Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
yadl.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
yadl.exe
Resource
win10v2004-20230915-en
Target
yadl.exe
Size
203KB
MD5
6922e66413b832878ac33061032d610f
SHA1
0ec966e045149267007cd840798e7b0e0a077786
SHA256
c014b10df32d537cb505efaa593bee22bcb2cd63b1bcd12a7ab44c958031846f
SHA512
2c1ccde7c9bd793f40c3a0c6fc94aa8b8de222ed6eca52ca7249fad79d994200bd48bb1874579984ea74eb2e52d0b7fa7636b6f93fe18a17e76842e84807280f
SSDEEP
3072:XWF1Sss2XaOvu+v7QC2mCAbtoJOBW0rArwrkut57cIrDjy6HyaPKbY64IrHxzMxz:XWF0+XaOvuyycWNrwrk6yabJIrRzM
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WTSQuerySessionInformationW
WTSFreeMemory
LsaGetLogonSessionData
LsaFreeReturnBuffer
LsaEnumerateLogonSessions
InterlockedDecrement
WaitForSingleObject
GetVersionExW
Sleep
GetLastError
CloseHandle
GetCurrentProcessId
CreateProcessW
GetExitCodeProcess
HeapFree
GetModuleFileNameW
GetCurrentProcess
FindClose
DuplicateHandle
MultiByteToWideChar
OutputDebugStringW
HeapAlloc
GetProcessHeap
WideCharToMultiByte
SetEnvironmentVariableW
GetCommandLineW
SetHandleInformation
SetStdHandle
GetStdHandle
WriteFile
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
DecodePointer
ReadConsoleW
ReadFile
SetEndOfFile
HeapReAlloc
HeapSize
GetModuleHandleExW
ExitProcess
LoadLibraryExW
GetACP
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
CreateFileW
WriteConsoleW
IsValidCodePage
FindNextFileW
FindFirstFileExW
TlsGetValue
LCMapStringW
CompareStringW
GetFileType
GetStringTypeW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
RaiseException
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
CharLowerW
wsprintfW
CopySid
ConvertSidToStringSidW
GetLengthSid
LsaNtStatusToWinError
OpenProcessToken
GetTokenInformation
ShellExecuteExW
SHCreateDirectoryExW
CoCreateInstance
CoUninitialize
CoInitialize
OleRun
VariantInit
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
URLOpenBlockingStreamW
WinVerifyTrust
WSAGetLastError
htons
htonl
recv
connect
socket
WSAStartup
getaddrinfo
shutdown
closesocket
WSACleanup
freeaddrinfo
send
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ