Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
jre-10.0.2_windows-x64_bin.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
jre-10.0.2_windows-x64_bin.exe
Resource
win10v2004-20240426-en
Target
jre-10.0.2_windows-x64_bin.exe
Size
100.6MB
MD5
604dbc1ab825d6d1814852a9a09aa8f7
SHA1
ca95256dbce87518fb74c282f75e1a6666f42492
SHA256
26c76cf5ce5f7b1968d31782afe50a56275eee121497a798a39e18910864b07b
SHA512
ddb4fb500dd4f626610cd234cfaad24cdac80b83eafe02dd2b0cd81aa9c7362bfeaf3ec6a810083085edca4d15e365cf84967776531901c470cdb62c6a84744e
SSDEEP
3145728:r7zVG8SIzSLIk/IsUCwP6BrU5em6x7VrEe2pwgMY/C:88SmSL3v26Beem6NmeR4/C
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
t:\workspace\build\windows-x64\install\obj\jre-10.0.2+13_windows-x64_bin.exe\jre-10.0.2+13_windows-x64_bin.exe.pdb
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
GetTempPathA
CreateFileA
MoveFileExA
GetTickCount
InitializeCriticalSectionAndSpinCount
GetFileAttributesA
RaiseException
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
FindClose
DecodePointer
FindNextFileA
DeleteCriticalSection
CloseHandle
DeleteFileA
Sleep
FormatMessageW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
LocalFree
FindResourceA
LoadResource
SizeofResource
LockResource
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
LoadLibraryW
QueryPerformanceCounter
EncodePointer
EnterCriticalSection
LeaveCriticalSection
ExitProcess
AreFileApisANSI
HeapFree
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
WriteFile
GetConsoleCP
GetConsoleMode
GetModuleHandleExW
GetStdHandle
GetFileType
GetModuleFileNameW
WriteConsoleW
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
HeapAlloc
GetCPInfo
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetProcessHeap
HeapSize
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadFile
SetFilePointerEx
FlushFileBuffers
CreateFileW
SetStdHandle
OutputDebugStringW
HeapReAlloc
ReadConsoleW
SetEndOfFile
GetCurrentProcess
GetNativeSystemInfo
GetProcAddress
GetLastError
CreateDirectoryA
CreateProcessA
SetDllDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetModuleHandleExA
GetStringTypeW
LoadLibraryExW
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCloseKey
EqualSid
CopySid
GetTokenInformation
ConvertStringSidToSidA
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ