Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
procdump.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
procdump.exe
Resource
win10v2004-20230915-en
Target
procdump.exe
Size
708KB
MD5
d3763ffbfaf30bcfd866b8ed0324e7a3
SHA1
e9967ddb2860174f4fac3c82a7dcddfe106afb25
SHA256
916cc8d6bf2282ae0d2db587f4f96780af59e685a1f1a511e0b2b276669dc802
SHA512
4f14dee268b0982d620b909c243f61870e56bab161458bf50f7102207f563d244d100b9cffa89b271a9cfdffd2bd1856bdbfcd65df2ea1ec41ad8638c08c1f55
SSDEEP
12288:RhkYuFNNIYgv1npe39hqdbaoys3Fm7eNMd1MY:RdNEiUoL3Fv81l
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleBaseNameW
GetProcessImageFileNameW
EnumProcessModules
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
StrStrIW
SetEvent
CloseHandle
InterlockedIncrement
WaitForSingleObject
Sleep
DeleteCriticalSection
GetThreadContext
ReadProcessMemory
GetTickCount
OpenThread
SizeofResource
SetLastError
GetCurrentProcess
ExpandEnvironmentStringsW
WaitForDebugEvent
InitializeCriticalSection
GetFileAttributesW
DebugActiveProcessStop
ResumeThread
ContinueDebugEvent
OpenProcess
GetLastError
LockResource
DeleteFileW
CreateThread
LoadResource
FindResourceW
DebugActiveProcess
CreateProcessW
FreeLibrary
GetExitCodeProcess
MultiByteToWideChar
FormatMessageW
SetConsoleCtrlHandler
TerminateProcess
GetFullPathNameW
WaitForMultipleObjects
GetEnvironmentVariableA
InterlockedDecrement
Process32NextW
Process32FirstW
GetSystemInfo
GetCurrentDirectoryW
GetCurrentProcessId
SystemTimeToTzSpecificLocalTime
GetSystemTime
DebugBreak
IsDebuggerPresent
GetFileSizeEx
CreateFileW
ReleaseSemaphore
GetProcessId
SetFilePointerEx
GetTimeFormatW
ExitProcess
CreateSemaphoreW
GetDateFormatW
DeviceIoControl
GetCurrentThread
VirtualQueryEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetStringTypeW
ReadFile
GetConsoleCP
FlushFileBuffers
EnterCriticalSection
DecodePointer
GetVersionExW
GetModuleFileNameW
GetFileType
GetModuleHandleW
LeaveCriticalSection
LocalFree
GetProcAddress
LoadLibraryW
LocalAlloc
GetStdHandle
GetCommandLineW
CreateEventW
OpenEventW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
ReadConsoleW
HeapSize
HeapReAlloc
SetEndOfFile
CreateToolhelp32Snapshot
LCMapStringW
CompareStringW
HeapAlloc
HeapFree
GetACP
GetCommandLineA
WriteFile
WideCharToMultiByte
SetStdHandle
SetConsoleMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
GetConsoleMode
ReadConsoleInputA
LoadCursorW
SetCursor
GetDlgItem
GetSysColorBrush
DialogBoxIndirectParamW
wsprintfW
GetWindowThreadProcessId
IsWindowVisible
IsHungAppWindow
EnumWindows
LoadStringA
InflateRect
SendMessageW
EndDialog
SetWindowTextW
StartPage
EndDoc
GetDeviceCaps
SetMapMode
EndPage
StartDocW
PrintDlgW
RegDeleteValueW
CloseServiceHandle
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegQueryValueExW
CommandLineToArgvW
CLSIDFromString
CoUninitialize
CoInitializeEx
CoAllowSetForegroundWindow
CoCreateInstance
PdhGetFormattedCounterValue
PdhAddCounterW
PdhOpenQueryW
PdhCollectQueryData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ