Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
jre-8u333-windows-x64.exe
Resource
win10v2004-20240802-en
Target
jre-8u333-windows-x64.exe
Size
83.0MB
MD5
864191a17eb2e13e0ecbf16d092cb173
SHA1
9f24a63e5c68d41a2674959eac3417dd7e18225c
SHA256
b0244a6dd643f7d2b6f891b7bc2baeca6142897cddee877a83f1e7f89efcb3fa
SHA512
4df92e2666ab8ac63168bb43f4d3549ced5924f429abdde4be0106afc8b12a91fb2f7eba1d29eac0e412055177ab044f45a1acb15b21698efc62dcf55d7ece34
SSDEEP
1572864:xlG4UsFQBsNF/P0bhv8vK+3S6dO1MBfErNQS1U+Qd7Odri:xI4UsaQF/MbhES+3BUMBfEpv1n8q8
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorA
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
HeapSize
WriteConsoleW
LoadLibraryW
WaitForSingleObject
GetModuleHandleA
GetModuleHandleExA
GetLastError
SetDllDirectoryA
GetProcAddress
CreateProcessA
CreateDirectoryA
GetExitCodeProcess
CloseHandle
SizeofResource
FindResourceA
LockResource
LoadResource
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileA
SetLastError
GetDriveTypeA
FindNextFileA
InitializeCriticalSectionAndSpinCount
FindClose
CopyFileA
GetFileAttributesA
MoveFileExA
CreateFileA
DeleteFileA
RaiseException
SetFileAttributesA
DecodePointer
RemoveDirectoryA
DeleteCriticalSection
GetTickCount
GetModuleFileNameA
GetCommandLineW
GetCurrentProcess
GetModuleHandleExW
GetTempPathA
GetSystemDirectoryA
GetNativeSystemInfo
LocalFree
GetCurrentThreadId
Sleep
FormatMessageW
GetLocalTime
GetCurrentProcessId
RtlUnwind
FreeLibrary
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
OutputDebugStringW
HeapReAlloc
SetEndOfFile
SetStdHandle
ReadConsoleW
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FlushFileBuffers
SetFilePointerEx
RtlUnwindEx
RtlPcToFileHeader
LoadLibraryExW
GetCommandLineA
CreateFileW
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
GetStdHandle
GetModuleFileNameW
ExitProcess
HeapFree
HeapAlloc
GetFileSizeEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ