6552-cleo-4-dlya-gta-san-andreas-gtasa.exe

ModInstall

Game Modding

The application 6552-cleo-4-dlya-gta-san-andreas-gtasa.exe by Game Modding has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. While running, it connects to the Internet address app-gw2.argonlabs.ru on port 80 using the HTTP protocol.
Publisher:
www.GameModding.net  (signed by Game Modding)

Product:
ModInstall

Description:
ModInstall 3.0

Version:
3.1.0.0

MD5:
efb6f421b8f50ba131fc31b3fd9bbe17

SHA-1:
f10ea227f7effb8c41d0aab5663cb69ba31e49ce

SHA-256:
990d55f0a3dd45e743c8e5c8c797cf9494ecf5d3ce07878755cb392840ebeb62

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/27/2024 7:35:54 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.GameModding (L)
17.1.17.21

File size:
2.1 MB (2,178,912 bytes)

Product version:
1.0.0.0

Copyright:
www.GameModding.net

File type:
Executable application (Win32 EXE)

Language:
Russian (Russia)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\6552-cleo-4-dlya-gta-san-andreas-gtasa.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/14/2016 7:00:00 PM

Valid to:
3/15/2017 6:59:59 PM

Subject:
CN=Game Modding, O=Game Modding, STREET="kv. 33, 129 64-oi Armii ul.", L=Volgograd, S=RU, PostalCode=400079, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
353FBC711BE59C95A27F1D9D4D3255B4

File PE Metadata
Compilation timestamp:
10/19/2016 8:00:08 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.0

Entry address:
0x3DF2B0

Entry point:
60, BE, 00, B0, 6A, 00, 8D, BE, 00, 60, D5, FF, C7, 87, C8, 00, 2B, 00, 26, 9E, 08, D3, 57, EB, 11, 90, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Entropy:
7.7848  (probably packed)

Code size:
1.2 MB (1,265,664 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to app-gw1.argonlabs.ru  (178.32.30.51:80)

TCP (HTTP):
Connects to static.153.11.243.136.clients.your-server.de  (136.243.11.153:80)

TCP (HTTP):
Connects to 125.235.4.59.adsl.viettel.vn  (125.235.4.59:80)

TCP (HTTP):
Connects to app-gw2.argonlabs.ru  (178.33.195.199:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to static.vnpt.vn  (113.171.202.24:80)

TCP (HTTP):
Connects to moscow.cdnmail.ru  (217.69.139.110:80)

TCP (HTTP):
Connects to ext1-res.coin32.com  (151.80.243.158:80)

TCP (HTTP):
Connects to a23-59-133-163.deploy.static.akamaitechnologies.com  (23.59.133.163:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a23-15-149-163.deploy.static.akamaitechnologies.com  (23.15.149.163:80)

TCP (HTTP):
Connects to a147-229-255-73.deploy.akamaitechnologies.com  (147.229.255.73:80)

Remove 6552-cleo-4-dlya-gta-san-andreas-gtasa.exe - Powered by Reason Core Security