Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
5d1660a53aaf824739d82f703ed580004980d377bdc2834f1041d512e4305d07.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d1660a53aaf824739d82f703ed580004980d377bdc2834f1041d512e4305d07.exe
Resource
win10v2004-20240226-en
Target
5d1660a53aaf824739d82f703ed580004980d377bdc2834f1041d512e4305d07
Size
577KB
MD5
be046bab4a23f8db568535aaea565f87
SHA1
50dbb71d04ba947b757e790031d9df70f35fed5a
SHA256
5d1660a53aaf824739d82f703ed580004980d377bdc2834f1041d512e4305d07
SHA512
d5483f905399376959cf3b714fb75ac678ffd9f7531296de6930e463328da6ae7a5f8bb52044a2e9509e9fa1d25767d1a8ccb4fe55690557a262998af669e084
SSDEEP
6144:zfmy/pB2sBTfWF89fMrnYlZruw0wktJ1EzEWQwlMQUAWiiuTOBo46XSuwPMDOw0Z:zdJW8BMrY0Ezn5MoW/8SM/z5ab1
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Builds\13810\Tools\ProcDump_master\bin\Win32\Release\procdump.pdb
EnumProcessModules
GetModuleBaseNameW
DebugActiveProcess
DebugActiveProcessStop
FindResourceW
LoadResource
CreateProcessW
GetCurrentProcess
InitializeCriticalSection
OpenProcess
SizeofResource
GetExitCodeProcess
GetFileAttributesW
GetLastError
LockResource
ContinueDebugEvent
WaitForDebugEvent
DeleteFileW
ResumeThread
CreateThread
ExpandEnvironmentStringsW
FormatMessageW
MultiByteToWideChar
TerminateProcess
SetConsoleCtrlHandler
GetFullPathNameW
SystemTimeToTzSpecificLocalTime
GetEnvironmentVariableA
GetCurrentDirectoryW
Process32FirstW
GetSystemInfo
WaitForMultipleObjects
Process32NextW
IsDebuggerPresent
OpenThread
DebugBreak
GetSystemTime
ExitProcess
GetDateFormatW
FreeLibrary
SetFilePointerEx
GetTimeFormatW
CreateFileW
ReleaseSemaphore
GetFileSizeEx
CreateSemaphoreW
GetProcessId
SetLastError
DeviceIoControl
VirtualQueryEx
SetStdHandle
HeapReAlloc
WriteConsoleW
OutputDebugStringW
LoadLibraryExW
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
ReadProcessMemory
GetTickCount
ReadConsoleW
GetThreadContext
DeleteCriticalSection
Sleep
WaitForSingleObject
CloseHandle
EnterCriticalSection
LeaveCriticalSection
SetEvent
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
GetVersionExW
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetModuleHandleW
GetCommandLineW
CreateEventW
SetEndOfFile
ReadFile
CreateToolhelp32Snapshot
GetFileType
FlushFileBuffers
GetStringTypeW
GetConsoleCP
HeapSize
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RaiseException
RtlUnwind
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
GetProcessHeap
GetModuleHandleExW
WideCharToMultiByte
GetStdHandle
WriteFile
SendMessageW
GetDlgItem
InflateRect
LoadCursorW
DialogBoxIndirectParamW
SetWindowTextW
EndDialog
GetSysColorBrush
wsprintfW
IsHungAppWindow
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
LoadStringA
SetCursor
EndPage
StartPage
GetDeviceCaps
StartDocW
EndDoc
SetMapMode
PrintDlgW
EnumServicesStatusExW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegOpenKeyW
RegQueryValueExW
RegCreateKeyW
CommandLineToArgvW
CoUninitialize
CoInitializeEx
CoAllowSetForegroundWindow
CoCreateInstance
CLSIDFromString
PdhOpenQueryW
PdhAddCounterW
PdhCollectQueryData
PdhGetFormattedCounterValue
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ