| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2026-Mar-07 22:42:34 |
| Detected languages |
English - United States
|
| TLS Callbacks | 2 callback(s) detected. |
| CompanyName | YUB-X |
| FileDescription | YUB-X |
| FileVersion | 1.3.0 |
| ProductName | YUB-X |
| ProductVersion | 1.3.0 |
| Suspicious | The PE is possibly packed. |
Unusual section name found: .\zW
Unusual section name found: .Q!m Unusual section name found: .+Iy |
| Suspicious | The PE contains functions most legitimate programs don't use. |
Leverages the raw socket API to access the Internet:
|
| Malicious | VirusTotal score: 36/71 (Scanned on 2026-03-11 19:01:50) |
AVG:
Win64:MalwareX-gen [Misc]
Arcabit: QD:Trojan.GenericQ.467B04B736 Avast: Win64:MalwareX-gen [Misc] BitDefender: QD:Trojan.GenericKDQ.467B04B736 Bkav: W64.AIDetectMalware CTX: exe.trojan.vmprotect CrowdStrike: win/malicious_confidence_90% (D) Cylance: Unsafe Cynet: Malicious (score: 99) DeepInstinct: MALICIOUS ESET-NOD32: Win64/Packed.VMProtect.AC suspicious application Elastic: malicious (high confidence) Emsisoft: QD:Trojan.GenericKDQ.467B04B736 (B) Fortinet: Riskware/Application GData: QD:Trojan.GenericKDQ.467B04B736 Google: Detected Gridinsoft: Trojan.Heur!.02212023 Lionic: Trojan.Win32.GenericKDQ.4!c Malwarebytes: Malware.AI.1172563012 MaxSecure: Trojan.Malware.324995110.susgen McAfeeD: ti!6AE646FA1BB9 MicroWorld-eScan: QD:Trojan.GenericKDQ.467B04B736 Microsoft: Trojan:Win64/VMProtect!MTB Paloalto: generic.ml Rising: Trojan.VMProtect!8.F782 (LESS:bWQ1Ooqe7go0RMnZk/zlDwGdJek) Sangfor: Trojan.Win64.VMProtect.V78f SentinelOne: Static AI - Suspicious PE Skyhigh: Artemis Sophos: Mal/Generic-S Symantec: ML.Attribute.HighConfidence Trapmine: malicious.high.ml.score TrellixENS: Artemis!7D44B04D3FCF TrendMicro-HouseCall: TROJ_GEN.R002H01CB26 VIPRE: QD:Trojan.GenericKDQ.467B04B736 Varist: W64/ABApplication.FUZH-1971 alibabacloud: VirTool:Win/Wacatac.B9nj |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 9 |
| TimeDateStamp | 2026-Mar-07 22:42:34 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0xbdc600 |
| SizeOfInitializedData | 0x7d9a00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000000001BE7FDC (Section: .+Iy) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x2e23000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| bcryptprimitives.dll |
ProcessPrng
|
|---|---|
| ntdll.dll |
NtWriteFile
|
| advapi32.dll |
GetTokenInformation
|
| kernel32.dll |
OutputDebugStringW
|
| user32.dll |
GetParent
|
| ole32.dll |
CoUninitialize
|
| comctl32.dll |
SetWindowSubclass
|
| shlwapi.dll |
SHCreateMemStream
|
| api-ms-win-core-synch-l1-2-0.dll |
WakeByAddressSingle
|
| gdi32.dll |
DeleteObject
|
| dwmapi.dll |
DwmGetWindowAttribute
|
| shell32.dll |
CommandLineToArgvW
|
| oleaut32.dll |
SysStringLen
|
| secur32.dll |
AcceptSecurityContext
|
| ws2_32.dll |
freeaddrinfo
|
| crypt32.dll |
CertEnumCertificatesInStore
|
| shell32.dll (#2) |
CommandLineToArgvW
|
| advapi32.dll (#2) |
GetTokenInformation
|
| kernel32.dll (#2) |
OutputDebugStringW
|
| pdh.dll |
PdhEnumObjectsA
|
| powrprof.dll |
CallNtPowerInformation
|
| psapi.dll |
GetModuleFileNameExW
|
| bcrypt.dll |
BCryptGenRandom
|
| api-ms-win-crt-math-l1-1-0.dll |
roundf
|
| api-ms-win-crt-heap-l1-1-0.dll |
malloc
|
| api-ms-win-crt-string-l1-1-0.dll |
wcslen
|
| api-ms-win-crt-convert-l1-1-0.dll |
wcstol
|
| api-ms-win-crt-runtime-l1-1-0.dll |
__p___argv
|
| api-ms-win-crt-stdio-l1-1-0.dll |
__p__commode
|
| api-ms-win-crt-locale-l1-1-0.dll |
_configthreadlocale
|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.2.0.0 |
| ProductVersion | 1.2.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| CompanyName | YUB-X |
| FileDescription | YUB-X |
| FileVersion (#2) | 1.3.0 |
| ProductName | YUB-X |
| ProductVersion (#2) | 1.3.0 |
| Resource LangID | English - United States |
|---|
| StartAddressOfRawData | 0x141ad51e8 |
|---|---|
| EndAddressOfRawData | 0x141ad541c |
| AddressOfIndex | 0x1412e74e0 |
| AddressOfCallbacks | 0x142299048 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_8BYTES
|
| Callbacks |
0x00000001428D4351
0x0000000140B671F0 |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x1412e4f00 |
No comments yet.