Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
jre-7-windows-x64.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
jre-7-windows-x64.exe
Resource
win10v2004-20240226-en
Target
jre-7-windows-x64.exe
Size
20.3MB
MD5
fad81d5c5ab9657cf469a84660602387
SHA1
f0957d48fc9fb27f86f784b33549e90905640595
SHA256
48bcc7986670ec7c4b66d813759b1cc463e5d3aa063a6ec730692f4a97da59ee
SHA512
8553456df231d9ebc85fc2eb787bf71a5a8a77cc0f6e29efc8d8b009e85550a29f4f565cf86e82fc5231aa4bcff35b1020336665d807d6120f86a126f20ce5df
SSDEEP
393216:JiVHmSlH/eOVLTawl/Npr8sTfh2nR23H9cus0YDn0z10yGti:JiVplfJeqxfhjX9cu6bZi
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
ord17
GetVersionExA
LoadLibraryA
GetSystemDirectoryA
SetDllDirectoryA
GetShortPathNameA
GetWindowsDirectoryA
GetEnvironmentVariableA
ReadFile
CreateEventA
GetNativeSystemInfo
SetFilePointer
GetTempPathA
GetTickCount
GetCurrentProcessId
GetUserDefaultUILanguage
ExitProcess
LocalFree
LocalAlloc
FormatMessageA
TerminateProcess
OpenProcess
GetFileAttributesA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
MoveFileExA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLocaleInfoA
ResetEvent
CreateThread
SetEnvironmentVariableA
CompareStringW
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
LCMapStringW
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
Sleep
LoadLibraryW
HeapSize
HeapReAlloc
FlsAlloc
FlsFree
FlsSetValue
FlsGetValue
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleFileNameW
GetStdHandle
HeapCreate
GetVersion
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
GetModuleHandleW
RtlUnwindEx
RtlLookupFunctionEntry
VirtualQuery
GetSystemInfo
SetThreadStackGuarantee
VirtualProtect
RtlPcToFileHeader
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
GetProcessHeap
HeapAlloc
HeapFree
InterlockedPushEntrySList
MultiByteToWideChar
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
GetProcAddress
GetModuleHandleA
WaitForSingleObject
FlushInstructionCache
GetThreadLocale
GetCommandLineA
lstrcpynA
CreateDirectoryA
GlobalHandle
GlobalFree
LoadLibraryExA
FreeLibrary
SetLastError
GlobalLock
GlobalUnlock
GetModuleFileNameA
MulDiv
IsDBCSLeadByte
GetCurrentThreadId
lstrlenW
WideCharToMultiByte
DeleteFileA
CreateProcessA
GetExitCodeProcess
lstrlenA
lstrcatA
CreateFileA
WriteFile
CloseHandle
lstrcmpA
lstrcpyA
lstrcmpiA
FindResourceA
GlobalAlloc
GetCurrentProcess
PtInRect
GetWindowRect
GetCursorPos
SetCursor
PeekMessageA
EndDialog
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
MsgWaitForMultipleObjectsEx
DestroyWindow
wsprintfA
LoadStringA
CharNextA
DefWindowProcA
SetWindowLongPtrA
ShowWindow
LoadBitmapA
GetDlgCtrlID
SetWindowContextHelpId
MapDialogRect
IsWindowVisible
GetSystemMenu
LoadImageA
EnableMenuItem
DispatchMessageA
GetSysColor
GetWindowLongA
SetWindowLongA
MoveWindow
SetWindowPos
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
IsChild
GetParent
GetDlgItem
GetClassNameA
ReleaseCapture
FillRect
CallWindowProcA
GetWindowLongPtrA
EndPaint
BeginPaint
DestroyAcceleratorTable
SetFocus
GetWindow
GetFocus
UnregisterClassA
GetDesktopWindow
SendMessageA
IsWindow
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
CreateAcceleratorTableA
SetForegroundWindow
IsDlgButtonChecked
CheckDlgButton
EnableWindow
EnumWindows
GetWindowThreadProcessId
PostMessageA
MessageBoxA
GetActiveWindow
CreateDialogIndirectParamA
DialogBoxIndirectParamA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateDIBSection
SetDIBColorTable
SetBkColor
SetBkMode
StretchBlt
SetTextColor
SaveDC
SetGraphicsMode
ModifyWorldTransform
SetViewportOrgEx
SetWindowOrgEx
DPtoLP
CreateFontIndirectA
RestoreDC
GetStockObject
GetObjectA
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
GetDeviceCaps
CryptGetHashParam
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyA
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
RegOpenKeyExA
CryptDestroyHash
RegEnumKeyA
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
ShellExecuteA
SHGetFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetFolderPathA
CoTaskMemAlloc
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
VarUI4FromStr
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
LoadTypeLi
URLDownloadToFileA
GetFileVersionInfoA
VerQueryValueA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetOpenA
InternetErrorDlg
InternetConnectA
GdipDeleteGraphics
GdipGetImagePixelFormat
GdipFree
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromFile
GdipBitmapLockBits
GdipBitmapUnlockBits
GdiplusStartup
GdiplusShutdown
GdipGetImageGraphicsContext
GdipDrawImageI
GdipCloneImage
GdipAlloc
GdipCreateBitmapFromScan0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ