Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
procdump64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
procdump64.exe
Resource
win10v2004-20230220-en
Target
procdump64.exe
Size
375KB
MD5
f13dab7d9ce88ddc0c80c2b9c5f422b5
SHA1
f02df19b44e880b9810d226b743b1a4b93e49a16
SHA256
e2a7a9a803c6a4d2d503bb78a73cd9951e901beb5fb450a2821eaf740fc48496
SHA512
73015d73ef35a020c846a09af56ac01f0baac6626a0bb590d38f7fd7461194d935a7bc8cd92ba0d2b6b9842bf8075d21f2b333279a73cf37fbe9a486ce9487eb
SSDEEP
6144:BbaoysBY+FE3jneNMYZJzK1ZIQ68NeLHW2vX5NVUQYLToL6N:Bbaoys3Fm7eNMd1MI
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetModuleBaseNameW
GetProcessImageFileNameW
EnumProcessModules
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
StrStrIW
CloseHandle
WaitForSingleObject
Sleep
DeleteCriticalSection
GetThreadContext
ReadProcessMemory
GetTickCount
OpenThread
SetLastError
GetCurrentProcess
WaitForDebugEvent
InitializeCriticalSection
DebugActiveProcessStop
ResumeThread
ContinueDebugEvent
OpenProcess
GetLastError
CreateThread
DebugActiveProcess
CreateProcessW
FreeLibrary
ExpandEnvironmentStringsW
MultiByteToWideChar
FormatMessageW
SetConsoleCtrlHandler
TerminateProcess
GetFullPathNameW
WaitForMultipleObjects
GetEnvironmentVariableA
GetFileAttributesW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetSystemInfo
GetCurrentDirectoryW
SetEvent
SystemTimeToTzSpecificLocalTime
GetSystemTime
DebugBreak
IsDebuggerPresent
GetFileSizeEx
CreateFileW
DeleteFileW
ReleaseSemaphore
GetProcessId
SetFilePointerEx
GetTimeFormatW
ExitProcess
CreateSemaphoreW
GetDateFormatW
DeviceIoControl
GetCurrentThread
VirtualQueryEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetStringTypeW
ReadFile
GetConsoleCP
FlushFileBuffers
LeaveCriticalSection
EnterCriticalSection
GetVersionExW
GetModuleFileNameW
GetFileType
GetModuleHandleW
LocalFree
GetProcAddress
LoadLibraryW
LocalAlloc
GetStdHandle
GetCommandLineW
CreateEventW
OpenEventW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
ReadConsoleW
HeapSize
HeapReAlloc
SetEndOfFile
GetCurrentProcessId
LCMapStringW
CompareStringW
HeapAlloc
HeapFree
GetACP
GetCommandLineA
WriteFile
WideCharToMultiByte
SetStdHandle
SetConsoleMode
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
GetConsoleMode
ReadConsoleInputA
LoadCursorW
SetCursor
GetDlgItem
GetSysColorBrush
DialogBoxIndirectParamW
wsprintfW
GetWindowThreadProcessId
IsWindowVisible
IsHungAppWindow
EnumWindows
LoadStringA
InflateRect
SendMessageW
EndDialog
SetWindowTextW
EndDoc
GetDeviceCaps
SetMapMode
StartDocW
EndPage
StartPage
PrintDlgW
RegOpenKeyExW
CloseServiceHandle
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegOpenKeyW
RegCreateKeyW
RegQueryValueExW
CommandLineToArgvW
CLSIDFromString
CoUninitialize
CoInitializeEx
CoAllowSetForegroundWindow
CoCreateInstance
PdhGetFormattedCounterValue
PdhAddCounterW
PdhOpenQueryW
PdhCollectQueryData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ