Report Overview

  1. Submitted URL

    github.com/AKrisz2/r6cucc/raw/main/Cracks.zip

  2. IP

    140.82.121.3

    ASN

    #36459 GITHUB

  3. Submitted

    2024-05-08 05:02:46

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    28

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
raw.githubusercontent.com358022014-02-062014-03-012024-05-06

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/AKrisz2/r6cucc/main/Cracks.zip

  2. IP

    185.199.110.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=deflate

    Size

    3.1 MB (3091020 bytes)

  2. Hash

    e1926350554a0e1e1fc8e9bc20b01f20

    590ddb41a538f7420208f76b0ce5f2f64183ef3f

  1. Archive (38)

  2. FilenameMd5File type
    README.txt
    534d5517a5329bd3704b9338df66947f
    ASCII text, with CRLF line terminators
    CODEX.ini
    9a3305686dc02d2a23e3552a275bfd3f
    ASCII text, with CRLF line terminators
    CPlay.ini
    51711ecb470b0692d5d798fc4e6568d7
    ASCII text, with CRLF line terminators
    cream_api.ini
    0e3fbeaa6e089812fd90b1749cffdb25
    ASCII text, with CRLF line terminators
    defaultargs.dll
    15d4418cb12fcfacd5040b8f25c95094
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    RainbowSix.bat
    17f0f74d06c8f3cfca6ac28c42f82a17
    DOS batch file, ASCII text, with CRLF line terminators
    steam_api64.dll
    9ff5374f639aba21ec77932b0b572697
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
    steam_api64_o.dll
    8afde2d19c89d0bf1a9f6ec475aa0ebb
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    uplay_r164_o.dll
    ca26813a9fc019890cfc682c629e7f28
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 3 sections
    uplay_r1_loader.dll
    eddbbe03714c5d30ffce07f09bb76d7e
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    uplay_r1_loader64.cdx
    9d64e0e3a07b6c001ed8f106bff9373c
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 9 sections
    uplay_r1_loader64.dll
    db68a475a247e2c31d452478c222a5ac
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    uplay_r1_o.dll
    ebbf77e67da7441c4619fe1e00fbc40c
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 8 sections
    CODEX.ini
    e3c1016f983891ca014b4371b7903487
    ASCII text, with CRLF line terminators
    CPlay.ini
    6013a64d3c35413f9a41b8764291ae10
    ASCII text, with CRLF line terminators
    cream_api.ini
    0e3fbeaa6e089812fd90b1749cffdb25
    ASCII text, with CRLF line terminators
    defaultargs.dll
    15d4418cb12fcfacd5040b8f25c95094
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    RainbowSix.bat
    17f0f74d06c8f3cfca6ac28c42f82a17
    DOS batch file, ASCII text, with CRLF line terminators
    steam_api64.dll
    9ff5374f639aba21ec77932b0b572697
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
    steam_api64_o.dll
    8afde2d19c89d0bf1a9f6ec475aa0ebb
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    upc_r1_loader.dll
    91d18611ef098522d4cb23970e623b45
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    upc_r1_loader64.dll
    bcaa4d73893421c8da2a1d62bc33da3d
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    uplay_r164_o.dll
    ca26813a9fc019890cfc682c629e7f28
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 3 sections
    uplay_r1_o.dll
    ebbf77e67da7441c4619fe1e00fbc40c
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 8 sections
    defaultargs.dll
    15d4418cb12fcfacd5040b8f25c95094
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    RainbowSix.bat
    17f0f74d06c8f3cfca6ac28c42f82a17
    DOS batch file, ASCII text, with CRLF line terminators
    steamclient64.dll
    4cff480250b8541bdb077f91a89d1cd4
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    steam_api64.dll
    37a7e0deae6e7bd1154f8fd059f9a241
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
    steam_appid.txt
    1771a9bff4cc257daf7254d6a8957251
    ASCII text, with CRLF line terminators
    steam_interfaces.txt
    cca6bd0fd6345948ead85477cb99cabc
    ASCII text, with CRLF line terminators
    disable_lan_only.txt
    d41d8cd98f00b204e9800998ecf8427e
    account_name.txt
    7e20d471144b1bff4e1f5d953e05ed15
    ASCII text, with no line terminators
    language.txt
    ba0a6ddd94c73698a3658f92ac222f8a
    ASCII text, with no line terminators
    listen_port.txt
    76bf79e9a0a4c128d97dbd6900773f4b
    ASCII text, with no line terminators
    steam_appid.txt
    1771a9bff4cc257daf7254d6a8957251
    ASCII text, with CRLF line terminators
    upc_r2_loader.dll
    43f6c7a25644e2b1f6860519aaaef780
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 4 sections
    upc_r2_loader64.dll
    4c669990aac12ed5c6b8b93478907bc5
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    uplay_r2.ini
    bd2719404ebbb83e9c5d2eb40e7639ca
    ASCII text

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects a binary signed with the leaked NVIDIA certifcate and compiled after March 1st 2022
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    Public Nextron YARA rulesmalware
    Detects a binary signed with the leaked NVIDIA certifcate and compiled after March 1st 2022
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    Public Nextron YARA rulesmalware
    Detects a binary signed with the leaked NVIDIA certifcate and compiled after March 1st 2022
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/AKrisz2/r6cucc/raw/main/Cracks.zip
140.82.121.3302 Found0 B
raw.githubusercontent.com/AKrisz2/r6cucc/main/Cracks.zip
185.199.110.133200 OK3.1 MB