elitepvpers

elitepvpers (https://www.elitepvpers.com/forum/)
-   Rainbow Six Siege (https://www.elitepvpers.com/forum/rainbow-six-siege/)
-   -   [Unofficial] List of Legit/Scam R6 Cheat Providers (https://www.elitepvpers.com/forum/rainbow-six-siege/4535313-unofficial-list-legit-scam-r6-cheat-providers.html)

HarusameSarada1 02/22/2026 10:13

Looking for R6S cheats that won't get banned.
ESP + Aimbot + RCS
I used to use LC.
Does anyone know?

geo1526 02/22/2026 11:31

Quote:

Originally Posted by HarusameSarada1 (Post 40516061)
Looking for R6S cheats that won't get banned.
ESP + Aimbot + RCS
I used to use LC.
Does anyone know?

Only Aimbot and ESP, no RCS :handsdown:

Thread: [Only registered and activated users can see links. Click Here To Register...]

EXODUS. 02/22/2026 14:40

Quote:

Originally Posted by HarusameSarada1 (Post 40516061)
Looking for R6S cheats that won't get banned.
ESP + Aimbot + RCS
I used to use LC.
Does anyone know?

A cheat that won't get detected? Not a thing.

But if you need "all-in-one" cheat for a fair price, then give us a try.

Thread:
[Only registered and activated users can see links. Click Here To Register...]

Whippets 02/22/2026 23:18

Quote:

Originally Posted by chall meh (Post 40504894)
R1 as a whole is over, staff themselves said it wont be back anytime soon. This was established months ago , idk why they arent removed or marked as unknown here, the guy who makes these lists picks and chooses which ones to maintain for some odd reason.

on other games too i think? i hope they not finna exit scam

thathavay 02/23/2026 18:36

Zero Day seems to be dead...!

Cheesy's Products 02/26/2026 01:05

hey please consider adding our lite version to your list.

Cat64 02/26/2026 12:34

vanuri no product after payment??

thathavay 02/26/2026 15:40

Quote:

Originally Posted by EXODUS. (Post 40516286)
A cheat that won't get detected? Not a thing.

But if you need "all-in-one" cheat for a fair price, then give us a try.

Thread:
[Only registered and activated users can see links. Click Here To Register...]

I have a small question on your channel, could you reply to me? Thank you!

geo1526 02/26/2026 17:35

R6S Cheese still works on the latest update :handsdown:

With fast and friendly support team!

Thread: [Only registered and activated users can see links. Click Here To Register...]

Dakmight 03/03/2026 18:45

Anyone know a provider that is safe and Undetected that has Gadget ESP and throwable ESP so i can see grenades and claymores and Operators abilities like Lesion Mines ?

EXODUS. 03/09/2026 04:34

Quote:

Originally Posted by Dakmight (Post 40525262)
Anyone know a provider that is safe and Undetected that has Gadget ESP and throwable ESP so i can see grenades and claymores and Operators abilities like Lesion Mines ?

We do have an actually correctly working gadget and abilities ESP. Give us a try.

dizakster3333 03/09/2026 11:03

anything undetected atm? can i last at least a week with anything esp maybe?

geo1526 03/09/2026 13:27

Quote:

Originally Posted by dizakster3333 (Post 40529726)
anything undetected atm? can i last at least a week with anything esp maybe?

You can try our r6 software. using esp only is safe :handsdown: and undetected!

Thread: [Only registered and activated users can see links. Click Here To Register...]

Whippets 03/11/2026 12:04

Quote:

Originally Posted by thathavay (Post 40517431)
Zero Day seems to be dead...!

yea they been hiatus for a while now

overhead1752 03/11/2026 19:55

Resellers should probably stop saying “try our product.” In most cases, it isn’t actually their product—they’re just reselling it.

Using that wording is confusing for customers and for everyone else. It makes it hard to tell what’s actually new or original and what’s simply being resold.

You keep hearing “try our product,” but then it turns out to be the same things over and over again, like Crusader or Vega. It gets repetitive and honestly a bit annoying.

leaguemode 03/12/2026 09:24

Quote:

Originally Posted by overhead1752 (Post 40531808)
Resellers should probably stop saying “try our product.” In most cases, it isn’t actually their product—they’re just reselling it.

Using that wording is confusing for customers and for everyone else. It makes it hard to tell what’s actually new or original and what’s simply being resold.

You keep hearing “try our product,” but then it turns out to be the same things over and over again, like Crusader or Vega. It gets repetitive and honestly a bit annoying.

This.
90% of the section are resellers of resellers of vega/R1 with claims "our developers and our product, bla-bla-bla"
I wish mods listen and make it mandatory for sellers to specify it in the product description.

overhead1752 03/12/2026 15:22

Quote:

Originally Posted by leaguemode (Post 40532175)
This.
90% of the section are resellers of resellers of vega/R1 with claims "our developers and our product, bla-bla-bla"
I wish mods listen and make it mandatory for sellers to specify it in the product description.

Yeah, thanks for sharing your opinion on this. I really appreciate that you see it the same way I do. It’s good to know that others have noticed the same issue and feel similarly about it.

A lot of the time it’s presented as if it’s a completely new or original product, when in reality it’s often just the same things being resold again and again. That can definitely make things confusing for customers and for people trying to understand what’s actually new and what isn’t.

So it’s nice to see that I’m not the only one who thinks that clearer wording and more transparency would help everyone.

Also, if people are interested, I could put together a new P2C list that’s updated more regularly and only includes official sellers or resellers. If enough people think that would be useful, I’d be happy to work on it. From what I’ve seen, the current list by Xenos hasn’t been updated very often, so having a more active and regularly maintained list might help keep things clearer for everyone.

burgered2 03/12/2026 17:47

Quote:

Originally Posted by overhead1752 (Post 40532371)
Yeah, thanks for sharing your opinion on this. I really appreciate that you see it the same way I do. It’s good to know that others have noticed the same issue and feel similarly about it.

A lot of the time it’s presented as if it’s a completely new or original product, when in reality it’s often just the same things being resold again and again. That can definitely make things confusing for customers and for people trying to understand what’s actually new and what isn’t.

So it’s nice to see that I’m not the only one who thinks that clearer wording and more transparency would help everyone.

Also, if people are interested, I could put together a new P2C list that’s updated more regularly and only includes official sellers or resellers. If enough people think that would be useful, I’d be happy to work on it. From what I’ve seen, the current list by Xenos hasn’t been updated very often, so having a more active and regularly maintained list might help keep things clearer for everyone.

Yeah that'd be great

erode 03/18/2026 03:50

Caruso might be worth adding.

cowork 03/22/2026 06:08

The operators of CheatArmy are trash. Even if you create a support ticket, they don’t respond at all. There’s no support, the cheat features are full of bugs, and the security is obviously weak.

m4rc3lpl 03/23/2026 14:51

Quote:

Originally Posted by cowork (Post 40540390)
The operators of CheatArmy are trash. Even if you create a support ticket, they don’t respond at all. There’s no support, the cheat features are full of bugs, and the security is obviously weak.

true, wouldnt recommend

stocks 03/24/2026 11:54

What is the best DMA right now? Bun, caruso, or something else?

Whippets 03/28/2026 23:28

Quote:

Originally Posted by leaguemode (Post 40532175)
This.
90% of the section are resellers of resellers of vega/R1 with claims "our developers and our product, bla-bla-bla"
I wish mods listen and make it mandatory for sellers to specify it in the product description.

yea its better to get cheese from direct providers instead of resellers

overhead1752 03/31/2026 19:29

Fragestate.cc has officially launched, offering powerful exploits such as an unlock-all feature, along with over 200 ESP options and extensive customization.

heres our Thread with Media linked,

[Only registered and activated users can see links. Click Here To Register...]

geo1526 04/09/2026 05:17

R6S Cheese still safe today rn for our customers

Thread: [Only registered and activated users can see links. Click Here To Register...]

Shane9301 04/17/2026 07:59

Is crusader dtc right now?

geo1526 04/17/2026 08:03

Quote:

Originally Posted by Shane9301 (Post 40560127)
Is crusader dtc right now?

its safe :handsdown:

Ezechiel88 04/17/2026 10:35

Quote:

Originally Posted by EXODUS. (Post 40554000)
Cool story. Unfortunately for you everything is being unloaded after PC restart.

Never ever that happened to anyone, but you're surely special. Try better next time, piece of shit.

why being so salty against a simple man a simple conspiracy theorist

rMajora 04/17/2026 22:18

Thank you keeping us safe

EXODUS. 04/18/2026 05:19

Quote:

Originally Posted by Ezechiel88 (Post 40560175)
why being so salty against a simple man a simple conspiracy theorist

Idk, I was learning from people that crush "flat earth" conspiracy theorists

PeterParkers 04/21/2026 06:45

Quote:

Originally Posted by Jlmods (Post 40553264)
THIS IS A VIRUS IT MINE BITCOIN AND STEALS YOUR INFORMATION

Infection Timeline & Source Analysis
March 25, 2026 — This is the key date. Multiple things appeared that day:
Evidence Date What it tells us
EXO folder on Desktop (cheat payload .bin files) 3/25 9:00 PM Game cheat/hack downloaded
NVIDIA_app_v11.0.6.383.exe in Downloads 3/25 1:27 PM Possibly trojanized NVIDIA installer
Trojanized NvContainer.exe (TLauncher signed) Active since ~3/25 Replaced real NVIDIA component
Staging files in SystemTemp (TLauncher/Famatech signed) 3/26–3/27 Malware deploying additional payloads
The Rainbow Six hack you downloaded on the 25th is almost certainly the initial dropper. Here's why:
1. The EXO folder on your Desktop contained .bin payload files all dated 3/25 at 9:00 PM — that's cheat loader data
2. SZ1WANQPJDK.COM was in that same EXO folder — Malwarebytes flagged it as Generic.Malware/Suspicious
3. DCONTROL.EXE on Desktop — this is "Defender Control," a tool to disable Windows Defender. The hack likely told you to "disable your AV before running" — that's a red flag every time
What the Malware Did (Full Picture)
Stage 1 — The R6 hack (Day 1, March 25):
• You ran the hack, it asked you to disable Defender (or used DCONTROL.EXE to do it automatically)
• It disabled Defender via IFEO hijack (mpcmdrun.exe → systray.exe) and registry policies
• Dropped the EXO folder with cheat binaries + hidden malware
Stage 2 — Deployment (March 25–27):
• Installed SystemDiagnosticsHost.exe as a Windows Service (watchdog)
• Deployed svchostnon.exe — cryptominer using your RTX 3090 (that's why they target gamers — powerful GPUs)
• Deployed mppr.exe — backdoor/RAT (68GB virtual memory, accepting inbound connections)
• Replaced your user-local NvContainer.exe with a trojanized copy connecting to C2 server
• Installed VQ7KE2T7L5W.SYS — kernel rootkit driver (this is why files were invisible to Get-Item)
• Loaded DDB64.DLL — another bitcoin miner component
• Injected MSLDRIVER.DLL into explorer.exe — persistence + stealth (still loaded, deleted on reboot)
• Set Userinit hijack for reboot persistence
• Created 7+ scheduled tasks under fake names for respawning
Stage 3 — Ongoing operation:
• Mining crypto on your GPU/CPU 24/7
• Maintaining backdoor access via port 12666 to vviukjdsjnj25i5.bounceme.net
• The gogoduck registry key stored encoded C2 configuration
• Firewall rules allowed inbound connections (full remote access)
What's Likely Compromised
Assume everything is compromised:
• �� All saved passwords in Chrome/Edge — stealers grab these first
• �� Discord token — they can access your Discord as you
• �� Steam session — possible account theft
• �� Any banking/email open in browser
• �� OneDrive — HTGH.EXE was found IN your OneDrive folder (malware was syncing to cloud)
• �� Any files on your PC — the RAT had full access
Immediate Actions (from a different device)
1. Change ALL passwords NOW — from your phone or another computer
2. Enable 2FA everywhere — Steam, Discord, email, banking, Epic, Ubisoft
3. Revoke Discord tokens — change password (this invalidates old tokens)
4. Check bank/payment accounts for unauthorized activity
5. Reboot this PC — the renamed MSLDRIVER.DLL will be deleted and Defender can potentially re-enable
6. After reboot — run a full Malwarebytes scan again to confirm everything is clean
7. Never disable your AV to run a game hack — that's literally the malware telling you to open the door
The hack was the trojan horse. It worked as a cheat too — that's how they get you to keep running it.

�� Full Malware Inventory — R6 Cheat Dropper (March 25, 2026)
Infection Vector
• Source: Rainbow Six Siege hack download (March 25, 2026)
• Initial dropper: Cheat executable in C:\Users\...\Desktop\EXO\ folder
• Code-signing entity: Files falsely signed as "TLauncher Inc." and "Famatech Corp BVI" (both fake/stolen certs)
---
�� Malicious Files
File Location Purpose
svchostnon.exe C:\Windows\System32\ Cryptominer — consumed 25GB+ RAM, mimics svchost.exe
mppr.exe C:\Windows\System32\ RAT/Backdoor — 68GB virtual memory, accepted inbound connections
splwow32.exe C:\Windows\System32\ Malware loader — fake name mimicking real Windows print component
SystemDiagnosticsHost.exe C:\Windows\System32\ Watchdog service — respawns killed malware processes
CORPerfMonSymbols.exe C:\Windows\System32\ Login persistence — injected into Userinit registry
usbperfsym.exe C:\Windows\System32\ Scheduled task payload — launched by XCCProcess tasks
DDB64.DLL C:\Windows\System32\ BitcoinMiner module — loaded DLL for mining operations
MSLDRIVER.DLL C:\Windows\Media\ Trojan.Crypt.MSIL — injected into explorer.exe, survives logoff
VQ7KE2T7L5W.SYS C:\Windows\System32\drivers\ Kernel rootkit driver — ring-0 access, hides malware from OS
NvContainer.exe C:\Users\...\AppData\Local\NVIDIA Corporation\NVIDIA App\ Trojanized NVIDIA — fake NvContainer, connected to C2 server. Signed "TLauncher Inc.", HashMismatch
NvContainer.exe C:\Windows\SYSTEM32\config\systemprofile\AppData\L ocal\NVIDIA Corporation\NVIDIA App\ Same trojan — SYSTEM profile copy
RC_ConnectedAccount.exe C:\Windows\SystemTemp\ Staging dropper — signed "Famatech Corp BVI"
2 more files C:\Windows\SystemTemp\ Staging files — signed as fake "TLauncher" and fake "Node.js"
BGDIUE.EXE C:\Users\...\AppData\Local\Temp\ Malware payload
DCONTROL.EXE C:\Users\...\Desktop\ DefenderControl — disables Windows Defender (Stage 1 of attack)
SZ1WANQPJDK.COM C:\Users\...\Desktop\EXO\ Generic.Malware
HTGH.EXE C:\Users\...\OneDrive\Desktop\ Malware syncing to cloud via OneDrive
8Χ TMP*.EXE files C:\Users\...\AppData\Local\Temp\ Temporary malware executables
TMPEEB7 C:\Users\...\AppData\Local\Temp\ Temp malware payload
---
⚙️ Malicious Windows Service
Service Name Display Name Executable Purpose
System Diagnostics Host System Diagnostics Host SystemDiagnosticsHost.exe Watchdog — auto-restarts killed malware. Registered as real Windows service. Ran as SYSTEM.
---
�� Malicious Scheduled Tasks (7+)
Task Name Executable Purpose
XCCProcess (Χ3+ variants) usbperfsym.exe Persistence — launches miner/RAT components
NVIDIA App SelfUpdate Trojanized NvContainer.exe Fake NVIDIA update task — persistence for C2 backdoor
3+ additional unnamed tasks Various malware EXEs Auto-restart and deployment
---
�� Registry Hijacks
Registry Path Value Malware Set To Purpose
HKLM\...\Image File Execution Options\mpcmdrun.exe Debugger systray.exe IFEO Hijack — redirects Defender's CLI scanner to a dummy, prevents Defender from scanning
HKLM\...\Winlogon Userinit userinit.exe, CORPerfMonSymbols.exe Login persistence — malware runs every time ANY user logs in
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiSpyware 1 Defender kill — policy-level disable
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiVirus 1 Defender kill — policy-level disable
HKLM\SOFTWARE\Microsoft\Windows Defender DisableAntiSpyware 1 Defender kill — direct key disable
HKLM\SOFTWARE\Microsoft\Windows Defender DisableAntiVirus 1 Defender kill — direct key disable
HKCU\SOFTWARE\gogoduck (entire key) Base64-encoded data RiskWare — encoded config/payload data
---
�� Malicious Firewall Rules
Rule Name Direction Action Target
XCCProcess (Χ4 rules) Inbound Allow mppr.exe — allows remote attackers to connect IN to the RAT
---
�� C2 (Command & Control) Server
Domain Port Protocol Connected By
vviukjdsjnj25i5.bounceme.net 12666 TCP Trojanized NvContainer.exe

Stage 1: DCONTROL.EXE disables Windows Defender

Stage 2: Dropper deploys all components
├── Cryptominer: svchostnon.exe + DDB64.DLL (Bitcoin mining)
├── RAT/Backdoor: mppr.exe (remote access, 68GB virtual memory)
├── Rootkit: VQ7KE2T7L5W.SYS (kernel-level hiding)
├── C2 Beacon: NvContainer.exe → bounceme.net:12666
└── DLL Inject: MSLDRIVER.DLL → explorer.exe

Stage 3: Persistence installed
├── Windows Service: "System Diagnostics Host" (watchdog)
├── 7+ Scheduled Tasks (XCCProcess, fake NVIDIA update)
├── IFEO hijack on mpcmdrun.exe (blocks Defender scans)
├── Userinit hijack (runs on every login)
├── Firewall rules (allows inbound RAT connections)
└── Registry disable of Defender (4 keys)

Infection Timeline & Source Analysis

March 25, 2026 — this is the key date. Everything started here.

Evidence | Date | What it tells us
EXO folder with .bin payloads | 3/25 9:00 PM | Cheat loader + malware payload
Suspicious NVIDIA installer in Downloads | 3/25 1:27 PM | Likely trojanized installer
Trojanized NvContainer.exe | Active since ~3/25 | Replaced legit NVIDIA component
SystemTemp staging files | 3/26–3/27 | Malware deploying additional payloads

The cheat I downloaded that day was the initial dropper.

Here’s how I know:

EXO folder had payload files all timestamped the same time
There was a flagged suspicious file inside that folder
There was also a tool used to disable Windows Defender

That’s the classic setup — disable AV → run payload.

What the Malware Did (Full Breakdown)

Stage 1 — Initial Execution (March 25)

Disabled Windows Defender using registry + IFEO hijack
Dropped payload files
Set up initial persistence

Stage 2 — Deployment (March 25–27)

Installed a watchdog service to respawn malware
Deployed a cryptominer (using GPU/CPU)
Deployed a RAT/backdoor (accepting inbound connections)
Replaced legitimate NVIDIA process with trojanized version
Installed a kernel-level rootkit driver (hides everything)
Injected DLL into explorer.exe for stealth

Stage 3 — Ongoing Operation

Mining crypto constantly
Maintaining remote access to the machine
Using firewall rules to allow inbound connections
Storing encoded config data in registry
Syncing malware-related files to cloud storage

Command & Control (C2)

Connected to remote server:
vviukjdsjnj25i5.bounceme.net:12666

This is how they:

Control the system
Send commands
Pull data

What’s Likely Compromised

At this point, assume everything:

Browser saved passwords (Chrome/Edge)
Discord account/token
Steam and other gaming accounts
Email accounts
Banking/payment sessions
Any files on the PC
Cloud storage (files were syncing)

This wasn’t just local — it had full access.

Malware Components Identified

Executables:

svchostnon.exe → cryptominer
mppr.exe → RAT/backdoor
SystemDiagnosticsHost.exe → watchdog service
CORPerfMonSymbols.exe → login persistence
usbperfsym.exe → scheduled task payload
NvContainer.exe → trojanized NVIDIA process

DLLs / Drivers:

DDB64.DLL → mining module
MSLDRIVER.DLL → injected into explorer.exe
VQ7KE2T7L5W.SYS → kernel rootkit

Persistence Mechanisms

Fake Windows service running as SYSTEM
7+ scheduled tasks (auto-relaunch malware)
Userinit registry hijack (runs on login)
IFEO hijack blocking Defender scans
Multiple registry keys disabling Defender
Firewall rules allowing inbound RAT access

Bottom Line

This wasn’t just “a virus”

This was:

Multi-stage infection
Crypto miner
Full remote access backdoor
Kernel-level rootkit

Once that rootkit is in, the system cannot be trusted.

Immediate Actions I Took / Recommend

From another device:

Changed ALL passwords
Enabled 2FA everywhere
Revoked sessions/tokens (Discord, Steam, etc.)
Checked financial accounts

On the infected PC:

Rebooted system
Ran full malware scans

**WARNING: This is a highly sophisticated multi-stage malware infection**

Infection Date: March 25, 2026
Initial Vector: Rainbow Six Siege game hack / cheat (the trojan horse that also worked as a functional cheat)

---

Infection Timeline & Source Analysis

Key Date: March 25, 2026

Evidence | Date/Time | What It Tells Us
--- | --- | ---
EXO folder on Desktop (.bin payloads) | 3/25 9:00 PM | Game cheat/hack downloaded + malware dropper
NVIDIA_app_v11.0.6.383.exe | 3/25 1:27 PM | Likely trojanized NVIDIA installer
Trojanized NvContainer.exe | Active since ~3/25 | Replaced legitimate NVIDIA component
Staging files in SystemTemp | 3/26–3/27 | Malware deploying additional payloads

How we know the Rainbow Six hack was the initial dropper:
1. The EXO folder on your Desktop contained .bin payload files all timestamped 3/25 at 9:00 PM — classic cheat loader data.
2. SZ1WANQPJDK.COM was in the same EXO folder — flagged by Malwarebytes as Generic.Malware/Suspicious.
3. DCONTROL.EXE on Desktop — this is "Defender Control", a tool that disables Windows Defender. The hack almost certainly instructed you to "disable your antivirus before running" (a universal red flag).

---

What The Malware Did (Full Breakdown)

Stage 1 — Initial Execution (March 25)
- Ran the R6 hack, which prompted (or automatically ran) DCONTROL.EXE to disable Windows Defender.
- Disabled Defender through multiple methods: IFEO hijack (mpcmdrun.exe → systray.exe) and registry policies.
- Dropped the EXO folder containing cheat binaries + hidden malware payloads.

Stage 2 — Deployment (March 25–27)
- Installed SystemDiagnosticsHost.exe as a legitimate-looking Windows Service (watchdog).
- Deployed svchostnon.exe — cryptominer aggressively using your RTX 3090 GPU.
- Deployed mppr.exe — full-featured RAT/backdoor (68 GB virtual memory, accepting inbound connections).
- Replaced your user-local NvContainer.exe with a trojanized version (signed with stolen "TLauncher Inc." certificate) that connects to a C2 server.
- Installed VQ7KE2T7L5W.SYS — kernel-mode rootkit driver.
- Loaded DDB64.DLL — additional Bitcoin miner component.
- Injected MSLDRIVER.DLL into explorer.exe for persistence and stealth (deleted on reboot).
- Set Userinit registry hijack for boot/login persistence.
- Created 7+ scheduled tasks under fake names to keep respawning components.

Stage 3 — Ongoing Operation
- Cryptomining 24/7 on your GPU and CPU.
- Maintaining persistent backdoor access via port 12666 to vviukjdsjnj25i5.bounceme.net.
- Storing encoded C2 configuration in the gogoduck registry key.
- Creating firewall rules to allow inbound remote connections.
- Syncing malware files to your OneDrive (HTGH.EXE was found in your OneDrive folder).

---

Full Malware Inventory

Malicious Files:

File | Location | Purpose
--- | --- | ---
svchostnon.exe | C:\Windows\System32\ | Cryptominer (high RAM + GPU usage, mimics svchost.exe)
mppr.exe | C:\Windows\System32\ | RAT/Backdoor (accepts inbound connections)
splwow32.exe | C:\Windows\System32\ | Malware loader (fake Windows print spooler name)
SystemDiagnosticsHost.exe | C:\Windows\System32\ | Watchdog service — respawns killed malware
CORPerfMonSymbols.exe | C:\Windows\System32\ | Login persistence (injected via Userinit)
usbperfsym.exe | C:\Windows\System32\ | Scheduled task payload
DDB64.DLL | C:\Windows\System32\ | Bitcoin miner DLL
MSLDRIVER.DLL | C:\Windows\Media\ | Trojan DLL injected into explorer.exe
VQ7KE2T7L5W.SYS | C:\Windows\System32\drivers\ | Kernel rootkit (hides files/processes)
NvContainer.exe | Multiple (User + SYSTEM NVIDIA folders) | Trojanized NVIDIA component connecting to C2 (fake "TLauncher Inc." signature)
RC_ConnectedAccount.exe | C:\Windows\SystemTemp\ | Staging dropper (signed "Famatech Corp BVI")
BGDIUE.EXE | C:\Users\...\AppData\Local\Temp\ | Malware payload
DCONTROL.EXE | Desktop | Defender Control (disables antivirus)
SZ1WANQPJDK.COM | Desktop\EXO\ | Suspicious malware component
HTGH.EXE | OneDrive\Desktop\ | Malware that synced to cloud storage
Multiple TMP*.EXE files | C:\Users\...\AppData\Local\Temp\ | Temporary malware executables

Malicious Windows Service:

Service Name: System Diagnostics Host
Display Name: System Diagnostics Host
Executable: SystemDiagnosticsHost.exe
Purpose: Watchdog — runs as SYSTEM and restarts malware if killed

Malicious Scheduled Tasks (7+):

Task Name | Executable | Purpose
--- | --- | ---
XCCProcess (multiple variants) | usbperfsym.exe | Persistence — relaunches miner and RAT
NVIDIA App SelfUpdate | Trojanized NvContainer.exe | Fake update task for C2 backdoor
Additional unnamed tasks | Various | Auto-restart and deployment

Registry Hijacks & Modifications:

Registry Path | Value | Set To | Purpose
--- | --- | --- | ---
HKLM\...\Image File Execution Options\mpcmdrun.exe | Debugger | systray.exe | Blocks Windows Defender scans
HKLM\...\Winlogon\Userinit | Userinit | userinit.exe, CORPerfMonSymbols.exe | Runs malware on every login
Multiple Defender keys (HKLM\SOFTWARE\Policies\Microsoft\Windows Defender, etc.) | DisableAntiSpyware / DisableAntiVirus | 1 | Completely disables Windows Defender
HKCU\SOFTWARE\gogoduck | (entire key) | Base64-encoded data | Stores encoded C2 configuration

Malicious Firewall Rules:

Rule Name | Direction | Action | Target
--- | --- | --- | ---
XCCProcess (Χ4) | Inbound | Allow | mppr.exe — allows remote attackers to connect to the RAT

Command & Control (C2) Server:
Domain: vviukjdsjnj25i5.bounceme.net
Port: 12666 (TCP)
Connected by: Trojanized NvContainer.exe

---

What Is Likely Compromised

Assume everything on this PC is compromised:
- All saved passwords in Chrome, Edge, and other browsers
- Discord token (attacker can fully impersonate you)
- Steam, Epic, Ubisoft accounts (gaming session theft)
- Banking, email, and payment accounts that were open in browsers
- OneDrive / cloud storage (malware was actively syncing files)
- Any personal or work files on the PC
- Full remote access via the RAT

---

Immediate Recommended Actions (Do These Now)

From a clean device (phone or another computer):
1. Change ALL passwords immediately — especially email, banking, Discord, Steam, Epic, and Ubisoft.
2. Enable 2FA / MFA everywhere (use an authenticator app, not SMS when possible).
3. Revoke active sessions/tokens: Change Discord password (invalidates old tokens). Log out of all Steam/Epic/Ubisoft sessions.
4. Check bank and payment accounts for unauthorized transactions.
5. Review any accounts linked to the compromised email.

On the infected PC:
1. Reboot — this removes the injected MSLDRIVER.DLL from memory.
2. After reboot, run a full Malwarebytes scan (and preferably a second reputable scanner).
3. Never disable your antivirus to run a game hack again. This is exactly how they get you.

---

Bottom Line

This was not a simple virus.

It was a professional-grade, multi-stage infection consisting of:
- Functional game cheat (to lure you)
- Cryptocurrency miner (targeting gamers with powerful GPUs)
- Full remote access trojan (RAT)
- Kernel-level rootkit for maximum stealth
- Multiple persistence mechanisms (service, tasks, registry hijacks, firewall rules)

The system cannot be fully trusted even after cleaning. If you have extremely sensitive data, consider a full wipe and reinstall of Windows.

Stay safe — and avoid downloading game cheats.



This shits such cap lol I've used Exodus for months now no problems xD

UndergroundProviders 04/21/2026 06:55

Should prob remove ring-1:feelsbadman:

Linea 04/25/2026 01:55

Quote:

Originally Posted by stocks (Post 40542165)
What is the best DMA right now? Bun, caruso, or something else?

Caruso and Ice, the rest isn't worth checking out imo

jorunas 04/26/2026 16:11

Vega is a horrible choice, the developers will ignore issues you have and refuse to help you fix them. Rised ticket with them last week and since then they refused to answer or help.

Not only they refuse to help directly they refuse to help resellers fix your issue. Waste of money

Relentless 04/26/2026 20:22

Quote:

Originally Posted by erode (Post 40537085)
Caruso might be worth adding.

i agree, best r6 dma on the market by far

overhead1752 04/27/2026 14:30

Quote:

Originally Posted by jorunas (Post 40567531)
Vega is a horrible choice, the developers will ignore issues you have and refuse to help you fix them. Rised ticket with them last week and since then they refused to answer or help.

Not only they refuse to help directly they refuse to help resellers fix your issue. Waste of money

most likley thats a user issue also you say it yourself the developer isnt your private ticket support

jorunas 04/27/2026 23:46

Quote:

Originally Posted by overhead1752 (Post 40568133)
most likley thats a user issue also you say it yourself the developer isnt your private ticket support

oh yeah devs ignoring completely the resellers and you when you contact them directly is totally user issue.

Told my resellers they reached out a week ago and they still got no reply. Shit ass support, shit ass staff

Xenos 04/28/2026 00:06

Quote:

Originally Posted by UndergroundProviders (Post 40563105)
Should prob remove ring-1:feelsbadman:

Removed and added Unnamed.

Anything else to be added or removed?

Anunymous 04/30/2026 02:15

Quote:

Originally Posted by Xenos (Post 40568576)
Removed and added Unnamed.

Anything else to be added or removed?

Yes, for some reason you ignore some suggestions. Caruso DMA, best one out right now.

MrUnkownUser433 05/01/2026 19:30

guys unnamedtech should be removed here from the list i got since 3 days only problems with it at first i bought 1 month r6 sub after that i didnt got the spoofer instantly it took me 2 days for the support to get me an spoofer key just to the spoofer not working only giving errors and support takes over days to answer


All times are GMT +2. The time now is 09:47.

Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.