Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
procdumpx64.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
procdumpx64.exe
Resource
win10v2004-20240508-en
Target
procdumpx64.exe
Size
333KB
MD5
a92669ec8852230a10256ac23bbf4489
SHA1
4bed038c66e7fdbbfb0365669923a73fbc9bb8f4
SHA256
16f413862efda3aba631d8a7ae2bfff6d84acd9f454a7adaa518c7a8a6f375a5
SHA512
86b2795a428799b1024c84cdb76eda787ade15d6895113a6e2c8db1635574fc48d5dbbe17b127f8bcc1ea092c19d9e215cefc8985c18a0fb0910e4548eb544ed
SSDEEP
6144:5ulvQXyijj2FO19VXUjUGTFqxnf85DAK/THw5+VUQwnKK5V2Ax:5uxQXygjzqU/2Jg5V26
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Builds\13810\Tools\ProcDump_master\bin\x64\Release\procdump64.pdb
EnumProcessModules
GetProcessImageFileNameW
GetModuleBaseNameW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
StrStrIW
WaitForSingleObject
Sleep
DeleteCriticalSection
GetThreadContext
GetTickCount
ReadProcessMemory
OpenThread
DebugActiveProcess
DebugActiveProcessStop
FreeLibrary
CreateProcessW
GetCurrentProcess
InitializeCriticalSection
OpenProcess
GetLastError
SetLastError
ContinueDebugEvent
WaitForDebugEvent
ResumeThread
CreateThread
FormatMessageW
MultiByteToWideChar
ExpandEnvironmentStringsW
TerminateProcess
SetConsoleCtrlHandler
GetFullPathNameW
SystemTimeToTzSpecificLocalTime
GetFileAttributesW
GetEnvironmentVariableA
GetCurrentDirectoryW
Process32FirstW
GetSystemInfo
WaitForMultipleObjects
Process32NextW
CloseHandle
CreateToolhelp32Snapshot
GetCurrentProcessId
DebugBreak
GetSystemTime
CreateFileW
GetFileSizeEx
DeleteFileW
ExitProcess
GetDateFormatW
SetFilePointerEx
GetTimeFormatW
ReleaseSemaphore
CreateSemaphoreW
GetProcessId
DeviceIoControl
VirtualQueryEx
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStringTypeW
GetConsoleCP
FlushFileBuffers
ReadFile
LoadLibraryExW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
SetEndOfFile
LeaveCriticalSection
SetEvent
GetVersionExW
GetModuleFileNameW
LocalFree
GetFileType
LocalAlloc
GetProcAddress
GetStdHandle
LoadLibraryW
GetModuleHandleW
GetCommandLineW
CreateEventW
LCMapStringW
OutputDebugStringW
WriteConsoleW
ReadConsoleW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
WriteFile
GetProcessHeap
GetCurrentThreadId
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
EncodePointer
DecodePointer
HeapFree
HeapAlloc
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetModuleHandleExW
WideCharToMultiByte
SetStdHandle
IsProcessorFeaturePresent
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
HeapSize
EndDialog
GetDlgItem
GetSysColorBrush
SetWindowTextW
SendMessageW
wsprintfW
IsHungAppWindow
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
LoadStringA
SetCursor
DialogBoxIndirectParamW
LoadCursorW
InflateRect
EndPage
StartPage
GetDeviceCaps
SetMapMode
EndDoc
StartDocW
PrintDlgW
EnumServicesStatusExW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegCreateKeyW
CommandLineToArgvW
CoCreateInstance
CoAllowSetForegroundWindow
CoUninitialize
CoInitializeEx
CLSIDFromString
PdhOpenQueryW
PdhAddCounterW
PdhCollectQueryData
PdhGetFormattedCounterValue
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ