Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
junction64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
junction64.exe
Resource
win10v2004-20240419-en
Target
junction64.exe
Size
230KB
MD5
1adf1cee31c526dad27eff5169e14197
SHA1
368789a07025035d14871e0788877b60a9d42522
SHA256
c35053153d6f5a57823af7d422482e50d3bfc360a3933f24bda556f5952f41c9
SHA512
abec47f73320a9b09504938a7efd52429e93d129e6f4ca847673ef062367ad3f430c200e571c9b162906004c6fb5acad40768ba6c922417e1e11f44223fabe3c
SSDEEP
3072:ORpPvWxxGF+3SnkjQdkM9eTOa023bpQHRg1oRYgU5UFllS0qqF9xXx91nFEUUyE8:ORVvWxx0+fxM8TOaVNyRWghlwujY4
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Builds\13810\Tools\junction_master\bin\x64\Release\junction64.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
FindClose
CloseHandle
FormatMessageW
GetCurrentDirectoryW
CreateDirectoryW
RemoveDirectoryW
GetFullPathNameW
CreateFileW
GetFileAttributesW
FindFirstFileW
FindNextFileW
DeviceIoControl
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
OutputDebugStringW
ReadConsoleW
WriteConsoleW
SetFilePointerEx
GetLastError
GetCommandLineW
GetModuleHandleW
LoadLibraryW
GetStdHandle
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcAddress
GetFileType
GetTimeFormatW
CompareStringW
LCMapStringW
GetVolumeInformationW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
SetStdHandle
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
HeapSize
HeapFree
GetConsoleMode
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleMode
IsDebuggerPresent
IsProcessorFeaturePresent
HeapReAlloc
DeleteCriticalSection
FatalAppExitA
FlushFileBuffers
WriteFile
GetConsoleCP
RtlUnwindEx
ReadFile
GetStartupInfoW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
CreateSemaphoreW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadCursorW
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextW
GetDlgItem
EndDialog
DialogBoxIndirectParamW
SendMessageW
StartPage
EndDoc
StartDocW
SetMapMode
GetDeviceCaps
EndPage
PrintDlgW
RegQueryValueExW
RegOpenKeyW
RegCreateKeyW
RegCloseKey
RegSetValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ