Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
jukebox.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
jukebox.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240226-en
Target
caf901834cb348f18d696727ead9863d
Size
3.7MB
MD5
caf901834cb348f18d696727ead9863d
SHA1
71d7b442f1adbd96983ce8866a90c63f2094f2d2
SHA256
732c0410ab89f33d0fbe718d6b5843c5df519057a9e3fd887ddf0354537de326
SHA512
01b90a2061de30eada4f55498b0067840f0b891986f7faa0d9963bfc530b2bf2f859242838b1391799c745984d5aa9099c5e33b306d8da7ea55172bfafcb7511
SSDEEP
98304:pg/iiHoiFMojQbpdGxsJf4o+J9cOMwizoMW9QOkZs0lslEhL:m/VHPQbpdT4zYzqeOkFAk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
GetTempFileNameA
GetShortPathNameA
FindNextFileA
CreateDirectoryA
CreateFileA
DeleteFileA
MoveFileA
WritePrivateProfileStringA
FreeEnvironmentStringsA
GetEnvironmentStrings
HeapCreate
HeapDestroy
GetProcessHeap
HeapSize
GetExitCodeProcess
GetLastError
SetLastError
GetVersionExA
GetTickCount
GetCurrentProcess
ExpandEnvironmentStringsA
WaitForSingleObject
LocalFree
FormatMessageA
GetWindowsDirectoryA
GetTempPathA
LocalAlloc
MultiByteToWideChar
GetSystemDirectoryA
InterlockedDecrement
GetCurrentThread
GetCurrentThreadId
InterlockedIncrement
GetDiskFreeSpaceA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
RtlUnwind
HeapReAlloc
HeapAlloc
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
TerminateProcess
IsDebuggerPresent
VirtualFree
VirtualAlloc
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
RemoveDirectoryA
GetCurrentDirectoryA
WriteFile
ReadFile
FindFirstFileA
FileTimeToLocalFileTime
SetFileAttributesA
GetFileAttributesA
GetDriveTypeA
SetCurrentDirectoryA
FindClose
UnlockFile
UnmapViewOfFile
SetFilePointer
FlushFileBuffers
SetFileTime
SetEndOfFile
LocalFileTimeToFileTime
GetModuleFileNameA
SystemTimeToFileTime
FileTimeToSystemTime
GetTimeZoneInformation
GetLocalTime
GetCommandLineA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
GetLocaleInfoA
CreateProcessA
CloseHandle
Sleep
ExitProcess
GetSystemMetrics
LoadCursorA
SetCursor
GetSysColor
GetWindowTextA
GetWindowTextLengthA
DestroyWindow
EnableWindow
InvalidateRect
GetWindowRect
MoveWindow
ExitWindowsEx
RegisterClassA
SystemParametersInfoA
SetForegroundWindow
SetActiveWindow
DefWindowProcA
GetClientRect
FillRect
BeginPaint
EndPaint
DialogBoxParamA
EndDialog
SendDlgItemMessageA
CreateDialogParamA
GetWindowPlacement
CreateWindowExA
SetWindowTextA
GetDlgItem
SetDlgItemTextA
UpdateWindow
SendMessageA
PostMessageA
MessageBoxA
ShowWindow
PeekMessageA
TranslateMessage
DispatchMessageA
SelectObject
CreateSolidBrush
TextOutA
SetTextJustification
GetDeviceCaps
GetTextExtentPoint32A
CreateFontA
SetBkMode
SetTextColor
StretchDIBits
DeleteObject
RemoveFontResourceA
AddFontResourceA
RegDeleteKeyA
OpenThreadToken
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
RegDeleteValueA
RegCreateKeyExA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteA
SHBrowseForFolderA
OleInitialize
CoCreateInstance
OleUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ