Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
procdump.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
procdump.exe
Resource
win10v2004-20230824-en
Target
procdump.exe.1
Size
636KB
MD5
6a09bc6c19c4236c0bd8a01953371a29
SHA1
d1387f3c94464d81f1a64207315b13bf578fd10c
SHA256
05732e84de58a3cc142535431b3aa04efbe034cc96e837f93c360a6387d8faad
SHA512
6ca5d6167a01de2e62b5cf6d850784e90045794f751b246b779db740a754eb66cfd9f3edb659d41b8380ba5807b902897aea5ddd1ad787a0cc318108577286ab
SSDEEP
12288:JyC66C4C6r/uuxQXygjzqU/2Jg5V2/gU7R:J93C1ygjzdvEgq
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcessImageFileNameW
EnumProcessModules
GetModuleBaseNameW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
StrStrIW
EnterCriticalSection
CloseHandle
WaitForSingleObject
Sleep
DeleteCriticalSection
GetThreadContext
GetTickCount
ReadProcessMemory
OpenThread
DebugActiveProcess
DebugActiveProcessStop
FindResourceW
FreeLibrary
LoadResource
CreateProcessW
GetCurrentProcess
InitializeCriticalSection
OpenProcess
SizeofResource
GetExitCodeProcess
GetFileAttributesW
GetLastError
SetLastError
LockResource
ContinueDebugEvent
WaitForDebugEvent
DeleteFileW
ResumeThread
CreateThread
ExpandEnvironmentStringsW
FormatMessageW
MultiByteToWideChar
TerminateProcess
SetConsoleCtrlHandler
GetFullPathNameW
SystemTimeToTzSpecificLocalTime
GetEnvironmentVariableA
LeaveCriticalSection
Process32FirstW
GetSystemInfo
WaitForMultipleObjects
Process32NextW
IsDebuggerPresent
CreateToolhelp32Snapshot
GetCurrentProcessId
DebugBreak
GetSystemTime
CreateFileW
GetFileSizeEx
ExitProcess
GetDateFormatW
SetFilePointerEx
GetTimeFormatW
ReleaseSemaphore
CreateSemaphoreW
GetProcessId
DeviceIoControl
VirtualQueryEx
LCMapStringW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStringTypeW
GetConsoleCP
FlushFileBuffers
ReadFile
RaiseException
LoadLibraryExW
GetStartupInfoW
TlsFree
SetEvent
InterlockedDecrement
InterlockedIncrement
GetVersionExW
GetModuleFileNameW
GetFileType
LocalFree
GetProcAddress
LocalAlloc
GetStdHandle
LoadLibraryW
GetModuleHandleW
GetCommandLineW
CreateEventW
OutputDebugStringW
WriteConsoleW
ReadConsoleW
RtlUnwind
HeapSize
IsValidCodePage
GetCurrentDirectoryW
SetEndOfFile
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WriteFile
GetProcessHeap
GetCurrentThreadId
GetCPInfo
GetOEMCP
EncodePointer
DecodePointer
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetModuleHandleExW
WideCharToMultiByte
SetStdHandle
IsProcessorFeaturePresent
GetACP
GetSysColorBrush
SendMessageW
SetWindowTextW
GetDlgItem
InflateRect
LoadCursorW
DialogBoxIndirectParamW
EndDialog
GetWindowThreadProcessId
wsprintfW
IsHungAppWindow
IsWindowVisible
EnumWindows
LoadStringA
SetCursor
StartPage
GetDeviceCaps
SetMapMode
StartDocW
EndDoc
EndPage
PrintDlgW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegCreateKeyW
EnumServicesStatusExW
CommandLineToArgvW
CoCreateInstance
CoAllowSetForegroundWindow
CoUninitialize
CoInitializeEx
CLSIDFromString
PdhAddCounterW
PdhGetFormattedCounterValue
PdhOpenQueryW
PdhCollectQueryData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ