Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
GoogleInputTools.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
GoogleInputTools.exe
Resource
win10v2004-20230703-en
Target
GoogleInputTools.exe
Size
4.1MB
MD5
69f57bffdae37dbf83497a9053505f60
SHA1
d11dd4e8663db04e009170d752eb212d8dbac885
SHA256
d5fad94a2e597c97113ecb8ef4c4b557061a74ce97120a2b30ade3df86cdc8a8
SHA512
0b5bbe27c16f61144f7b7c8fef345e866e0da0d1e9c54e488ba695ca0c79cace3436d8b644a6a40e1c9b869a74c2d0b647e1af5593c7a4143c960a93900e9d22
SSDEEP
98304:vDVgLVmVkOZJ0kfvwW3nlyU5t9qBDhcsPGIGf8O:vDQetfv/3nt5tscAGIs8O
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetStringTypeW
IsValidLocale
WriteConsoleW
CreateFileA
SetEndOfFile
GetFileAttributesW
CreateDirectoryW
GetUserDefaultUILanguage
CreateThread
GetCurrentThreadId
LockResource
EnterCriticalSection
RaiseException
FlushInstructionCache
LeaveCriticalSection
SizeofResource
GetCurrentProcess
LoadResource
FindResourceW
FindResourceExW
SetStdHandle
GetCommandLineW
InitializeCriticalSection
GlobalAlloc
WideCharToMultiByte
DeleteCriticalSection
LocalFree
lstrlenW
MultiByteToWideChar
GetProcAddress
GetModuleHandleW
DeleteFileW
GetLastError
MoveFileExW
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
GetSystemWow64DirectoryW
LoadLibraryW
FreeLibrary
OpenProcess
CloseHandle
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
GetVersionExW
GetModuleFileNameW
CreateFileW
WriteFile
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
OpenEventW
SetEvent
GetTempFileNameW
HeapAlloc
HeapFree
InterlockedCompareExchange
GetProcessHeap
GetTempPathW
SetFileAttributesW
GetFileSize
ReadFile
CreateProcessW
GetTickCount
GetModuleFileNameA
IsDebuggerPresent
OutputDebugStringA
GetCurrentProcessId
DebugBreak
GetTempPathA
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
InitializeCriticalSectionAndSpinCount
HeapDestroy
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapSetInformation
GetStartupInfoW
ExitProcess
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
LCMapStringW
HeapCreate
GetStdHandle
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
QueryPerformanceCounter
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
SHCreateDirectoryExW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
PathCompactPathExW
PathAppendW
PathRemoveExtensionW
PathStripPathW
PathCombineW
PathFileExistsW
CharUpperW
GetWindowTextW
GetWindowTextLengthW
IsWindowVisible
GetWindowThreadProcessId
CharLowerW
EnumWindows
ExitWindowsEx
UnregisterClassA
DefWindowProcW
CallWindowProcW
SendMessageW
SetDlgItemTextW
GetSystemMetrics
MessageBoxW
DestroyWindow
PostMessageW
GetParent
GetWindowLongW
GetDlgItem
SetWindowLongW
LoadStringW
ShowWindow
IsDlgButtonChecked
GetActiveWindow
CheckRadioButton
WTSEnumerateSessionsW
WTSFreeMemory
CoCreateGuid
PropertySheetW
DestroyPropertySheetPage
CreatePropertySheetPageW
InitCommonControlsEx
RegCreateKeyExW
ControlService
StartServiceW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegEnumKeyW
EqualSid
GetTokenInformation
FreeSid
AllocateAndInitializeSid
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExW
RegQueryValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegCloseKey
GetModuleFileNameExW
EnumProcessModules
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ