Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ModMenu.exe1.exe

Overview

General Information

Sample name:ModMenu.exe1.exe
Analysis ID:1637275
MD5:a2f90072225a24e54afd50bb7e6d9b22
SHA1:5e98f0335ae6dce3fe2702202e9fe2f5983fa776
SHA256:edb5eafb528ee827210fa70e02a614a3332d9ffbb991f5d7b748e85972b44e40
Tags:exeuser-TornadoAV_dev
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • ModMenu.exe1.exe (PID: 6716 cmdline: "C:\Users\user\Desktop\ModMenu.exe1.exe" MD5: A2F90072225A24E54AFD50BB7E6D9B22)
    • ModMenu.exe1.exe (PID: 6856 cmdline: "C:\Users\user\Desktop\ModMenu.exe1.exe" MD5: A2F90072225A24E54AFD50BB7E6D9B22)
  • cleanup
{"C2 url": ["citydisco.bet/gdJIS", "crosshairc.life/dAnjhw", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"], "Build id": "6d41630dec3ef478913e977c36f12bc0bb39167a995fd39f57f4"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2440113729.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    00000002.00000003.1310590237.0000000001599000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000003.1310676052.00000000015A9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          Process Memory Space: ModMenu.exe1.exe PID: 6856JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            2.2.ModMenu.exe1.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              2.2.ModMenu.exe1.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-13T13:33:43.640010+010020283713Unknown Traffic192.168.2.1049681188.114.97.3443TCP
                2025-03-13T13:33:46.665344+010020283713Unknown Traffic192.168.2.1049684188.114.97.3443TCP
                2025-03-13T13:33:48.972616+010020283713Unknown Traffic192.168.2.1049686188.114.97.3443TCP
                2025-03-13T13:33:52.143125+010020283713Unknown Traffic192.168.2.1049688188.114.97.3443TCP
                2025-03-13T13:33:55.649875+010020283713Unknown Traffic192.168.2.1049690188.114.97.3443TCP
                2025-03-13T13:33:58.508004+010020283713Unknown Traffic192.168.2.1049691188.114.97.3443TCP
                2025-03-13T13:34:01.884294+010020283713Unknown Traffic192.168.2.1049694188.114.97.3443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: ModMenu.exe1.exeAvira: detected
                Source: https://citydisco.bet:443/gdJISAvira URL Cloud: Label: malware
                Source: crosshairc.life/dAnjhwAvira URL Cloud: Label: malware
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["citydisco.bet/gdJIS", "crosshairc.life/dAnjhw", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"], "Build id": "6d41630dec3ef478913e977c36f12bc0bb39167a995fd39f57f4"}
                Source: ModMenu.exe1.exeReversingLabs: Detection: 47%
                Source: ModMenu.exe1.exeVirustotal: Detection: 46%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.5% probability
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpString decryptor: citydisco.bet/gdJIS
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpString decryptor: crosshairc.life/dAnjhw
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpString decryptor: mrodularmall.top/aNzS
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpString decryptor: jowinjoinery.icu/bdWUa
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpString decryptor: legenassedk.top/bdpWO
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpString decryptor: htardwarehu.icu/Sbdsa
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpString decryptor: cjlaspcorne.icu/DbIps
                Source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmpString decryptor: bugildbett.top/bAuz
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041BBA0 CryptUnprotectData,2_2_0041BBA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041FC98 CryptUnprotectData,2_2_0041FC98
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004207A3 CryptUnprotectData,2_2_004207A3
                Source: ModMenu.exe1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49681 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49684 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49686 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49688 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49690 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49691 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49694 version: TLS 1.2
                Source: ModMenu.exe1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F38ECE FindFirstFileExW,0_2_00F38ECE
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F38F7F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00F38F7F
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F38ECE FindFirstFileExW,2_2_00F38ECE
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F38F7F FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00F38F7F
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then lea eax, dword ptr [esp+48h]2_2_0041108E
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h2_2_0044D130
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-31864DE8h]2_2_00430180
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-190DB6A4h]2_2_00430180
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+47419432h]2_2_00430180
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+4F38BC58h]2_2_0042C9A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+0Ch]2_2_0044D240
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000E8h]2_2_004132C9
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov byte ptr [edi], al2_2_00437B5C
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then push ebp2_2_004113E5
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+000002B0h]2_2_0041BBA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041BBA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041BBA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+4417E88Ch]2_2_0044DD50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+4Ch]2_2_004216A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-4C3CF2B1h]2_2_004216A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx eax, byte ptr [esp+esi-4FC6521Ah]2_2_00444EA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+30h]2_2_0044B775
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+4417E890h]2_2_0044E7E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [esi], cx2_2_00432F10
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then push 00000000h2_2_004338F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov byte ptr [edi], al2_2_004388A5
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+4417E890h]2_2_0044E960
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ebx, bx2_2_0042F11D
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov byte ptr [edi], al2_2_00437B5C
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004309A7
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then jmp ecx2_2_0044C24B
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-40234BF6h]2_2_0044BA55
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov dword ptr [esp], edx2_2_0041EA67
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov dword ptr [esp], edx2_2_0041EA67
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov edi, dword ptr [esp+04h]2_2_0041EA67
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+151E8BBCh]2_2_0041EA67
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov eax, ebx2_2_00424A00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edi, byte ptr [esp+ebx]2_2_00446A09
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+64h]2_2_0043723A
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+238384E0h]2_2_0043723A
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-20540288h]2_2_004492D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-20540288h]2_2_004492D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+50h]2_2_004292E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [ebp+00h], cx2_2_004292E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_004342A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+64h]2_2_004372AB
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+238384E0h]2_2_004372AB
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00441AB0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then jmp eax2_2_0040FABA
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_0040A340
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_0040A340
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then jmp ecx2_2_0044C340
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+151E8BBCh]2_2_0041E30E
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov dword ptr [esp+24h], ecx2_2_0044A31E
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-000000BAh]2_2_0044A31E
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-4D3273BFh]2_2_0042DB32
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-2D8681AAh]2_2_0042DB32
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+74h]2_2_0042DB32
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_00449B90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-190DB6A0h]2_2_004313A8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_0041DC46
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx+08h]2_2_0043247B
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ebx, byte ptr [esi+eax-761C0E5Ch]2_2_0040E4E2
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h2_2_00431CF8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [esi], cx2_2_00412C81
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+64h]2_2_00436CAF
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+238384E0h]2_2_00436CAF
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-5B452AFEh]2_2_0040D4B0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-4C66CD08h]2_2_00420D00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edi+0Dh]2_2_00420D00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ebp, byte ptr [esp+ecx+01A3AABCh]2_2_00420D00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+3Ch]2_2_004335E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+04h]2_2_004335E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041C590
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0041C590
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1ED597A4h2_2_00448DA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then jmp eax2_2_0040E5B1
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00430650
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+64h]2_2_00436E05
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+238384E0h]2_2_00436E05
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx ebp, word ptr [ecx]2_2_0044D6A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0041AF40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_0041F77A
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov word ptr [esi], cx2_2_00432F10
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov dword ptr [esp+08h], ebx2_2_004467E1
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 93A82FD1h2_2_00448F90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-20540284h]2_2_00448F90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_004027B0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov byte ptr [edx], al2_2_00437FB8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 4x nop then mov byte ptr [edx], al2_2_00437FBE

                Networking

                barindex
                Source: Malware configuration extractorURLs: citydisco.bet/gdJIS
                Source: Malware configuration extractorURLs: crosshairc.life/dAnjhw
                Source: Malware configuration extractorURLs: mrodularmall.top/aNzS
                Source: Malware configuration extractorURLs: jowinjoinery.icu/bdWUa
                Source: Malware configuration extractorURLs: legenassedk.top/bdpWO
                Source: Malware configuration extractorURLs: htardwarehu.icu/Sbdsa
                Source: Malware configuration extractorURLs: cjlaspcorne.icu/DbIps
                Source: Malware configuration extractorURLs: bugildbett.top/bAuz
                Source: global trafficTCP traffic: 192.168.2.10:55860 -> 1.1.1.1:53
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49681 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49688 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49694 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49690 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49684 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49691 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.10:49686 -> 188.114.97.3:443
                Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 61Host: citydisco.bet
                Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=G9v2MsJ16BhUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14914Host: citydisco.bet
                Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=fKIreJNBLS1GY9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15056Host: citydisco.bet
                Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=072gcUTqu96User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20405Host: citydisco.bet
                Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=Epu0hr81IPM173tO4MUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2410Host: citydisco.bet
                Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=jYX96PIR3WUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 588966Host: citydisco.bet
                Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 99Host: citydisco.bet
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: citydisco.bet
                Source: unknownHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 61Host: citydisco.bet
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: ModMenu.exe1.exe, 00000002.00000003.1266808858.0000000003D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: ModMenu.exe1.exe, 00000002.00000003.1276116512.0000000001615000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
                Source: ModMenu.exe1.exe, 00000002.00000003.1276116512.0000000001615000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: ModMenu.exe1.exe, 00000002.00000002.2441924906.00000000015F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/
                Source: ModMenu.exe1.exe, 00000002.00000002.2441924906.00000000015F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/(
                Source: ModMenu.exe1.exe, 00000002.00000002.2441924906.00000000015F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/R
                Source: ModMenu.exe1.exe, 00000002.00000002.2441924906.00000000015F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/Y
                Source: ModMenu.exe1.exe, 00000002.00000002.2442029872.0000000001603000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000049878.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1374753456.0000000001603000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1221605832.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000002.2441536898.0000000001577000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000241166.0000000001574000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1310590237.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1221622865.0000000001611000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1266146663.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000342343.0000000001602000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1275515466.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1244049902.000000000160A000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1276031736.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1267115635.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1310676052.00000000015A9000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1266447619.0000000001636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS
                Source: ModMenu.exe1.exe, 00000002.00000003.1221622865.0000000001611000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1244049902.000000000160A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS(D
                Source: ModMenu.exe1.exe, 00000002.00000003.1244049902.000000000160A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISAAAA
                Source: ModMenu.exe1.exe, 00000002.00000002.2441536898.0000000001577000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000241166.0000000001574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISP
                Source: ModMenu.exe1.exe, 00000002.00000003.1221622865.0000000001611000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISime
                Source: ModMenu.exe1.exe, 00000002.00000003.1221605832.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1243857715.0000000001636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISj
                Source: ModMenu.exe1.exe, 00000002.00000002.2442029872.0000000001603000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000342343.0000000001602000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISs
                Source: ModMenu.exe1.exe, 00000002.00000003.1266146663.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1275515466.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1276031736.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1267115635.0000000001636000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1266447619.0000000001636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISz
                Source: ModMenu.exe1.exe, 00000002.00000002.2441536898.0000000001577000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000241166.0000000001574000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1311087913.0000000001574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJIS
                Source: ModMenu.exe1.exe, 00000002.00000002.2441536898.0000000001577000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000241166.0000000001574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJISJ
                Source: ModMenu.exe1.exe, 00000002.00000003.1276116512.0000000001615000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
                Source: ModMenu.exe1.exe, 00000002.00000003.1276116512.0000000001615000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: ModMenu.exe1.exe, 00000002.00000003.1276116512.0000000001615000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
                Source: ModMenu.exe1.exe, 00000002.00000003.1275594590.0000000003E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: ModMenu.exe1.exe, 00000002.00000003.1275594590.0000000003E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: ModMenu.exe1.exe, 00000002.00000003.1276116512.0000000001615000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: ModMenu.exe1.exe, 00000002.00000003.1220847481.0000000003D48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: ModMenu.exe1.exe, 00000002.00000003.1276116512.0000000001615000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
                Source: ModMenu.exe1.exe, 00000002.00000003.1275594590.0000000003E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT
                Source: ModMenu.exe1.exe, 00000002.00000003.1275594590.0000000003E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6
                Source: ModMenu.exe1.exe, 00000002.00000003.1275594590.0000000003E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: ModMenu.exe1.exe, 00000002.00000003.1275594590.0000000003E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: ModMenu.exe1.exe, 00000002.00000003.1275594590.0000000003E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49684
                Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49681
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
                Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49681 -> 443
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49681 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49684 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49686 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49688 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49690 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49691 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49694 version: TLS 1.2
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043F820 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,2_2_0043F820
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_039D1000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,2_2_039D1000
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043F820 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,2_2_0043F820
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044004F GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_0044004F
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF31F00_2_00EF31F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF36400_2_00EF3640
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F200D00_2_00F200D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF58A00_2_00EF58A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0E0A00_2_00F0E0A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F008900_2_00F00890
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F138900_2_00F13890
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F218900_2_00F21890
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF40800_2_00EF4080
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1D0800_2_00F1D080
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF80900_2_00EF8090
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1F0600_2_00F1F060
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF60700_2_00EF6070
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F040400_2_00F04040
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0A8200_2_00F0A820
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F090200_2_00F09020
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1A0200_2_00F1A020
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0C0100_2_00F0C010
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F238130_2_00F23813
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF10000_2_00EF1000
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0B1E00_2_00F0B1E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1F9B00_2_00F1F9B0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F061800_2_00F06180
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F231600_2_00F23160
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFE1700_2_00EFE170
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF49400_2_00EF4940
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0C9400_2_00F0C940
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F229200_2_00F22920
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F101100_2_00F10110
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F191000_2_00F19100
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F3C9080_2_00F3C908
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1F2E00_2_00F1F2E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F052C00_2_00F052C0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFF2D00_2_00EFF2D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F19AB00_2_00F19AB0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFEAA00_2_00EFEAA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F042900_2_00F04290
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF22800_2_00EF2280
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F18A500_2_00F18A50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F26A540_2_00F26A54
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF52200_2_00EF5220
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF92200_2_00EF9220
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F152200_2_00F15220
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F10A100_2_00F10A10
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F16A000_2_00F16A00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F182000_2_00F18200
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F073F00_2_00F073F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0F3D00_2_00F0F3D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0ABA00_2_00F0ABA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F033900_2_00F03390
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF63900_2_00EF6390
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0FB700_2_00F0FB70
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F113700_2_00F11370
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F103500_2_00F10350
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF83400_2_00EF8340
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1EB400_2_00F1EB40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFB3000_2_00EFB300
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFC3100_2_00EFC310
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0CCE00_2_00F0CCE0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFE4C00_2_00EFE4C0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F03CC00_2_00F03CC0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF54A00_2_00EF54A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F004900_2_00F00490
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F23C900_2_00F23C90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF6C800_2_00EF6C80
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F064800_2_00F06480
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F154800_2_00F15480
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F224800_2_00F22480
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F234770_2_00F23477
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F15C600_2_00F15C60
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F184500_2_00F18450
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF2C400_2_00EF2C40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0EC400_2_00F0EC40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F18C400_2_00F18C40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF5C200_2_00EF5C20
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F314200_2_00F31420
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F2B41A0_2_00F2B41A
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1F5D00_2_00F1F5D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F235C00_2_00F235C0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F055B00_2_00F055B0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1EDB00_2_00F1EDB0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF95800_2_00EF9580
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1DD800_2_00F1DD80
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0D5600_2_00F0D560
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0DD500_2_00F0DD50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1FD500_2_00F1FD50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F085400_2_00F08540
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF7D300_2_00EF7D30
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFF5300_2_00EFF530
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFAD300_2_00EFAD30
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F095000_2_00F09500
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F026F00_2_00F026F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F21EF00_2_00F21EF0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0C6A00_2_00F0C6A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F02E900_2_00F02E90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F186900_2_00F18690
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F22E900_2_00F22E90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F1B6800_2_00F1B680
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF46600_2_00EF4660
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F07E500_2_00F07E50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF86400_2_00EF8640
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F06E400_2_00F06E40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0B6300_2_00F0B630
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F196300_2_00F19630
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F076200_2_00F07620
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F00E200_2_00F00E20
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F206200_2_00F20620
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF9FF00_2_00EF9FF0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF67D00_2_00EF67D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F067900_2_00F06790
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFB7800_2_00EFB780
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F3E7820_2_00F3E782
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F10F800_2_00F10F80
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EF17900_2_00EF1790
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F0FF700_2_00F0FF70
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F097200_2_00F09720
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00EFE7300_2_00EFE730
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F19F000_2_00F19F00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004179002_2_00417900
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004289F02_2_004289F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004301802_2_00430180
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0042C9A02_2_0042C9A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040BA402_2_0040BA40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044D2402_2_0044D240
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00444AC02_2_00444AC0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004132C92_2_004132C9
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00437B5C2_2_00437B5C
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041BBA02_2_0041BBA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041FC982_2_0041FC98
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004114B02_2_004114B0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044DD502_2_0044DD50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044AD5B2_2_0044AD5B
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040F5702_2_0040F570
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00415DA82_2_00415DA8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004216A02_2_004216A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00444EA02_2_00444EA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00436EBD2_2_00436EBD
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004010402_2_00401040
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0042F8402_2_0042F840
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044A8662_2_0044A866
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004070062_2_00407006
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004550092_2_00455009
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004048122_2_00404812
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004440202_2_00444020
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044A0C42_2_0044A0C4
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004298C02_2_004298C0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004210CE2_2_004210CE
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004338F02_2_004338F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044C8822_2_0044C882
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004388A52_2_004388A5
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041D1522_2_0041D152
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0042F11D2_2_0042F11D
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00437B5C2_2_00437B5C
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044D9C02_2_0044D9C0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043F1F02_2_0043F1F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004309A72_2_004309A7
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040C2502_2_0040C250
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041EA672_2_0041EA67
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00424A002_2_00424A00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00446A092_2_00446A09
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00445A102_2_00445A10
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040EA202_2_0040EA20
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00446A332_2_00446A33
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043723A2_2_0043723A
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004492D02_2_004492D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004292E02_2_004292E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004442802_2_00444280
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043CA902_2_0043CA90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040A3402_2_0040A340
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00408B602_2_00408B60
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041E30E2_2_0041E30E
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00402B102_2_00402B10
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00432B212_2_00432B21
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00414B262_2_00414B26
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0042DB322_2_0042DB32
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00423BDB2_2_00423BDB
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004253A02_2_004253A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004313A82_2_004313A8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00416BB72_2_00416BB7
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041DC462_2_0041DC46
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043247B2_2_0043247B
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004264002_2_00426400
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00427C102_2_00427C10
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004234192_2_00423419
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044C4202_2_0044C420
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040BCF02_2_0040BCF0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00431CF82_2_00431CF8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0042F4802_2_0042F480
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0042D4952_2_0042D495
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004174A12_2_004174A1
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00436CAF2_2_00436CAF
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040AD402_2_0040AD40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040DD5F2_2_0040DD5F
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004095602_2_00409560
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043CD002_2_0043CD00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043F5002_2_0043F500
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0042451E2_2_0042451E
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044C5202_2_0044C520
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004245352_2_00424535
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040CDC02_2_0040CDC0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00445DC02_2_00445DC0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004035902_2_00403590
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041C5902_2_0041C590
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040C5A02_2_0040C5A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00424DB02_2_00424DB0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00413DBA2_2_00413DBA
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00407E502_2_00407E50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004386CD2_2_004386CD
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043EEF02_2_0043EEF0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00435EA02_2_00435EA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044D6A02_2_0044D6A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0043A7472_2_0043A747
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0040FF702_2_0040FF70
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004257102_2_00425710
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00403F302_2_00403F30
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00454FC32_2_00454FC3
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00408FD02_2_00408FD0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0041FFD02_2_0041FFD0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_004377ED2_2_004377ED
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F200D02_2_00F200D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF58A02_2_00EF58A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0E0A02_2_00F0E0A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F008902_2_00F00890
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F138902_2_00F13890
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F218902_2_00F21890
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF40802_2_00EF4080
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1D0802_2_00F1D080
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF80902_2_00EF8090
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1F0602_2_00F1F060
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF60702_2_00EF6070
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F040402_2_00F04040
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0A8202_2_00F0A820
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F090202_2_00F09020
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1A0202_2_00F1A020
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0C0102_2_00F0C010
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F238132_2_00F23813
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF10002_2_00EF1000
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0B1E02_2_00F0B1E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF31F02_2_00EF31F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1F9B02_2_00F1F9B0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F061802_2_00F06180
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F231602_2_00F23160
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFE1702_2_00EFE170
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF49402_2_00EF4940
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0C9402_2_00F0C940
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F229202_2_00F22920
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F101102_2_00F10110
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F191002_2_00F19100
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F3C9082_2_00F3C908
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1F2E02_2_00F1F2E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F052C02_2_00F052C0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFF2D02_2_00EFF2D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F19AB02_2_00F19AB0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFEAA02_2_00EFEAA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F042902_2_00F04290
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF22802_2_00EF2280
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F18A502_2_00F18A50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F26A542_2_00F26A54
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF52202_2_00EF5220
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF92202_2_00EF9220
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F152202_2_00F15220
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F10A102_2_00F10A10
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F16A002_2_00F16A00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F182002_2_00F18200
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F073F02_2_00F073F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0F3D02_2_00F0F3D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0ABA02_2_00F0ABA0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F033902_2_00F03390
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF63902_2_00EF6390
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0FB702_2_00F0FB70
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F113702_2_00F11370
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F103502_2_00F10350
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF83402_2_00EF8340
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1EB402_2_00F1EB40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFB3002_2_00EFB300
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFC3102_2_00EFC310
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0CCE02_2_00F0CCE0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFE4C02_2_00EFE4C0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F03CC02_2_00F03CC0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF54A02_2_00EF54A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F004902_2_00F00490
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F23C902_2_00F23C90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF6C802_2_00EF6C80
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F064802_2_00F06480
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F154802_2_00F15480
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F224802_2_00F22480
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F234772_2_00F23477
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F15C602_2_00F15C60
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F184502_2_00F18450
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF2C402_2_00EF2C40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0EC402_2_00F0EC40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F18C402_2_00F18C40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF5C202_2_00EF5C20
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F314202_2_00F31420
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F2B41A2_2_00F2B41A
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1F5D02_2_00F1F5D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F235C02_2_00F235C0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F055B02_2_00F055B0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1EDB02_2_00F1EDB0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF95802_2_00EF9580
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1DD802_2_00F1DD80
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0D5602_2_00F0D560
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0DD502_2_00F0DD50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1FD502_2_00F1FD50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F085402_2_00F08540
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF7D302_2_00EF7D30
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFF5302_2_00EFF530
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFAD302_2_00EFAD30
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F095002_2_00F09500
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F026F02_2_00F026F0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F21EF02_2_00F21EF0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0C6A02_2_00F0C6A0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F02E902_2_00F02E90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F186902_2_00F18690
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F22E902_2_00F22E90
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F1B6802_2_00F1B680
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF46602_2_00EF4660
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F07E502_2_00F07E50
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF86402_2_00EF8640
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF36402_2_00EF3640
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F06E402_2_00F06E40
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0B6302_2_00F0B630
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F196302_2_00F19630
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F076202_2_00F07620
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F00E202_2_00F00E20
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F206202_2_00F20620
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF9FF02_2_00EF9FF0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF67D02_2_00EF67D0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F067902_2_00F06790
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFB7802_2_00EFB780
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F3E7822_2_00F3E782
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F10F802_2_00F10F80
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EF17902_2_00EF1790
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F0FF702_2_00F0FF70
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F097202_2_00F09720
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00EFE7302_2_00EFE730
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F19F002_2_00F19F00
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: String function: 00F2F1CC appears 46 times
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: String function: 00F34014 appears 34 times
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: String function: 0041AFF0 appears 117 times
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: String function: 00F26F60 appears 102 times
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: String function: 0040B380 appears 45 times
                Source: ModMenu.exe1.exeStatic PE information: invalid certificate
                Source: ModMenu.exe1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: ModMenu.exe1.exeStatic PE information: Section: .bss ZLIB complexity 1.0003319215238764
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@1/1
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00444EA0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_00444EA0
                Source: ModMenu.exe1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: ModMenu.exe1.exe, 00000002.00000003.1220552647.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1245034628.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1245585155.000000000162C000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1221330290.0000000001619000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: ModMenu.exe1.exeReversingLabs: Detection: 47%
                Source: ModMenu.exe1.exeVirustotal: Detection: 46%
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile read: C:\Users\user\Desktop\ModMenu.exe1.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\ModMenu.exe1.exe "C:\Users\user\Desktop\ModMenu.exe1.exe"
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeProcess created: C:\Users\user\Desktop\ModMenu.exe1.exe "C:\Users\user\Desktop\ModMenu.exe1.exe"
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeProcess created: C:\Users\user\Desktop\ModMenu.exe1.exe "C:\Users\user\Desktop\ModMenu.exe1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: ModMenu.exe1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F2711A push ecx; ret 0_2_00F2712D
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00452D7B push 00BB2166h; ret 2_2_00452D80
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00453FFC push ebp; retf 2_2_00453FFD
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F2711A push ecx; ret 2_2_00F2712D
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeWindow / User API: threadDelayed 6233Jump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exe TID: 6900Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exe TID: 7404Thread sleep count: 6233 > 30Jump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F38ECE FindFirstFileExW,0_2_00F38ECE
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F38F7F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00F38F7F
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F38ECE FindFirstFileExW,2_2_00F38ECE
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F38F7F FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00F38F7F
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - NDCDYNVMware20,11696501413z
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696501413o
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696501413h
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.co.inVMware20,11696501413~
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696501413j
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - COM.HKVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.2000076388.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1353182130.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1310590237.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000002.2441376377.000000000155C000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000002.2441633090.000000000159C000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1311044403.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000391767.000000000159B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696501413|UE
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696501413x
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413}
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413x
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696501413t
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - HKVMware20,11696501413]
                Source: ModMenu.exe1.exe, 00000002.00000003.2000076388.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1353182130.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1310590237.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000002.2441633090.000000000159C000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.1311044403.0000000001599000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000391767.000000000159B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW$
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696501413s
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU East & CentralVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.1245266887.0000000003D6B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696501413p
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696501413u
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - GDCDYNVMware20,11696501413p
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU WestVMware20,11696501413n
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.comVMware20,11696501413}
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactiveuserers.co.inVMware20,11696501413d
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696501413x
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696501413t
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413^
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactiveuserers.comVMware20,11696501413
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696501413f
                Source: ModMenu.exe1.exe, 00000002.00000003.1245384983.0000000003D5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696501413
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeAPI call chain: ExitProcess graph end nodegraph_2-42435
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_0044A9E0 LdrInitializeThunk,2_2_0044A9E0
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F26DE8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F26DE8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F4F1B4 mov edi, dword ptr fs:[00000030h]0_2_00F4F1B4
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F3490C GetProcessHeap,0_2_00F3490C
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F26A2C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00F26A2C
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F26DE8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F26DE8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F26DDC SetUnhandledExceptionFilter,0_2_00F26DDC
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F2EF1E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F2EF1E
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F26A2C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00F26A2C
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F26DE8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00F26DE8
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F26DDC SetUnhandledExceptionFilter,2_2_00F26DDC
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 2_2_00F2EF1E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00F2EF1E

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F4F1B4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00F4F1B4
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeMemory written: C:\Users\user\Desktop\ModMenu.exe1.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeProcess created: C:\Users\user\Desktop\ModMenu.exe1.exe "C:\Users\user\Desktop\ModMenu.exe1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,0_2_00F388F6
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: EnumSystemLocalesW,0_2_00F388AB
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: EnumSystemLocalesW,0_2_00F341F7
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00F3899D
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,0_2_00F38AA3
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00F38238
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,0_2_00F33CFC
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: EnumSystemLocalesW,0_2_00F38489
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00F38524
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,0_2_00F387D6
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: EnumSystemLocalesW,0_2_00F38777
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,2_2_00F388F6
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: EnumSystemLocalesW,2_2_00F388AB
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: EnumSystemLocalesW,2_2_00F341F7
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00F3899D
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,2_2_00F38AA3
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00F38238
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,2_2_00F33CFC
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: EnumSystemLocalesW,2_2_00F38489
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00F38524
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: GetLocaleInfoW,2_2_00F387D6
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: EnumSystemLocalesW,2_2_00F38777
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeCode function: 0_2_00F27827 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F27827
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: ModMenu.exe1.exe, 00000002.00000002.2441536898.0000000001577000.00000004.00000020.00020000.00000000.sdmp, ModMenu.exe1.exe, 00000002.00000003.2000241166.0000000001574000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: ModMenu.exe1.exe PID: 6856, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.ModMenu.exe1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.ModMenu.exe1.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2440113729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: ModMenu.exe1.exe, 00000002.00000003.1353182130.0000000001599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
                Source: ModMenu.exe1.exe, 00000002.00000003.1353182130.0000000001599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: ModMenu.exe1.exe, 00000002.00000002.2441845007.00000000015E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "},{"en":"cjelfplplebdjjenllpjcblmjkfcffne","ez":"Jaxx Liberty"},{"en":"fihkakfobkmkjojpchpfgcmhfjnmnfpi}
                Source: ModMenu.exe1.exe, 00000002.00000003.1353182130.0000000001599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: ModMenu.exe1.exe, 00000002.00000003.1310590237.0000000001599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: ModMenu.exe1.exe, 00000002.00000003.1310590237.0000000001599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: ModMenu.exe1.exe, 00000002.00000003.1353182130.0000000001599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                Source: ModMenu.exe1.exe, 00000002.00000003.1310590237.0000000001599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: ModMenu.exe1.exe, 00000002.00000003.1311087913.000000000156B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\PALRGUCVEHJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\PALRGUCVEHJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\SQRKHNBNYNJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\WKXEWIOTXIJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\WKXEWIOTXIJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                Source: C:\Users\user\Desktop\ModMenu.exe1.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
                Source: Yara matchFile source: 00000002.00000003.1310590237.0000000001599000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000003.1310676052.00000000015A9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ModMenu.exe1.exe PID: 6856, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: ModMenu.exe1.exe PID: 6856, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.ModMenu.exe1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.ModMenu.exe1.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2440113729.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1191730492.0000000000859000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                21
                Virtualization/Sandbox Evasion
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Screen Capture
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                211
                Process Injection
                LSASS Memory241
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                Deobfuscate/Decode Files or Information
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares31
                Data from Local System
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS1
                Process Discovery
                Distributed Component Object Model3
                Clipboard Data
                Protocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials11
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.