Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
procdump64.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
procdump64.exe
Resource
win10v2004-20230915-en
Target
procdump64.exe
Size
414KB
MD5
0b768681e9fd7677d4463adb3c021838
SHA1
310ce394ede9c5fae1d2386decfff770a9e1ef6d
SHA256
3b74c97074aa7eebfc07abd0edb3d13b738e990428c3036daeae94a384de5c77
SHA512
bc765d59d155ddfb89f77c2a42546bbe495835bbff85fdee3099b38a5a8828bcc37a8f235bcb3d04b1cc5aeebb2d22f4fbe1de149004a15db69a2b629f2a8b2b
SSDEEP
6144:iQLNaPmDYjykjeCH5kEkNUfaSaUjpgfUBMUQq3ykzSr9o:iQLNaPmlkje+kjOf1lyJS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
StrStrIW
Sleep
DeleteCriticalSection
K32GetModuleBaseNameW
ReadProcessMemory
K32EnumProcessModules
GetTickCount
GetCurrentProcess
WaitForDebugEvent
InitializeCriticalSection
DebugActiveProcessStop
ResumeThread
ContinueDebugEvent
OpenProcess
GetLastError
CreateThread
DebugActiveProcess
CreateProcessW
FreeLibrary
ExpandEnvironmentStringsW
MultiByteToWideChar
FormatMessageW
SetConsoleCtrlHandler
TerminateProcess
GetFullPathNameW
WaitForMultipleObjects
GetEnvironmentVariableA
GetFileAttributesW
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetSystemInfo
GetCurrentDirectoryW
GetCurrentProcessId
SystemTimeToTzSpecificLocalTime
WaitForSingleObject
DebugBreak
IsDebuggerPresent
GetFileSizeEx
CreateFileW
DeleteFileW
ReleaseSemaphore
GetProcessId
GetThreadContext
SetFilePointerEx
GetTimeFormatW
ExitProcess
CreateSemaphoreW
GetDateFormatW
OpenThread
DeviceIoControl
GetCurrentThread
VirtualQueryEx
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadFile
GetConsoleOutputCP
FlushFileBuffers
ReadConsoleW
CloseHandle
SetEvent
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetModuleFileNameW
GetFileType
GetModuleHandleW
LocalFree
GetProcAddress
LocalAlloc
GetStdHandle
GetCommandLineW
LoadLibraryExW
GetVersionExW
SetLastError
CreateEventW
OpenEventW
GetStringTypeW
HeapSize
HeapReAlloc
WriteConsoleW
SetEndOfFile
GetSystemTime
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
WideCharToMultiByte
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetConsoleCP
SetStdHandle
WriteFile
GetCommandLineA
HeapFree
HeapAlloc
FlsAlloc
FlsGetValue
SendMessageW
EndDialog
GetDlgItem
SetCursor
LoadCursorW
DialogBoxIndirectParamW
GetSysColorBrush
EnumWindows
InflateRect
wsprintfW
GetWindowThreadProcessId
IsWindowVisible
IsHungAppWindow
LoadStringA
SetWindowTextW
EndDoc
GetDeviceCaps
SetMapMode
StartDocW
EndPage
StartPage
PrintDlgW
RegOpenKeyExW
CloseServiceHandle
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegOpenKeyW
RegCreateKeyW
RegQueryValueExW
CommandLineToArgvW
CoInitializeEx
CoCreateInstance
CoAllowSetForegroundWindow
CLSIDFromString
CoUninitialize
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhAddCounterW
PdhOpenQueryW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ