Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
file.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
file.dll
Resource
win10v2004-20240802-en
Target
file.exe
Size
343KB
MD5
69d883f1a13a13d5f198b45a5df0ba97
SHA1
940678df6cc3814046d7acac5bd0ab1b8664249d
SHA256
5749acfc3cb027699aa197427c06334c69fb7d36add21f32105cd4033f3a191b
SHA512
e06613bef2add30c0f5f0c4b5249461c19d813499ace04d94fa42bab237b22efb34a4c1e23565d72593c2bfbd6ad055cf5208968f8ea2b528b66ba6b0140e675
SSDEEP
6144:j2BK+kd25HU2gcv/Wa83jAqN1RiZNby0N:d+kKH9mT1N1RiL2C
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\deploy\tmp\jp2ssv\obj64\jp2ssv.pdb
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
CloseHandle
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
WaitForSingleObject
CreateMutexA
DisableThreadLibraryCalls
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
SizeofResource
lstrcmpiA
OpenMutexA
FindResourceA
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
LoadLibraryA
VerSetConditionMask
GetEnvironmentVariableA
CreateFileA
GetLongPathNameA
GetTempPathA
GetCurrentProcess
CreateProcessA
OpenProcess
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetNativeSystemInfo
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
GetShortPathNameA
FormatMessageA
lstrlenA
VerifyVersionInfoA
WTSGetActiveConsoleSessionId
GetFileAttributesA
GetSystemWindowsDirectoryA
OutputDebugStringA
GetCurrentProcessId
GetCurrentThreadId
IsDebuggerPresent
OutputDebugStringW
WriteConsoleW
SetEndOfFile
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WriteFile
SetFilePointerEx
GetFileSizeEx
GetStringTypeW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RtlUnwind
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTimeZoneInformation
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetStdHandle
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
SetEnvironmentVariableW
GetWindowThreadProcessId
GetShellWindow
CloseDesktop
OpenInputDesktop
CharNextA
wsprintfA
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitialize
StringFromCLSID
CoCreateInstance
CoTaskMemAlloc
SysAllocStringByteLen
SysStringLen
SysAllocString
VarUI4FromStr
SysFreeString
VariantClear
CheckMozJavaPlugins
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RedirectAllStaticVersionKeys
RedirectSelectedStaticVersionKeys
RegKeyBranchNeedsUpdating
RemoveAllMozillaJavaPlugins
RunBrokerProcess
UpdateTreatAsKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ