Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
jre-6u45-windows-x64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
jre-6u45-windows-x64.exe
Resource
win10v2004-20220901-en
Target
jre-6u45-windows-x64.exe
Size
16.6MB
MD5
dd8b0e566a0cae1a330a456dd73afc5f
SHA1
210c9527dcc0122ca90d22c2f5b96c03d5bb7b48
SHA256
16d5c9f0eb4e3fad207416ed1c98926be7a946f044ba8ad8e19de1242dff0c25
SHA512
d8b999de2f6fa94968f5a279636b109bf85bf8f630e027921b894f30a1b52f5036388459c62c15315e5f04be33a1c2b8cc455f8581796a82a3860c490ecddcde
SSDEEP
393216:iXZ55K8F7hmhSUlEO7IeNqDGxN6R7SplmHafG9WU5+:G55dFshSTecmMSpl7fGce+
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateProcessA
FreeLibrary
GetProcAddress
GetWindowsDirectoryA
GetEnvironmentVariableA
_local_unwind
MultiByteToWideChar
DeleteFileA
GetCurrentProcess
SetFilePointer
GetTempPathA
GetSystemInfo
LocalFree
GetTickCount
GetCurrentProcessId
GetUserDefaultLangID
FindClose
FindFirstFileA
ExitProcess
LocalAlloc
FormatMessageA
LockResource
LoadResource
GetSystemDirectoryA
FindResourceA
SetLastError
FindNextFileA
TerminateProcess
RemoveDirectoryA
CompareStringW
CompareStringA
VirtualQuery
VirtualAlloc
VirtualProtect
SetStdHandle
FlushFileBuffers
HeapReAlloc
LCMapStringW
LCMapStringA
InitializeCriticalSection
LoadLibraryA
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
WideCharToMultiByte
GetThreadLocale
GetCommandLineA
lstrcpynA
CreateDirectoryA
GetExitCodeProcess
GetLastError
WaitForSingleObject
lstrlenA
lstrcatA
CreateFileA
WriteFile
CloseHandle
__C_specific_handler
lstrcmpA
lstrcpyA
lstrcmpiA
SizeofResource
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
RtlPcToFileHeader
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
GetTimeZoneInformation
Sleep
GetCPInfo
GetOEMCP
GetACP
HeapCreate
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
GetStartupInfoA
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
RaiseException
DeleteCriticalSection
HeapSetInformation
SetEnvironmentVariableA
GetDesktopWindow
LoadStringA
TranslateMessage
DispatchMessageA
PeekMessageA
MsgWaitForMultipleObjects
wsprintfA
MessageBoxA
RegDeleteKeyA
RegQueryInfoKeyA
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SHGetFolderPathA
VerQueryValueA
GetFileVersionInfoA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetErrorDlg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ