Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
yylauncher.zip
Resource
win11-20240426-en
Target
yylauncher.zip
Size
2.4MB
MD5
bcff276a1a783eff903d8eca25e6b8b0
SHA1
8e62478b6cb339e5fe1f5d0b24f868c991156790
SHA256
34e54917136883af116e9f8a80f04c6b6a529ccc193434f0d7283e2883018859
SHA512
f755c6030e43b31c1352a10ce30085e820c6d527f47c7420990b6c785618b26888f8f961a7dd7092a23060ad0346b3237e4922d1a8bc1d43eab7c0a75b073d77
SSDEEP
49152:Qs6lsgU9/qGknRSIhFvZ31sRYMKANErkRXX3Hk/B2OkU:QjpU9/qG2RSM9ZFsRicErGX3Ep2OkU
Checks for missing Authenticode signature.
resource |
---|
unpack001/yyversion.dll |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\DUOWAN_BUILD\yypublish_build\console\source\yy\bin\release\yylauncher.pdb
ord22
ord21
ord23
ord20
SystemTimeToFileTime
GetCommandLineW
SetCurrentDirectoryW
FindClose
FindFirstFileW
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
FindNextFileW
GetFileAttributesW
lstrcmpW
MoveFileExW
GetCurrentProcessId
OpenProcess
lstrcpynW
FileTimeToLocalFileTime
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
FileTimeToDosDateTime
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
TerminateProcess
LoadLibraryA
lstrcpyW
MoveFileW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
WideCharToMultiByte
ResumeThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GlobalAlloc
GlobalFree
GetDiskFreeSpaceExW
GetShortPathNameW
RemoveDirectoryW
ReleaseMutex
CreateMutexW
OpenMutexW
Sleep
GetFullPathNameW
GetVersion
InitializeCriticalSectionAndSpinCount
GetSystemDirectoryW
GetWindowsDirectoryW
DebugBreak
VirtualAlloc
IsBadReadPtr
OutputDebugStringW
GetModuleHandleW
LoadLibraryExW
lstrcmpiW
SetLastError
GlobalUnlock
GlobalLock
CopyFileW
GetModuleFileNameW
GetCurrentDirectoryW
CreateDirectoryW
GetVersionExW
LocalFileTimeToFileTime
SetFileAttributesW
GetFileAttributesExW
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FlushFileBuffers
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
SetStdHandle
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetFileType
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
WaitForSingleObjectEx
ResetEvent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryExA
VirtualFree
IsProcessorFeaturePresent
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
GetCPInfo
LCMapStringEx
EncodePointer
GetStringTypeW
lstrlenW
SetFileTime
DecodePointer
CloseHandle
RaiseException
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
GetLocalTime
GetSystemTimeAsFileTime
GetSystemTime
OpenEventW
CreateEventW
WaitForSingleObject
CreateFileW
SetEvent
GetTempPathW
DeleteFileW
GetTickCount
MultiByteToWideChar
DosDateTimeToFileTime
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
TranslateMessage
DispatchMessageW
PostMessageW
ShowWindow
SetWindowPos
GetSystemMetrics
SetForegroundWindow
GetMessageW
CloseClipboard
SetClipboardViewer
ChangeClipboardChain
SetClipboardData
GetClipboardData
EmptyClipboard
IsClipboardFormatAvailable
GetActiveWindow
UnregisterClassW
GetWindowRect
GetWindowLongW
SetWindowLongW
SystemParametersInfoW
IsWindow
GetForegroundWindow
WindowFromPoint
GetDesktopWindow
FindWindowW
GetShellWindow
EnumWindows
OpenClipboard
InvalidateRect
GetClassNameW
GetWindowThreadProcessId
MessageBoxW
GetKeyState
IsZoomed
PeekMessageW
PostQuitMessage
DestroyWindow
CharNextW
DefWindowProcW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
SetTimer
KillTimer
LoadCursorW
ClientToScreen
ScreenToClient
SendMessageW
SetActiveWindow
RedrawWindow
SetWindowTextW
GetClientRect
MapWindowPoints
SetClassLongW
GetParent
GetWindow
LoadIconW
MonitorFromWindow
GetMonitorInfoW
SetCursor
GetCursor
DestroyCursor
LoadImageW
UpdateLayeredWindow
SetCapture
ReleaseCapture
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
SelectObject
DeleteObject
CreateRoundRectRgn
DeleteDC
CreateCompatibleDC
BitBlt
CreateDIBSection
SetEntriesInAclW
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegQueryValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
GetExplicitEntriesFromAclW
RegSetValueExW
EqualSid
CreateWellKnownSid
RegCloseKey
DragFinish
ord165
DragAcceptFiles
SHFileOperationW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHChangeNotify
ord680
ShellExecuteW
CoUninitialize
StringFromGUID2
CoInitialize
CoTaskMemFree
CreateStreamOnHGlobal
CoCreateGuid
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
VarUI4FromStr
SysAllocStringByteLen
VariantInit
PathFindFileNameW
PathStripToRootW
PathRemoveFileSpecW
PathFileExistsW
InternetReadFile
HttpQueryInfoW
HttpEndRequestW
InternetCrackUrlW
InternetOpenW
InternetCloseHandle
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
HttpSendRequestExW
GetAdaptersInfo
GdipSaveGraphics
GdipRestoreGraphics
GdipGetGenericFontFamilySansSerif
GdipDrawString
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetClipRegion
GdipSetMatrixElements
GdipDeleteMatrix
GdipCreateMatrix
GdipDrawImageRectRectI
GdipGraphicsClear
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdiplusShutdown
GdiplusStartup
GdipDeleteRegion
GdipCloneRegion
GdipCreateRegionHrgn
GdipSetClipRect
GdipCreateBitmapFromFile
GdipCreateBitmapFromStream
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipCloneImage
GdipFree
GdipAlloc
GdipGetStringFormatFlags
GdipSetStringFormatFlags
GdipCloneStringFormat
GdipDeleteStringFormat
GdipStringFormatGetGenericDefault
GdipMeasureString
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipSetInterpolationMode
GdipSetTextRenderingHint
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipDrawImageRectRect
GdipDrawImageRect
GdipFillRectangle
GdipDrawRectangle
GdipDrawLine
GdipSetWorldTransform
GdipGetCompositingMode
GdipSetCompositingMode
GdipDeletePen
GdipCreatePen1
GdipCreateSolidFill
GdipCreateBitmapFromStreamICM
GdipCloneBrush
GdipDeleteBrush
WSAStartup
inet_ntoa
gethostbyname
BZ2_bzBuffToBuffCompress
BZ2_bzBuffToBuffDecompress
BZ2_bzCompress
BZ2_bzCompressEnd
BZ2_bzCompressInit
BZ2_bzDecompress
BZ2_bzDecompressEnd
BZ2_bzDecompressInit
BZ2_bzRead
BZ2_bzReadClose
BZ2_bzReadGetUnused
BZ2_bzReadOpen
BZ2_bzWrite
BZ2_bzWriteClose
BZ2_bzWriteClose64
BZ2_bzWriteOpen
BZ2_bzclose
BZ2_bzdopen
BZ2_bzerror
BZ2_bzflush
BZ2_bzlibVersion
BZ2_bzopen
BZ2_bzread
BZ2_bzwrite
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateFileA
CreateIoCompletionPort
CreateThread
CreateWaitableTimerExW
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsW
FreeLibrary
GetConsoleMode
GetCurrentThreadId
GetEnvironmentStringsW
GetErrorMode
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessAffinityMask
GetQueuedCompletionStatusEx
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetThreadContext
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
PostQueuedCompletionStatus
RaiseFailFastException
ResumeThread
SetConsoleCtrlHandler
SetErrorMode
SetEvent
SetProcessPriorityBoost
SetThreadContext
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
SuspendThread
SwitchToThread
TlsAlloc
TlsGetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WerGetFlags
WerSetFlags
WriteConsoleW
WriteFile
__dllonexit
_beginthread
_errno
_iob
abort
calloc
fflush
fprintf
free
fwrite
malloc
memcpy
vfprintf
_cgo_dummy_export
getProductInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ