Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
1Static
static
Procdump.zip
windows7-x64
1Procdump.zip
windows10-2004-x64
1Eula.txt
windows7-x64
1Eula.txt
windows10-2004-x64
1procdump.exe
windows7-x64
1procdump.exe
windows10-2004-x64
1procdump64.exe
windows7-x64
1procdump64.exe
windows10-2004-x64
1procdump64a.exe
windows7-x64
procdump64a.exe
windows10-2004-x64
Static task
static1
Behavioral task
behavioral1
Sample
Procdump.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Procdump.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Eula.txt
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Eula.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
procdump.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
procdump.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
procdump64.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
procdump64.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
procdump64a.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
procdump64a.exe
Resource
win10v2004-20220812-en
Target
Procdump.zip
Size
680KB
MD5
f0a99ed2f9e64ba438de802a1f1343ff
SHA1
8486ebca77800967e2db61b23a162565200597ef
SHA256
397fe79657aba2fae9ebbf8d28ece416ef091d5d8b5b902e5eade0dcfbc09562
SHA512
0cf463b986dab070cbdd78073ac65e9ec70384d18789f98da80290c6ccfe24945613d7dee98f33a07fa58bd4ebdb67a0f68eda8862651380a5d4fad39244dcc3
SSDEEP
12288:4pmHKwcs571OrO0t6xh1XPD/7Szqi7/Uks1ZC6nNAIQww7WylgzryUtk2iFm:e7+7IrXtWXPmIksmkA1WfzryUtkhFm
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
StrStrIW
Sleep
DeleteCriticalSection
K32GetModuleBaseNameW
GetThreadContext
ReadProcessMemory
K32EnumProcessModules
GetTickCount
OpenThread
SizeofResource
GetCurrentProcess
ExpandEnvironmentStringsW
WaitForDebugEvent
InitializeCriticalSection
GetFileAttributesW
DebugActiveProcessStop
ResumeThread
ContinueDebugEvent
OpenProcess
GetLastError
LockResource
DeleteFileW
CreateThread
LoadResource
FindResourceW
DebugActiveProcess
CreateProcessW
FreeLibrary
GetExitCodeProcess
MultiByteToWideChar
FormatMessageW
SetConsoleCtrlHandler
TerminateProcess
GetFullPathNameW
WaitForMultipleObjects
GetEnvironmentVariableA
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
WaitForSingleObject
Process32FirstW
GetSystemInfo
GetCurrentDirectoryW
GetCurrentProcessId
SystemTimeToTzSpecificLocalTime
GetSystemTime
DebugBreak
IsDebuggerPresent
GetFileSizeEx
CreateFileW
ReleaseSemaphore
GetProcessId
SetFilePointerEx
GetTimeFormatW
ExitProcess
CreateSemaphoreW
GetDateFormatW
DeviceIoControl
GetCurrentThread
VirtualQueryEx
ReadFile
GetConsoleOutputCP
FlushFileBuffers
ReadConsoleW
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
FindNextFileW
WideCharToMultiByte
LCMapStringW
CompareStringW
CloseHandle
SetEvent
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetFileType
GetModuleFileNameW
LocalFree
GetModuleHandleW
GetProcAddress
LocalAlloc
GetStdHandle
GetCommandLineW
LoadLibraryExW
GetVersionExW
SetLastError
CreateEventW
OpenEventW
FindClose
FindFirstFileExW
HeapReAlloc
WriteConsoleW
SetEndOfFile
Process32NextW
DecodePointer
HeapAlloc
HeapFree
HeapSize
GetStringTypeW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetConsoleCP
SetStdHandle
WriteFile
GetCommandLineA
IsWindowVisible
IsHungAppWindow
EnumWindows
LoadStringA
GetWindowThreadProcessId
EndDialog
SetWindowTextW
DialogBoxIndirectParamW
LoadCursorW
SetCursor
GetDlgItem
GetSysColorBrush
wsprintfW
SendMessageW
InflateRect
EndDoc
GetDeviceCaps
SetMapMode
StartDocW
EndPage
StartPage
PrintDlgW
CloseServiceHandle
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegOpenKeyW
RegQueryValueExW
CommandLineToArgvW
CoUninitialize
CoInitializeEx
CLSIDFromString
CoAllowSetForegroundWindow
CoCreateInstance
PdhGetFormattedCounterValue
PdhAddCounterW
PdhOpenQueryW
PdhCollectQueryData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
StrStrIW
Sleep
DeleteCriticalSection
K32GetModuleBaseNameW
GetThreadContext
ReadProcessMemory
K32EnumProcessModules
GetTickCount
OpenThread
GetCurrentProcess
WaitForDebugEvent
InitializeCriticalSection
DebugActiveProcessStop
ResumeThread
ContinueDebugEvent
OpenProcess
GetLastError
CreateThread
DebugActiveProcess
CreateProcessW
FreeLibrary
ExpandEnvironmentStringsW
MultiByteToWideChar
FormatMessageW
SetConsoleCtrlHandler
TerminateProcess
GetFullPathNameW
WaitForMultipleObjects
GetEnvironmentVariableA
GetFileAttributesW
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetSystemInfo
GetCurrentDirectoryW
CloseHandle
SystemTimeToTzSpecificLocalTime
GetSystemTime
DebugBreak
IsDebuggerPresent
GetFileSizeEx
CreateFileW
DeleteFileW
ReleaseSemaphore
GetProcessId
SetFilePointerEx
GetTimeFormatW
ExitProcess
CreateSemaphoreW
GetDateFormatW
DeviceIoControl
GetCurrentThread
VirtualQueryEx
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadFile
GetConsoleOutputCP
FlushFileBuffers
ReadConsoleW
SetEvent
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetModuleFileNameW
WaitForSingleObject
GetFileType
GetModuleHandleW
LocalFree
GetProcAddress
LocalAlloc
GetStdHandle
GetCommandLineW
LoadLibraryExW
GetVersionExW
SetLastError
CreateEventW
OpenEventW
GetStringTypeW
HeapSize
HeapReAlloc
WriteConsoleW
SetEndOfFile
GetCurrentProcessId
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
WideCharToMultiByte
LCMapStringW
CompareStringW
HeapAlloc
HeapFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetConsoleCP
SetStdHandle
WriteFile
GetCommandLineA
SendMessageW
EndDialog
GetDlgItem
SetCursor
LoadCursorW
DialogBoxIndirectParamW
GetSysColorBrush
EnumWindows
InflateRect
wsprintfW
GetWindowThreadProcessId
IsWindowVisible
IsHungAppWindow
LoadStringA
SetWindowTextW
StartPage
GetDeviceCaps
SetMapMode
StartDocW
EndPage
EndDoc
PrintDlgW
RegDeleteValueW
CloseServiceHandle
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegQueryValueExW
CommandLineToArgvW
CoInitializeEx
CoCreateInstance
CoAllowSetForegroundWindow
CLSIDFromString
CoUninitialize
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhAddCounterW
PdhOpenQueryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ