yomz.exe

Yuanyuan Mei

The application yomz.exe by Yuanyuan Mei has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-240-186-246.mad50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Yuanyuan Mei  (signed and verified)

MD5:
a8115be6ff1700559de85642e8f21c1b

SHA-1:
bf61f8139ffc10d72f410f861ac3c7553883eb70

SHA-256:
aa29714948336152abbc7e79594c3d85e8d094d843e43fc5d855492be501529e

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/14/2024 9:20:02 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Elex (M)
17.2.13.23

File size:
433.2 KB (443,616 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\yomz.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/24/2017 6:00:00 AM

Valid to:
4/21/2017 5:59:59 AM

Subject:
CN=Yuanyuan Mei, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
128A1FE0064E80F84A2197C8F0D07D76

File PE Metadata
Compilation timestamp:
2/13/2017 9:36:01 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x2E69

Entry point:
E8, 3E, 07, 00, 00, E9, 55, 9B, 00, 00, 6A, 14, 68, 48, 84, 46, 00, E8, 81, 9D, 00, 00, 33, F6, 89, 75, E4, 8B, 7D, 08, 83, FF, FE, 75, 10, E8, F4, 4F, 00, 00, C7, 00, 09, 00, 00, 00, E9, B7, 00, 00, 00, 85, FF, 0F, 88, 9F, 00, 00, 00, 3B, 3D, 4C, F2, 46, 00, 0F, 83, 93, 00, 00, 00, 8B, C7, C1, F8, 05, 89, 45, E0, 8B, DF, 83, E3, 1F, C1, E3, 06, 8B, 04, 85, E8, BE, 46, 00, 0F, BE, 44, 03, 04, 83, E0, 01, 74, 72, 57, E8, 2F, 28, 00, 00, 59, 89, 75, FC, 8B, 45, E0, 8B, 04, 85, E8, BE, 46, 00, F6, 44, 03, 04...
 
[+]

Entropy:
7.8207  (probably packed)

Code size:
391.5 KB (400,896 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-240-186-37.mad50.r.cloudfront.net  (54.240.186.37:80)

TCP (HTTP):
Connects to server-54-240-186-24.mad50.r.cloudfront.net  (54.240.186.24:80)

TCP (HTTP):
Connects to server-54-240-186-246.mad50.r.cloudfront.net  (54.240.186.246:80)

TCP (HTTP):
Connects to server-54-230-5-221.dfw3.r.cloudfront.net  (54.230.5.221:80)

TCP (HTTP):
Connects to server-54-230-5-41.dfw3.r.cloudfront.net  (54.230.5.41:80)

TCP (HTTP):
Connects to server-52-85-83-57.lax1.r.cloudfront.net  (52.85.83.57:80)

TCP (HTTP):
Connects to server-52-85-83-141.lax1.r.cloudfront.net  (52.85.83.141:80)

TCP (HTTP):
Connects to server-52-85-83-127.lax1.r.cloudfront.net  (52.85.83.127:80)

TCP (HTTP):
Connects to server-54-230-5-236.dfw3.r.cloudfront.net  (54.230.5.236:80)

TCP (HTTP):
Connects to server-54-230-5-158.dfw3.r.cloudfront.net  (54.230.5.158:80)

TCP (HTTP):
Connects to server-52-85-83-179.lax1.r.cloudfront.net  (52.85.83.179:80)

Remove yomz.exe - Powered by Reason Core Security