Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
py.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
py.exe
Resource
win10v2004-20240611-en
Target
py.exe
Size
748KB
MD5
79eae4fa8dd7e1ca489e59ab19b4fbed
SHA1
48eb42d40490ac4ce6c30245c631cc24718601c9
SHA256
e52553f941ceb9e715d239e7a211501ce5d6096eeeb90fb161b7bfedf6a61dab
SHA512
f8ae33f15f9fa00c7b5786119c452722edeb9fa39350e7087cd86ce732bbd0571dbe2c9b96ed813770e9401bf4bed53362659d763be66c85a68fa912dcb3c625
SSDEEP
12288:6qUR/MYcpGWYG/UB7v14t677Vut+XG1ykwM+hGxkCe8qx:6qQcXX8Bx4tSVuUXG4fM+hGYFx
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\1\b\bin\win32\py.pdb
ShellExecuteExW
SHGetFolderPathW
PathCchCombineEx
PathCchRemoveFileSpec
RegEnumKeyExW
RegOpenKeyExW
RegGetValueW
RegCloseKey
HeapSize
HeapReAlloc
WriteConsoleW
SetFilePointerEx
GetSystemTimeAsFileTime
GetStartupInfoW
ReadFile
SizeofResource
SetConsoleCtrlHandler
SetInformationJobObject
QueryInformationJobObject
FindFirstFileW
SearchPathW
GetBinaryTypeW
GetCommandLineW
GetCurrentProcess
GetStdHandle
DeviceIoControl
AssignProcessToJobObject
GetModuleFileNameW
CreateJobObjectW
CompareStringOrdinal
GetEnvironmentVariableW
FindClose
CreateFileW
GetFileAttributesW
DuplicateHandle
MultiByteToWideChar
GetPrivateProfileStringW
FormatMessageW
GetLastError
OutputDebugStringW
WaitForSingleObjectEx
LockResource
CloseHandle
CompareStringEx
FindResourceExW
LoadResource
GetCurrentDirectoryW
GetProcAddress
CreateProcessW
GetModuleHandleW
IsWow64Process
GetExitCodeProcess
GetFileSizeEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
DecodePointer
InitializeSListHead
IsDebuggerPresent
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetStdHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
GetProcessHeap
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ