Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
pyw.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
pyw.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
pyw.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
pyw.exe
Resource
win11-20240802-en
Target
pyw.exe
Size
938KB
MD5
963ee4500edab49ac484c038edfb9ae1
SHA1
d4381278b3286b52aa98b948714d8e8098751fe3
SHA256
4fbc779f23b72fa8a4289b1baf88c7066182f1391ecfe3422bfe35b2ca3e2a61
SHA512
903b6a03882db6131609291843cf43e23e734d8275317e0f71669720d7aa0cfe641feedb06128eef3d515e66826c5b5e3e2e4379fa53d4bac3d52dc41311cde8
SSDEEP
24576:D+PziHjWvFsPnOWYu8Bx4tSVuUXG4fM+hGM:sWqsPAqO7U+hJ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\1\b\bin\win32\pyw.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
SHGetFolderPathW
WriteConsoleW
SetEndOfFile
EnterCriticalSection
HeapReAlloc
HeapSize
CreateFileW
GetStartupInfoW
SetConsoleCtrlHandler
SetInformationJobObject
QueryInformationJobObject
SearchPathW
GetBinaryTypeW
GetCommandLineW
GetCurrentProcess
GetStdHandle
AssignProcessToJobObject
GetModuleFileNameW
SetEnvironmentVariableW
CreateJobObjectW
GetEnvironmentVariableW
GetFileAttributesW
DuplicateHandle
MultiByteToWideChar
GetPrivateProfileStringW
FormatMessageW
GetLastError
WaitForSingleObjectEx
CloseHandle
CreateProcessW
IsWow64Process
GetExitCodeProcess
SetFilePointerEx
GetFileSizeEx
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
DecodePointer
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetCommandLineA
WriteFile
HeapFree
HeapAlloc
GetCurrentThread
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetStringTypeW
ReadFile
ReadConsoleW
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
MessageBoxW
PostMessageW
GetMessageW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ