Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YY#U6302#U53f7#U534f#U8bae.exe

Overview

General Information

Sample name:YY#U6302#U53f7#U534f#U8bae.exe
renamed because original name is a hash value
Original sample name:YY.exe
Analysis ID:1457838
MD5:765cf453d0cea3719b619e4c55881093
SHA1:060ae0476bbd908d08537c8b6bb24d2ec83d524c
SHA256:3d76cc27be3265077a5c15f2c76848b73148df035b7d3a3d2b9ad77232587cfd
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected VMProtect packer
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: YY#U6302#U53f7#U534f#U8bae.exeVirustotal: Detection: 50%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
Source: YY#U6302#U53f7#U534f#U8bae.exeJoe Sandbox ML: detected
Source: YY#U6302#U53f7#U534f#U8bae.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Binary string: \iext_fnr.pdb source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701213455.0000000002F09000.00000004.00000020.00020000.00000000.sdmp, YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701495506.000000006CF60000.00000002.00000001.01000000.00000004.sdmp, iext1.fnr.bbs.125.la.0.dr
Source: Binary string: C:\Program Files (x86)\e\lib\ExuiKrnln\ExuiKrnln.pdb source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: F:\openssl-1.0.0d\openssl-1.0.0d\out32dll\libeay32.pdb source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: F:\openssl-1.0.0d\openssl-1.0.0d\out32dll\libeay32.pdb source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: \iext_fnr.pdbM source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701213455.0000000002F09000.00000004.00000020.00020000.00000000.sdmp, YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701495506.000000006CF60000.00000002.00000001.01000000.00000004.sdmp, iext1.fnr.bbs.125.la.0.dr
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFC5C0 FindFirstFileW,FindNextFileW,FindNextFileW,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFC790 FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,lstrlenA,
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000003.1699125254.0000000001351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://117.72.34.175:1011/?OrderID=4BA33E0B1BE84295&ipnumber=50
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://120.26.95.191:5658/
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://120.26.95.191:5658/http://120.26.95.191:5659/qq17336171577b2cc005c28c42472000e7863283a212&_=h
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://120.26.95.191:5659/
Source: iext1.fnr.bbs.125.la.0.drString found in binary or memory: http://bbs.125.la/
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://channel.yy.com/ajax/member/indexAction
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://do-dw.yy.com/user.php?sids=
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://hgame.yy.com/action/getUserLoginInfo.json
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://hgame.yy.com/action/getUserLoginInfo.jsondata.ownChannels
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://peipei.yy.com/web/account/internal/account/list
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://vip.yy.com/service/web/user/info?_time=
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://vip.yy.com/service/web/user/info?_time=vipLevel
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://vip.yy.com/vip/vcard/indexrest?_time=
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.openssl.org/V
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.uc.cn/ip
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.uc.cn/ipIP:http://
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.yy.com/
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.yy.com/search-
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.yy.com/sid
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701213455.0000000002F09000.00000004.00000020.00020000.00000000.sdmp, YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701495506.000000006CF60000.00000002.00000001.01000000.00000004.sdmp, iext1.fnr.bbs.125.la.0.drString found in binary or memory: https://bbs.125.la/thread-14738139-1-1.html
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://captcha.yy.com/baidu/submit.do?appid=
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://captcha.yy.com/baidu/submit.do?appid=obj
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://hd.vip.yy.com/service/hdplatform/drawgift/202402ee1a8f/giftpagingp?drawGiftGroupId=202402ee1
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://hgame.yy.com/person/p_account
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://iexui.com/downexui
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yyweb
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yywebconfigData/giftDatac
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://nfnba.lanzoub.com/ietaw0udyhid
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://passport.baidu.com/viewlog/getstyle?ak=
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://passport.baidu.com/viewlog?ak=
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://udb.yy.com/authentication.do?action=authenticate&appid=5060&busiUrl=http%3A%2F%2Fwww.yy.com&
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.dmdaili.com/yaoqing/33405.html
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.xiequ.cn/index.html?dc1bbee2
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.yy.com/gu/
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.yy.com/u/
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.yy.com/zone/assets/total.json
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.yy.com/zone/userinfo/getUserInfo.json
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ysapi.yy.com/api/internal/nobleQuery/QueryUserInfoReq.json?data=
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://yyfkw.cn
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://yyfkw.cn999https://nfnba.lanzoub.com/ietaw0udyhid

System Summary

barindex
Source: YY#U6302#U53f7#U534f#U8bae.exeStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_00401770
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF03D60
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF03060
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF25CA0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF56C8E
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF08C70
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF27D80
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF58D78
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF04EB0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF32EA0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF29E30
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF30E30
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF22F50
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF0AF40
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF28F20
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF35F20
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF1C860
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF42814
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEF19F0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF24940
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF32930
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF0BAE0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF17A1E
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF1ABC0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFDB50
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF33B00
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF2B4E0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF424B5
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF20400
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEF4590
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF1F560
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF5D549
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF0C6E0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEF76D0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF496A7
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF2A680
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEF3640
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF22610
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF067A0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF5C790
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFC790
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF04770
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF13770
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF4B710
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF251C0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF17180
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEF5190
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: String function: 6CF3C240 appears 47 times
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSkinH_EL.dll vs YY#U6302#U53f7#U534f#U8bae.exe
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameExuiKrnl.dll* vs YY#U6302#U53f7#U534f#U8bae.exe
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibeay32.dllH vs YY#U6302#U53f7#U534f#U8bae.exe
Source: YY#U6302#U53f7#U534f#U8bae.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFAD60 CreateToolhelp32Snapshot,GetCurrentProcessId,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,FindCloseChangeNotification,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeFile created: C:\Users\user\AppData\Local\Temp\iext1.fnr.bbs.125.laJump to behavior
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: YY#U6302#U53f7#U534f#U8bae.exeVirustotal: Detection: 50%
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: rasapi32.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: winmm.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: wininet.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: rasman.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: uxtheme.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: udbauthsdk.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: textshaping.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: textinputframework.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: coreuicomponents.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: coremessaging.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: ntmarta.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: wintypes.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: wintypes.dll
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeSection loaded: wintypes.dll
Source: YY#U6302#U53f7#U534f#U8bae.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: YY#U6302#U53f7#U534f#U8bae.exeStatic file information: File size 4972544 > 1048576
Source: YY#U6302#U53f7#U534f#U8bae.exeStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x4b9000
Source: Binary string: \iext_fnr.pdb source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701213455.0000000002F09000.00000004.00000020.00020000.00000000.sdmp, YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701495506.000000006CF60000.00000002.00000001.01000000.00000004.sdmp, iext1.fnr.bbs.125.la.0.dr
Source: Binary string: C:\Program Files (x86)\e\lib\ExuiKrnln\ExuiKrnln.pdb source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: F:\openssl-1.0.0d\openssl-1.0.0d\out32dll\libeay32.pdb source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: F:\openssl-1.0.0d\openssl-1.0.0d\out32dll\libeay32.pdb source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: \iext_fnr.pdbM source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701213455.0000000002F09000.00000004.00000020.00020000.00000000.sdmp, YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701495506.000000006CF60000.00000002.00000001.01000000.00000004.sdmp, iext1.fnr.bbs.125.la.0.dr
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF03D60 CreateIextInterface,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,GetModuleFileNameW,_wcsrchr,LoadLibraryW,FreeLibrary,GetModuleHandleW,GetCurrentProcess,ReadProcessMemory,OpenFileMappingW,GetCurrentProcessId,MapViewOfFile,UnmapViewOfFile,CloseHandle,LoadLibraryW,GetProcAddress,FreeLibrary,
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: YY#U6302#U53f7#U534f#U8bae.exeStatic PE information: section name: .vmp0
Source: YY#U6302#U53f7#U534f#U8bae.exeStatic PE information: section name: .vmp1
Source: iext1.fnr.bbs.125.la.0.drStatic PE information: section name: .detourc
Source: iext1.fnr.bbs.125.la.0.drStatic PE information: section name: .detourd
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_00406D9F pushad ; ret
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_004065AC push ebx; retf
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF5BFC1 push ecx; ret
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeFile created: C:\Users\user\AppData\Local\Temp\iext1.fnr.bbs.125.laJump to dropped file
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeFile created: C:\Users\user\AppData\Local\Temp\iext1.fnr.bbs.125.laJump to dropped file
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFAD60 CreateToolhelp32Snapshot,GetCurrentProcessId,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,FindCloseChangeNotification,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\iext1.fnr.bbs.125.laJump to dropped file
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeAPI coverage: 1.2 %
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFC5C0 FindFirstFileW,FindNextFileW,FindNextFileW,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFC790 FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,lstrlenA,
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1700974559.000000000131E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllpp
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF03060 GdiplusStartup,IsDebuggerPresent,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CEFAD60 CreateToolhelp32Snapshot,GetCurrentProcessId,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,FindCloseChangeNotification,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF03D60 CreateIextInterface,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,GetModuleFileNameW,_wcsrchr,LoadLibraryW,FreeLibrary,GetModuleHandleW,GetCurrentProcess,ReadProcessMemory,OpenFileMappingW,GetCurrentProcessId,MapViewOfFile,UnmapViewOfFile,CloseHandle,LoadLibraryW,GetProcAddress,FreeLibrary,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF56124 GetProcessHeap,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF3B805 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF44984 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF3C469 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: ExuiKrnln.dll,Tab_HbitmapLayeredTab_UpdateStateTab_RefreshCallBackTab_NeedUpdateFocusManagementTabDownTab_OLDFocuscontrolTab_WM_DESTROYTab_WM_DESTROY_TRUETab_WM_32879Tab_WM_DESTROY_FALSETab_IsWinControlWM_SIZEIsunicodeTab_GraphicsTab_OldHbitmapICON_1DownlistExShell_TrayWnd
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF3C285 cpuid
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF3C58C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
Source: C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exeCode function: 0_2_6CF5445D GetTimeZoneInformation,
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager3
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
YY#U6302#U53f7#U534f#U8bae.exe50%VirustotalBrowse
YY#U6302#U53f7#U534f#U8bae.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\iext1.fnr.bbs.125.la5%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG0%Avira URL Cloudsafe
https://ysapi.yy.com/api/internal/nobleQuery/QueryUserInfoReq.json?data=0%Avira URL Cloudsafe
http://www.yy.com/search-0%Avira URL Cloudsafe
https://www.yy.com/zone/assets/total.json0%Avira URL Cloudsafe
http://hgame.yy.com/action/getUserLoginInfo.jsondata.ownChannels0%Avira URL Cloudsafe
http://120.26.95.191:5659/0%Avira URL Cloudsafe
http://www.openssl.org/V0%Avira URL Cloudsafe
https://ysapi.yy.com/api/internal/nobleQuery/QueryUserInfoReq.json?data=0%VirustotalBrowse
https://www.yy.com/zone/assets/total.json0%VirustotalBrowse
http://www.yy.com/0%Avira URL Cloudsafe
http://www.openssl.org/V0%VirustotalBrowse
http://peipei.yy.com/web/account/internal/account/list0%Avira URL Cloudsafe
http://www.yy.com/0%VirustotalBrowse
https://www.yy.com/u/0%Avira URL Cloudsafe
http://www.yy.com/search-0%VirustotalBrowse
http://bbs.125.la/0%Avira URL Cloudsafe
http://hgame.yy.com/action/getUserLoginInfo.jsondata.ownChannelsNaN%VirustotalBrowse
https://bbs.125.la/thread-14738139-1-1.html0%Avira URL Cloudsafe
http://120.26.95.191:5659/NaN%VirustotalBrowse
http://vip.yy.com/service/web/user/info?_time=vipLevel0%Avira URL Cloudsafe
https://www.yy.com/u/0%VirustotalBrowse
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG0%VirustotalBrowse
http://peipei.yy.com/web/account/internal/account/listNaN%VirustotalBrowse
http://bbs.125.la/1%VirustotalBrowse
http://hgame.yy.com/action/getUserLoginInfo.json0%Avira URL Cloudsafe
https://www.dmdaili.com/yaoqing/33405.html0%Avira URL Cloudsafe
https://captcha.yy.com/baidu/submit.do?appid=0%Avira URL Cloudsafe
https://passport.baidu.com/viewlog/getstyle?ak=0%Avira URL Cloudsafe
https://bbs.125.la/thread-14738139-1-1.html1%VirustotalBrowse
http://vip.yy.com/service/web/user/info?_time=vipLevelNaN%VirustotalBrowse
https://www.yy.com/zone/userinfo/getUserInfo.json0%Avira URL Cloudsafe
https://passport.baidu.com/viewlog/getstyle?ak=0%VirustotalBrowse
http://www.openssl.org/support/faq.html0%Avira URL Cloudsafe
https://www.dmdaili.com/yaoqing/33405.htmlNaN%VirustotalBrowse
https://hd.vip.yy.com/service/hdplatform/drawgift/202402ee1a8f/giftpagingp?drawGiftGroupId=202402ee10%Avira URL Cloudsafe
http://hgame.yy.com/action/getUserLoginInfo.jsonNaN%VirustotalBrowse
https://captcha.yy.com/baidu/submit.do?appid=0%VirustotalBrowse
https://iexui.com/downexui0%Avira URL Cloudsafe
http://www.openssl.org/support/faq.html0%VirustotalBrowse
http://do-dw.yy.com/user.php?sids=0%Avira URL Cloudsafe
https://hgame.yy.com/person/p_account0%Avira URL Cloudsafe
https://iexui.com/downexui0%VirustotalBrowse
https://captcha.yy.com/baidu/submit.do?appid=obj0%Avira URL Cloudsafe
https://yyfkw.cn0%Avira URL Cloudsafe
http://117.72.34.175:1011/?OrderID=4BA33E0B1BE84295&ipnumber=500%Avira URL Cloudsafe
https://hd.vip.yy.com/service/hdplatform/drawgift/202402ee1a8f/giftpagingp?drawGiftGroupId=202402ee1NaN%VirustotalBrowse
https://hgame.yy.com/person/p_account0%VirustotalBrowse
http://120.26.95.191:5658/0%Avira URL Cloudsafe
https://www.yy.com/zone/userinfo/getUserInfo.jsonNaN%VirustotalBrowse
https://captcha.yy.com/baidu/submit.do?appid=obj0%VirustotalBrowse
https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yywebconfigData/giftDatac0%Avira URL Cloudsafe
https://yyfkw.cn0%VirustotalBrowse
http://vip.yy.com/service/web/user/info?_time=0%Avira URL Cloudsafe
http://120.26.95.191:5658/NaN%VirustotalBrowse
https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yywebconfigData/giftDatac0%VirustotalBrowse
http://vip.yy.com/vip/vcard/indexrest?_time=0%Avira URL Cloudsafe
http://www.yy.com/sid0%Avira URL Cloudsafe
https://www.xiequ.cn/index.html?dc1bbee20%Avira URL Cloudsafe
http://www.uc.cn/ip0%Avira URL Cloudsafe
http://www.yy.com/sid0%VirustotalBrowse
https://udb.yy.com/authentication.do?action=authenticate&appid=5060&busiUrl=http%3A%2F%2Fwww.yy.com&0%Avira URL Cloudsafe
http://do-dw.yy.com/user.php?sids=0%VirustotalBrowse
http://vip.yy.com/service/web/user/info?_time=0%VirustotalBrowse
https://udb.yy.com/authentication.do?action=authenticate&appid=5060&busiUrl=http%3A%2F%2Fwww.yy.com&0%VirustotalBrowse
http://117.72.34.175:1011/?OrderID=4BA33E0B1BE84295&ipnumber=50NaN%VirustotalBrowse
https://www.yy.com/gu/0%Avira URL Cloudsafe
http://www.uc.cn/ip0%VirustotalBrowse
http://www.uc.cn/ipIP:http://0%Avira URL Cloudsafe
https://www.yy.com/gu/0%VirustotalBrowse
https://www.xiequ.cn/index.html?dc1bbee2NaN%VirustotalBrowse
https://nfnba.lanzoub.com/ietaw0udyhid0%Avira URL Cloudsafe
https://yyfkw.cn999https://nfnba.lanzoub.com/ietaw0udyhid0%Avira URL Cloudsafe
http://120.26.95.191:5658/http://120.26.95.191:5659/qq17336171577b2cc005c28c42472000e7863283a212&_=h0%Avira URL Cloudsafe
https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yyweb0%Avira URL Cloudsafe
https://passport.baidu.com/viewlog?ak=0%Avira URL Cloudsafe
https://nfnba.lanzoub.com/ietaw0udyhidNaN%VirustotalBrowse
http://vip.yy.com/vip/vcard/indexrest?_time=0%VirustotalBrowse
http://channel.yy.com/ajax/member/indexAction0%Avira URL Cloudsafe
http://www.uc.cn/ipIP:http://0%VirustotalBrowse
http://120.26.95.191:5658/http://120.26.95.191:5659/qq17336171577b2cc005c28c42472000e7863283a212&_=hNaN%VirustotalBrowse
https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yyweb0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNGYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://ysapi.yy.com/api/internal/nobleQuery/QueryUserInfoReq.json?data=YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://hgame.yy.com/action/getUserLoginInfo.jsondata.ownChannelsYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.yy.com/zone/assets/total.jsonYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.yy.com/search-YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://120.26.95.191:5659/YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.openssl.org/VYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.yy.com/YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://peipei.yy.com/web/account/internal/account/listYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.yy.com/u/YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://bbs.125.la/iext1.fnr.bbs.125.la.0.drfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://bbs.125.la/thread-14738139-1-1.htmlYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701213455.0000000002F09000.00000004.00000020.00020000.00000000.sdmp, YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1701495506.000000006CF60000.00000002.00000001.01000000.00000004.sdmp, iext1.fnr.bbs.125.la.0.drfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://vip.yy.com/service/web/user/info?_time=vipLevelYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://hgame.yy.com/action/getUserLoginInfo.jsonYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://captcha.yy.com/baidu/submit.do?appid=YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.dmdaili.com/yaoqing/33405.htmlYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://passport.baidu.com/viewlog/getstyle?ak=YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.yy.com/zone/userinfo/getUserInfo.jsonYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.openssl.org/support/faq.htmlYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://hd.vip.yy.com/service/hdplatform/drawgift/202402ee1a8f/giftpagingp?drawGiftGroupId=202402ee1YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://iexui.com/downexuiYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://do-dw.yy.com/user.php?sids=YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://hgame.yy.com/person/p_accountYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://captcha.yy.com/baidu/submit.do?appid=objYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://yyfkw.cnYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://117.72.34.175:1011/?OrderID=4BA33E0B1BE84295&ipnumber=50YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000003.1699125254.0000000001351000.00000004.00000020.00020000.00000000.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://120.26.95.191:5658/YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yywebconfigData/giftDatacYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://vip.yy.com/service/web/user/info?_time=YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://vip.yy.com/vip/vcard/indexrest?_time=YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.yy.com/sidYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.xiequ.cn/index.html?dc1bbee2YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.uc.cn/ipYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://udb.yy.com/authentication.do?action=authenticate&appid=5060&busiUrl=http%3A%2F%2Fwww.yy.com&YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.yy.com/gu/YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.uc.cn/ipIP:http://YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://nfnba.lanzoub.com/ietaw0udyhidYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://yyfkw.cn999https://nfnba.lanzoub.com/ietaw0udyhidYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.26.95.191:5658/http://120.26.95.191:5659/qq17336171577b2cc005c28c42472000e7863283a212&_=hYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • NaN%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lxcode.bs2cdn.yy.com/a413808b-e679-47f1-9380-be7b3ebf8813.xml?from=yywebYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://passport.baidu.com/viewlog?ak=YY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://channel.yy.com/ajax/member/indexActionYY#U6302#U53f7#U534f#U8bae.exe, 00000000.00000002.1699727907.00000000005A0000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1457838
Start date and time:2024-06-15 20:02:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 35s
Hypervisor based Inspection enabled:false
Report type:light
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:YY#U6302#U53f7#U534f#U8bae.exe
renamed because original name is a hash value
Original Sample Name:YY.exe
Detection:MAL
Classification:mal60.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):741376
Entropy (8bit):6.917105002705599
Encrypted:false
SSDEEP:12288:wKBQAJdbyF+XZrjvhIeWgtN5XcTXrTmY5GTTTTTTTTTy8L1d8GsgFMwq:wKBZbpXZrjhI8N5sT7TzGTTTTTTTTTy9
MD5:A96FBD5E66B31F3D816AD80F623E9BD9
SHA1:4EDA42260BD3EB930CD4EAFD7D15C6AF367BCF18
SHA-256:2E67BA278646FDE95BB614DCBCC7DA1C6BF7976C918B2C6AD3D78640000326F3
SHA-512:43921107313775EA14B1BD33CF758C13798F4FA1C1074771C1C96B1B43B98F3416D249ED8AB3171383772D0054829C3754A91B5E94135F1DF6D67A76F599C80E
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 5%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C...............L.|.....L.z....L.{.....H......H.z./...H.{.....H.|.....L.~.......~.......w.H....................}.....Rich....................PE..L......d...........!...".....r............................................................@.........................@...T............0.......................@..`k......p...............................@...............P............................text............................... ..`.rdata..............................@..@.data...4...........................@....detourc.".......$..................@..@.detourd..... ......................@....rsrc........0......................@..@.reloc..`k...@...l..................@..B........................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.921437760987104
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:YY#U6302#U53f7#U534f#U8bae.exe
File size:4'972'544 bytes
MD5:765cf453d0cea3719b619e4c55881093
SHA1:060ae0476bbd908d08537c8b6bb24d2ec83d524c
SHA256:3d76cc27be3265077a5c15f2c76848b73148df035b7d3a3d2b9ad77232587cfd
SHA512:2132af60567aaf5c89001c36edd0764ef5e336dd2260d20287953ce2dac4b80c7817d0c0fe410a0d092900181c3d360999f7f2c06b5eba51a2e54821175cec18
SSDEEP:98304:ygvElT54uia2kf5SCyJsAh6wbwPy7kl/CNBIs0lApvWJ:yFT54rHi4H+Ah/bOUkVQY2oJ
TLSH:893633D84EF59834C2A6033CE43172374EBFF657D628936E265CE6AEAC4D1819341A37
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#.vOB.%OB.%OB.% ].%FB.% ].%IB.%.^.%bB.%4^.%JB.%.].%cB.%.J.%MB.%OB.%.@.%-].%RB.%yd.%.B.%yd.%7B.%.].%.B.%.].%RB.%OB.%.B.%.D.%NB.
Icon Hash:099c9113582f8b55
Entrypoint:0xb93dda
Entrypoint Section:.vmp1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x66653771 [Sun Jun 9 05:02:41 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:fe512f2e549df2214891378c91f66a42
Instruction
push 0E4B68F2h
call 00007F34FD55337Dh
add byte ptr [eax], al
push esp
insb
jnc 00007F34FD09BFE8h
jc 00007F34FD09C007h
add byte ptr [eax], al
add byte ptr [edi+65h], al
je 00007F34FD09BFF5h
jns 00007F34FD09C015h
je 00007F34FD09C007h
insd
push esp
imul ebp, dword ptr [ebp+65h], 24648D00h
sbb al, E8h
popfd
add dword ptr [eax], eax
add byte ptr [ebx-18h], dl
lock add dword ptr [eax], eax
add byte ptr [eax], al
add byte ptr [ebx+65h], dl
je 00007F34FD09BFF9h
imul ebp, dword ptr [esi+64h], 7845776Fh
je 00007F34FD09BFE7h
js 00007F34FD09BFA2h
add byte ptr [eax], al
inc edi
je 00007F34FD09BFF9h
outsd
insb
jne 00007F34FD09C00Fh
dec ecx
outsb
outsw
jc 00007F34FD09C00Fh
popad
je 00007F34FD09C00Bh
outsd
outsb
inc ecx
add byte ptr [eax], al
add byte ptr [ebx+72h], al
popad
je 00007F34FD09C007h
push esp
push 64616572h
add al, ch
pop esi
or al, byte ptr [eax]
add byte ptr [eax], al
add byte ptr [ebx+72h], al
popad
je 00007F34FD09C007h
inc esp
imul esi, dword ptr [edx+65h], 726F7463h
jns 00007F34FD09BFE3h
add byte ptr [eax], al
add byte ptr [edi+69h], dl
inc ebx
push 6F547261h
dec ebp
jne 00007F34FD09C00Eh
je 00007F34FD09C00Bh
inc edx
jns 00007F34FD09C016h
add byte ptr [eax], al
add byte ptr [edi+61h], dl
imul esi, dword ptr [esi+eax*2+6Fh], 6C754D72h
je 00007F34FD09C00Bh
jo 00007F34FD09C00Eh
dec edi
bound ebp, dword ptr [edx+65h]
arpl word ptr [ebx+esi*2+00h], si
add byte ptr [eax], al
inc ecx
jo 00007F34FD09C012h
outsb
dec ebp
outsb
jne 00007F34FD09BFE3h
add byte ptr [eax], al
add byte ptr [ebx+72h], al
popad
je 00007F34FD09C007h
Programming Language:
  • [ C ] VS98 (6.0) SP6 build 8804
  • [C++] VS98 (6.0) SP6 build 8804
  • [C++] VS98 (6.0) build 8168
  • [ C ] VS98 (6.0) build 8168
  • [EXP] VC++ 6.0 SP5 build 8804
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x79627c0x168.vmp1
IMAGE_DIRECTORY_ENTRY_RESOURCE0x7880000x6190.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xc4c0000x4c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xb9735b0x850.vmp1
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x19e7420x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x1a00000x577b120x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x7180000x6f3ca0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x7880000x61900x3000a1864bf4c4f443ebfc78e5e2fff8348bFalse0.394287109375data4.088331277576032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.vmp00x78f0000x30240x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.vmp10x7930000x4b82330x4b90005d3194b71c1a11ae1687b1d9c64ef151unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0xc4c0000x4c0x100031b33e1e166e82486ce7540bf78125ecFalse0.0224609375data0.11968309355305998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
TEXTINCLUDE0x78a5b80xbdataChineseChina1.0
TEXTINCLUDE0x78a5c40x16dataChineseChina0.5
TEXTINCLUDE0x78a5dc0x151dataChineseChina0.03857566765578635
RT_CURSOR0x78a7300x134dataChineseChina0.04220779220779221
RT_CURSOR0x78a8640x134dataChineseChina0.04220779220779221
RT_CURSOR0x78a9980x134dataChineseChina0.04220779220779221
RT_CURSOR0x78aacc0xb4dataChineseChina0.06666666666666667
RT_BITMAP0x78ab800x16cdataChineseChina0.03571428571428571
RT_BITMAP0x78acec0x248dataChineseChina0.025684931506849314
RT_BITMAP0x78af340x144dataChineseChina0.058823529411764705
RT_BITMAP0x78b0780x158emptyChineseChina0
RT_BITMAP0x78b1d00x158emptyChineseChina0
RT_BITMAP0x78b3280x158emptyChineseChina0
RT_BITMAP0x78b4800x158emptyChineseChina0
RT_BITMAP0x78b5d80x158emptyChineseChina0
RT_BITMAP0x78b7300x158emptyChineseChina0
RT_BITMAP0x78b8880x158emptyChineseChina0
RT_BITMAP0x78b9e00x158emptyChineseChina0
RT_BITMAP0x78bb380x5e4emptyChineseChina0
RT_BITMAP0x78c11c0xb8emptyChineseChina0
RT_BITMAP0x78c1d40x16cemptyChineseChina0
RT_BITMAP0x78c3400x144emptyChineseChina0
RT_ICON0x788bf40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
RT_ICON0x788edc0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
RT_ICON0x7890040x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0, resolution 2834 x 2834 px/m0.6824577861163227
RT_MENU0x78c4840xcemptyChineseChina0
RT_MENU0x78c4900x284emptyChineseChina0
RT_DIALOG0x78c7140x98emptyChineseChina0
RT_DIALOG0x78c7ac0x17aemptyChineseChina0
RT_DIALOG0x78c9280xfaemptyChineseChina0
RT_DIALOG0x78ca240xeaemptyChineseChina0
RT_DIALOG0x78cb100x8aeemptyChineseChina0
RT_DIALOG0x78d3c00xb2emptyChineseChina0
RT_DIALOG0x78d4740xccemptyChineseChina0
RT_DIALOG0x78d5400xb2emptyChineseChina0
RT_DIALOG0x78d5f40xe2emptyChineseChina0
RT_DIALOG0x78d6d80x18cemptyChineseChina0
RT_STRING0x78d8640x50emptyChineseChina0
RT_STRING0x78d8b40x2cemptyChineseChina0
RT_STRING0x78d8e00x78emptyChineseChina0
RT_STRING0x78d9580x1c4emptyChineseChina0
RT_STRING0x78db1c0x12aemptyChineseChina0
RT_STRING0x78dc480x146emptyChineseChina0
RT_STRING0x78dd900x40emptyChineseChina0
RT_STRING0x78ddd00x64emptyChineseChina0
RT_STRING0x78de340x1d8emptyChineseChina0
RT_STRING0x78e00c0x114emptyChineseChina0
RT_STRING0x78e1200x24emptyChineseChina0
RT_GROUP_CURSOR0x78e1440x14emptyChineseChina0
RT_GROUP_CURSOR0x78e1580x14emptyChineseChina0
RT_GROUP_CURSOR0x78e16c0x22emptyChineseChina0
RT_GROUP_ICON0x78a0ac0x14data1.2
RT_GROUP_ICON0x78a0c00x14dataChineseChina1.2
RT_GROUP_ICON0x78a0d40x14dataChineseChina1.25
RT_VERSION0x78a0e80x214dataChineseChina0.5375939849624061
RT_MANIFEST0x78a2fc0x2b9XML 1.0 document, ASCII text, with very long lines (697), with no line terminators0.5279770444763271
DLLImport
RASAPI32.dllRasHangUpA, RasGetConnectStatusA
WINMM.dllmidiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, midiStreamOut, midiOutPrepareHeader, waveOutRestart, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutClose, waveOutGetNumDevs
WS2_32.dllWSAAsyncSelect, closesocket, send, select, WSACleanup, WSAStartup, gethostbyname, inet_ntoa, inet_addr, gethostname, htons, socket, sendto, recvfrom, ioctlsocket, connect, listen, getpeername, accept, __WSAFDIsSet, ntohs, htonl, bind, ntohl, WSAGetLastError, getsockname, recv
KERNEL32.dllUnmapViewOfFile, CreateFileMappingA, MapViewOfFile, OpenFileMappingA, GetCurrentProcessId, GetSystemDirectoryA, GetWindowsDirectoryA, GetCurrentProcess, TerminateThread, GetModuleHandleW, VirtualQuery, LoadLibraryW, GetVersionExW, DeleteFileW, TerminateProcess, GetFileSize, SetFilePointer, CreateFileW, GetTempPathW, FileTimeToSystemTime, GetTimeZoneInformation, SetLastError, GetVersion, LocalFree, FormatMessageA, CreateMutexA, ReleaseMutex, SuspendThread, GetACP, CreateSemaphoreA, ResumeThread, InterlockedExchange, ReleaseSemaphore, IsBadCodePtr, IsBadReadPtr, CompareStringW, CompareStringA, GetStringTypeW, GetStringTypeA, SetUnhandledExceptionFilter, IsBadWritePtr, VirtualAlloc, LCMapStringW, LCMapStringA, SetEnvironmentVariableA, VirtualFree, HeapCreate, HeapDestroy, GetEnvironmentVariableA, GetStdHandle, SetHandleCount, GetEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsW, FreeEnvironmentStringsA, UnhandledExceptionFilter, GetFileType, SetStdHandle, HeapSize, ExitThread, GetLocalTime, GetSystemTime, RaiseException, RtlUnwind, GetStartupInfoA, GetOEMCP, GetCPInfo, GetProcessVersion, SetErrorMode, GlobalFlags, GetCurrentThread, GetFileTime, TlsGetValue, LocalReAlloc, TlsSetValue, TlsFree, GlobalHandle, TlsAlloc, LocalAlloc, lstrcmpA, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, lstrcmpiA, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, DuplicateHandle, lstrcpynA, FileTimeToLocalFileTime, InterlockedDecrement, InterlockedIncrement, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CloseHandle, WaitForSingleObject, CreateProcessA, GetTickCount, GetCommandLineA, MulDiv, GetProcAddress, GetModuleHandleA, GetVolumeInformationA, SetCurrentDirectoryA, GetCurrentDirectoryA, CreateDirectoryA, CopyFileA, DeleteFileA, GetFileAttributesA, SetFileAttributesA, FindClose, FindFirstFileA, GetTempPathA, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, RemoveDirectoryA, GetModuleFileNameA, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, MultiByteToWideChar, WideCharToMultiByte, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, GlobalLock, GlobalUnlock
USER32.dllGetClassNameA, GetDesktopWindow, GetDlgItem, SetWindowTextA, MessageBoxW, GetSysColorBrush, wsprintfA, WaitForInputIdle, FindWindowExA, GetWindowTextA, ReleaseDC, LoadStringA, GetMenuCheckMarkDimensions, GetMenuState, SetMenuItemBitmaps, CheckMenuItem, MoveWindow, GetForegroundWindow, DefWindowProcW, GetPropA, RegisterClassA, CreateWindowExA, SetPropA, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, CreateIconFromResource, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, IsDialogMessageA, ScrollWindowEx, SendDlgItemMessageA, MapWindowPoints, AdjustWindowRectEx, GetScrollPos, GetMenuItemCount, GetMenuItemID, SetWindowsHookExA, CallNextHookEx, GetClassLongA, UnhookWindowsHookEx, CallWindowProcA, RemovePropA, GetMessageTime, GetLastActivePopup, RegisterWindowMessageA, GetWindowPlacement, GetNextDlgTabItem, EndDialog, CreateDialogIndirectParamA, DestroyWindow, GrayStringA, DrawTextA, TabbedTextOutA, EndPaint, BeginPaint, GetWindowDC, CharUpperA, GetWindowTextLengthA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, IntersectRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, UnregisterClassA, IsChild, TrackPopupMenu, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard
GDI32.dllExtSelectClipRgn, LineTo, MoveToEx, ExcludeClipRect, GetClipBox, ScaleWindowExtEx, SetWindowExtEx, SetWindowOrgEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SetMapMode, SetTextColor, SetROP2, SetPolyFillMode, SetBkMode, SelectClipRgn, DeleteObject, CreateDIBitmap, GetSystemPaletteEntries, SelectPalette, RealizePalette, GetDIBits, GetWindowExtEx, GetViewportOrgEx, GetWindowOrgEx, BeginPath, EndPath, PathToRegion, CreateEllipticRgn, CreateRoundRectRgn, GetTextColor, GetBkMode, GetBkColor, GetROP2, GetStretchBltMode, GetPolyFillMode, CreateCompatibleBitmap, CreateDCA, CreateBitmap, SelectObject, CreatePen, PatBlt, CombineRgn, CreateRectRgn, FillRgn, CreateSolidBrush, CreateFontIndirectA, GetStockObject, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, CreateCompatibleDC, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, GetTextExtentPoint32A, GetDeviceCaps, GetViewportExtEx, PtVisible, RectVisible, TextOutA, ExtTextOutA, Escape, GetTextMetricsA, CreatePolygonRgn, GetClipRgn, SetStretchBltMode, CreateRectRgnIndirect, SetBkColor, CreatePalette, StretchBlt, SaveDC, RestoreDC
WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter
ADVAPI32.dllRegSetValueExA, RegOpenKeyExA, RegCloseKey, RegQueryValueA, CryptReleaseContext, CryptDestroyHash, CryptGetHashParam, CryptHashData, CryptCreateHash, CryptAcquireContextA, RegCreateKeyExA
SHELL32.dllDragQueryFileA, SHGetSpecialFolderPathA, Shell_NotifyIconA, ShellExecuteA
ole32.dllOleRun, CoCreateInstance, CLSIDFromString, OleUninitialize, OleInitialize, RegisterDragDrop, RevokeDragDrop, ReleaseStgMedium, CLSIDFromProgID
OLEAUT32.dllSafeArrayAccessData, SafeArrayGetElement, VariantCopyInd, VariantInit, SysAllocString, SafeArrayDestroy, SafeArrayCreate, SafeArrayPutElement, RegisterTypeLib, LHashValOfNameSys, LoadTypeLib, SafeArrayUnaccessData, UnRegisterTypeLib, SafeArrayGetDim, SafeArrayGetLBound, SafeArrayGetUBound, VariantChangeType, VariantClear, VariantCopy
COMCTL32.dllImageList_Destroy
WLDAP32.dll
WININET.dllInternetCanonicalizeUrlA, InternetCrackUrlA, HttpOpenRequestA, HttpSendRequestA, HttpQueryInfoA, InternetReadFile, InternetConnectA, InternetSetOptionA, InternetCloseHandle, InternetOpenA
comdlg32.dllChooseColorA, ChooseFontA, GetFileTitleA, GetSaveFileNameA, GetOpenFileNameA
KERNEL32.dllVirtualProtect, GetModuleFileNameA, ExitProcess
USER32.dllMessageBoxA
Language of compilation systemCountry where language is spokenMap
ChineseChina
No network behavior found
No statistics
Target ID:0
Start time:14:02:56
Start date:15/06/2024
Path:C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\YY#U6302#U53f7#U534f#U8bae.exe"
Imagebase:0x400000
File size:4'972'544 bytes
MD5 hash:765CF453D0CEA3719B619E4C55881093
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

No disassembly