80000200 >>
DeletedExes.txt
fsutil usn readjournal c: csv | findstr /i /c:.dll | findstr /i /c:0x80000200 >>
Deleteddll.txt
• Created Executables on Desktop:
cd c:\users\%username%\desktop && fsutil usn readjournal c: csv | findstr /i /
c:.exe | findstr /i /c:0x00000100 >> CreatedF.txt && notepad CreatedF.txt
• User & Permissions Info:
whoami
whoami /user
net users
net localgroup administrators
net group /domain [groupname]
2
net user /domain [username]
wmic sysaccount
wmic useraccount get name,SID
wmic useraccount list
• Processes & Network: tasklist , ipconfig , netstat , quser
4.2 PowerShell
• Network Monitoring: netstat -abno , netstat -b , Get-Counter -Counter "\Network
Interface(*)\Bytes Received/sec","\Network Interface(*)\Bytes Sent/sec"
• Established Connections:
Get-NetTCPConnection -State Established |
Select-Object LocalAddress, LocalPort,
RemoteAddress, RemotePort, State,
@{Name='ProcessName';Expression={(Get-Process -Id
$_.OwningProcess).ProcessName}},
@{Name='ProcessPath';Expression={(Get-Process -Id
$_.OwningProcess).Path}} |
Sort-Object RemoteAddress
• Structured View with Grid:
Get-NetTCPConnection |
Where-Object State -ne 'Bound' |
Select-Object LocalAddress, LocalPort,
RemoteAddress, RemotePort, State,
OwningProcess,
@{Name='ProcessName';Expression={(Get-Process -Id
$_.OwningProcess).ProcessName}} |
Out-GridView -Title 'Active Network Connections'
• Kill Process: Stop-Process -Name "maliciousProcess"
• PowerShell Logs:
Get-WinEvent -LogName Microsoft-Windows-PowerShell/Operational | Where-Object
{ $_.Message -like "*EncodedCommand*" }
• DNS Cache: Get-DnsClientCache
• Process Signature: Get-Process | Select-Object Name, Path,
@{Name="IsSigned";Expression={(Get-AuthenticodeSignature $_.Path).Status}}
• Recent File Changes:
Get-ChildItem C:\ -Recurse | Where-Object { $_.LastWriteTime -gt (Get-
Date).AddDays(-1) }
3
5. EVENT VIEWER & SYSINTERNALS
Sysmon (System Monitor) –
*************************************************************************************************************
Logs detailed system activity to the Windows Event Log, including processes, network connections, and file
changes.
5.0 Installing & Configuring Sysmon
Sysmon64.exe -i -accepteula
Sysmon64.exe -i sysmonconfig.xml -accepteula
Sysmon64.exe -c sysmonconfig.xml
Sysmon64.exe -u
5.1 Common Windows Event IDs
Log Type Event ID Description
Security 4616 System time changed
Security 1102 Security log cleared
Security 1100 Services shut down unexpectedly
Security 4634 Account logoff
Security 4672 Special privileges assigned to new logon
Security 4656 Handle to an object was requested
Security 4688 New process created
Security 7045 A service was installed
Application 1000 Application crash
Application 3079 Application log cleared
System 7034 Service crash
System 104 System log cleared
PowerShell 4103 PowerShell pipeline execution
PowerShell 4104 PowerShell script block executed
5.2 Network-Related Event IDs
• NetworkProfile (Operational): 10000 (Connected), 10001 (Disconnected)
• WLAN-AutoConfig (Operational/Analytic): 8000–8003 (Connection attempts, successes,
disconnects), 8005 (Authentication errors)
4
• NDIS (Operational): 4201 (Adapter enabled), 27 (Adapter error), 4000–4007 (DHCP activity)
5.3 Accessing Event Logs
1. Launch Event Viewer: eventvwr.msc
2. Enable Analytic/Debug logs: View → Show Analytic and Debug Logs
3. Navigate:
Applications and Services Logs ▶ Microsoft ▶ Windows ▶
• NetworkProfile ▶ Operational
• WLAN‑AutoConfig ▶ Operational (enable Diagnostics manually)
• NDIS ▶ Operational
• Diagnostics‑Networking
1. Filter by Event ID for quick analysis.
5.4 Useful Sysmon Event IDs
Event ID Description
1 Process creation
2 File creation time changed
3 Network connection detected
5 Process terminated
6 Driver loaded
7 Image loaded
8 CreateRemoteThread detected
10 Process access detected
11 File created
12 Registry object added/modified
13 Registry value set
22 DNS query
23 File delete
255 Sysmon service started
5
6. REGISTRY KEYS
• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store – Compatibility history.
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bam\State\UserSettings – BAM
user activity.
• HKEY_CURRENT_USER\Software\Classes\Local
Settings\Software\Microsoft\Windows\Shell\MuiCache – Recently used applications.
• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU –
Recently run commands.
• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage\ShowJumpView
– Jump list view usage.
• HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet – Default browsers.
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\VolumeInfoCache – Indexed
volume info.
End of Guide – Guide by primeRizz Will improve this in future for sure. This is the first version and may contain
mistakes. Thank you.