Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
pycharm64.exe
Resource
win11-20240802-en
Target
pycharm64.exe
Size
998KB
MD5
e1a33e4f018685389217b13c235677f5
SHA1
9bea95390523bf4c724be45f2e62fe7c6eb2864c
SHA256
367077148f845c29be8fa4582852583091dc81ef5fbf800b0b110dc9f509c7f5
SHA512
2448375f31a4a41153052a7c78ee71c67085dc0165bd95c9284ddaa289a541159dc8c764fbb54962a67ad85feb4f3bf723b88eb9f50348e717caaa09b89a5bc7
SSDEEP
24576:x8uRFOka3eOwcYjHhqwi/TGVGsDnS47IDX:x8uRhc6IwOTGVZnAb
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
%%%WinLauncher.pdb%%%
RevertToSelf
RegDisablePredefinedCache
RegOpenKeyExW
RegCloseKey
GetTokenInformation
OpenProcessToken
DuplicateTokenEx
OpenThreadToken
SetTokenInformation
LookupPrivilegeValueW
CreateRestrictedToken
AdjustTokenPrivileges
CreateProcessAsUserW
SetThreadToken
FreeSid
IsValidSid
GetLengthSid
ConvertStringSidToSidW
ConvertSidToStringSidW
EqualSid
GetAce
IsValidSecurityDescriptor
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetNamedSecurityInfoW
GetSecurityInfo
SetSecurityInfo
MapGenericMask
AccessCheck
IsValidAcl
InitializeAcl
AddMandatoryAce
BuildTrusteeWithSidW
SetEntriesInAclW
RegCreateKeyExW
RegQueryValueExW
SymCleanup
SymGetSearchPathW
SymSetSearchPathW
SymFromAddr
SymGetLineFromAddr64
SymSetOptions
SymInitialize
RtlInitUnicodeString
RtlUnwindEx
RtlCaptureStackBackTrace
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlPcToFileHeader
RtlCaptureContext
RtlUnwind
SHGetKnownFolderPath
CommandLineToArgvW
CreateAppContainerProfile
DeriveAppContainerSidFromAppContainerName
timeGetTime
GetModuleFileNameA
LoadStringA
LoadStringW
GetProcAddress
FreeLibrary
GetModuleHandleExW
LoadLibraryExW
GetModuleHandleA
SetDefaultDllDirectories
GetModuleFileNameW
GetModuleHandleW
GetEnvironmentVariableA
SetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetEnvironmentVariableW
ExpandEnvironmentStringsA
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetCommandLineW
GetCommandLineA
SetCurrentDirectoryA
GetCurrentDirectoryW
CoTaskMemFree
TryAcquireSRWLockExclusive
SetEvent
CreateMutexW
AcquireSRWLockExclusive
InitializeCriticalSectionAndSpinCount
CreateEventW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
ReleaseSRWLockExclusive
CreateEventA
WaitForSingleObject
EnterCriticalSection
WriteProcessMemory
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
ReadProcessMemory
VirtualFree
VirtualFreeEx
VirtualAllocEx
VirtualProtectEx
SetUnhandledExceptionFilter
GetLastError
RaiseException
SetLastError
UnhandledExceptionFilter
GetFileAttributesW
GetFileSizeEx
GetFileAttributesA
GetLongPathNameW
WriteFile
SetEndOfFile
GetFileType
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
ReadFile
SetFilePointerEx
CreateFileW
LoadLibraryW
LoadLibraryA
DuplicateHandle
SetHandleInformation
CloseHandle
GetStartupInfoW
TlsSetValue
TlsFree
TlsAlloc
GetCurrentProcessId
CreateThread
UpdateProcThreadAttribute
CreateRemoteThread
ExitProcess
DeleteProcThreadAttributeList
GetCurrentThread
TlsGetValue
InitializeProcThreadAttributeList
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
GetThreadId
RegisterWaitForSingleObject
CreateFileMappingA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
OpenFileMappingA
SetDllDirectoryW
PostQueuedCompletionStatus
CreateIoCompletionPort
GetQueuedCompletionStatus
CreateJobObjectW
SetInformationJobObject
LCMapStringEx
GetLocaleInfoW
LCMapStringW
GetUserDefaultLangID
IsValidLocale
EnumSystemLocalesW
GetCPInfo
IsValidCodePage
FormatMessageW
GetACP
GetUserDefaultLocaleName
GetOEMCP
GetUserDefaultLCID
EnumSystemLocalesEx
GetProcessHeap
HeapSetInformation
HeapDestroy
HeapSize
HeapReAlloc
GetProcessHeaps
HeapFree
HeapAlloc
GetTickCount
GetLocalTime
GetSystemTimeAsFileTime
GetVersionExW
UnregisterWaitEx
WakeAllConditionVariable
SleepConditionVariableSRW
Sleep
DebugBreak
IsDebuggerPresent
OutputDebugStringA
SetThreadInformation
IsProcessorFeaturePresent
GetCurrentProcessorNumber
GetProcessMitigationPolicy
GetProcessHandleCount
SetProcessMitigationPolicy
GetProductInfo
GetNativeSystemInfo
IsWow64Process
SetThreadAffinityMask
QueryPerformanceCounter
QueryPerformanceFrequency
LocalFree
TerminateJobObject
QueryDosDeviceW
QueryInformationJobObject
GetThreadDesktop
SetProcessWindowStation
CreateWindowStationW
GetUserObjectInformationW
GetProcessWindowStation
CreateDesktopW
CloseWindowStation
CloseDesktop
AllowSetForegroundWindow
MessageBoxW
MessageBoxA
EncodePointer
DecodePointer
InitializeSListHead
GetConsoleOutputCP
ReadConsoleW
WriteConsoleW
GetConsoleMode
FlsAlloc
FlsGetValue
FlsFree
FlsSetValue
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ