Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ceb1fc070ec55a8335eed10d4c4c5ca0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ceb1fc070ec55a8335eed10d4c4c5ca0N.exe
Resource
win10v2004-20240802-en
Target
ceb1fc070ec55a8335eed10d4c4c5ca0N
Size
4.8MB
MD5
ceb1fc070ec55a8335eed10d4c4c5ca0
SHA1
15c70e8b608e36b3deec3d85480509eb107f941e
SHA256
62b52503ff07c5bfb56414aea0f2d6376adfdffcd9e2f42238ba4ec132d3c047
SHA512
d23385e55335eb2ec6b1de77bbf0223ab59bd1c964658fbc30821a7ddeec51cbc3754a2d7c4533167939f40a793705f1433583e591fef0dde80b1a5906706c9c
SSDEEP
98304:8WrSa24w3rQ/pE/JFBCnpcYiKAEXXPnsNSkUe:3y4wesJFqpc8dXfUSe
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
p:\p\agents\hpam2.eem\recipes\499894881\base\branches\goopy2_release_branch\googleclient\ime\goopy\scons-out\opt\obj\syncer\daemon_unsigned.pdb
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegSetValueExW
GetSidSubAuthority
GetSidSubAuthorityCount
CryptGetHashParam
RegEnumValueW
LookupAccountNameW
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptCreateHash
CryptImportKey
CryptReleaseContext
CryptVerifySignatureW
CryptAcquireContextW
SetSecurityDescriptorDacl
SetEntriesInAclW
InitializeSecurityDescriptor
CreateWellKnownSid
CopySid
GetLengthSid
ConvertSidToStringSidW
GetSecurityInfo
DuplicateTokenEx
DuplicateToken
CreateRestrictedToken
ConvertStringSidToSidW
SetTokenInformation
CreateProcessAsUserW
SetThreadToken
LookupPrivilegeValueW
RegFlushKey
EqualSid
GetTokenInformation
OpenProcessToken
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenCurrentUser
GetUserNameW
Process32FirstW
AssignProcessToJobObject
GetThreadContext
CreateToolhelp32Snapshot
DuplicateHandle
WriteProcessMemory
ResumeThread
SetInformationJobObject
CreateJobObjectW
GetFileSizeEx
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
GetFileInformationByHandle
PeekNamedPipe
FreeResource
VerSetConditionMask
VerifyVersionInfoW
GetVolumeInformationW
GetComputerNameW
Process32NextW
OpenMutexW
CreateProcessW
WaitForSingleObject
GetTickCount
InitializeCriticalSection
WideCharToMultiByte
TerminateProcess
GetModuleFileNameA
IsDebuggerPresent
OutputDebugStringA
ReleaseMutex
GetCurrentProcessId
DebugBreak
GetTempPathA
LocalFree
VirtualQuery
GetCurrentThread
GetSystemTime
CreateSemaphoreW
LoadLibraryW
TerminateThread
ReleaseSemaphore
CreateFileW
WriteFile
ResetEvent
SetEvent
WaitForMultipleObjects
GetSystemDirectoryW
FindFirstFileW
FindNextFileW
GetFullPathNameW
GetShortPathNameW
DeleteFileW
RemoveDirectoryW
LockResource
FindResourceExW
FindClose
GetVersionExW
GetNativeSystemInfo
OpenFileMappingW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
OpenEventW
HeapFree
GetProcessHeap
HeapAlloc
MoveFileExW
GetSystemWow64DirectoryW
OpenProcess
CopyFileW
SetFileAttributesW
FlushViewOfFile
CreateDirectoryW
GetFileSize
MulDiv
CreateTimerQueueTimer
DeleteTimerQueueTimer
GetTempFileNameW
GetTempPathW
ConnectNamedPipe
CreateNamedPipeW
ReadFile
CreateEventW
Sleep
GetSystemDefaultLangID
GetLocaleInfoW
CompareStringW
FlushInstructionCache
SetLastError
lstrcpyW
SetFilePointer
SetEndOfFile
GetStartupInfoW
GetCurrentDirectoryW
MoveFileW
SetCurrentDirectoryW
SystemTimeToFileTime
FileTimeToSystemTime
GetFileAttributesW
LocalFileTimeToFileTime
SetFileTime
HeapDestroy
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
InterlockedExchange
EncodePointer
DecodePointer
UnhandledExceptionFilter
GetCommandLineW
HeapSetInformation
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
GetCPInfo
LCMapStringW
HeapCreate
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetTimeZoneInformation
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
CreateFileA
SetEnvironmentVariableA
VirtualUnlock
VirtualLock
GetProcessWorkingSetSize
CreateThread
CloseHandle
GetCurrentThreadId
DeleteCriticalSection
lstrcmpiW
SetProcessWorkingSetSize
EnterCriticalSection
GetProcAddress
GetLastError
RaiseException
lstrlenW
MultiByteToWideChar
GetModuleFileNameW
LeaveCriticalSection
SizeofResource
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
LoadResource
FreeLibrary
FindResourceW
SetPriorityClass
CreateMutexW
SetUnhandledExceptionFilter
FillRect
GetWindowRect
ScreenToClient
SetCursor
EndPaint
UnregisterClassA
DispatchMessageW
DefWindowProcW
MessageBoxW
LoadStringW
PeekMessageW
TranslateMessage
CharNextW
GetMessageW
DestroyWindow
SetCapture
DrawTextW
GetFocus
DialogBoxParamW
TrackMouseEvent
LoadCursorW
MessageBeep
IsWindowEnabled
GetClientRect
SetFocus
SetRectEmpty
BeginPaint
PtInRect
GetDC
IsWindow
GetCapture
DrawFocusRect
OffsetRect
InvalidateRect
GetClassNameW
ReleaseDC
MonitorFromWindow
GetDlgItem
EndDialog
GetSysColor
SetWindowPos
GetCursorPos
CheckDlgButton
ShowWindow
IsDlgButtonChecked
GetActiveWindow
ReleaseCapture
SetDlgItemTextW
SendMessageW
MapWindowPoints
UpdateWindow
EnableWindow
GetDlgCtrlID
SetWindowTextW
GetMonitorInfoW
CallWindowProcW
GetWindow
LoadIconW
GetWindowLongW
SetWindowLongW
GetWindowTextW
GetWindowTextLengthW
CreateWindowExW
RegisterClassW
GetParent
wvsprintfW
VerQueryValueW
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
StringFromGUID2
CoCreateGuid
SafeArrayUnlock
VariantInit
VarUI4FromStr
SysFreeString
SysAllocString
VariantClear
SafeArrayGetLBound
SafeArrayDestroy
SafeArrayCreate
SafeArrayRedim
SafeArrayLock
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayCopy
InitCommonControlsEx
SetTextColor
CreateFontIndirectW
SetBkMode
DeleteObject
SelectObject
GetObjectW
GetStockObject
SymFunctionTableAccess64
SymGetModuleBase64
StackWalk64
SetupInitDefaultQueueCallback
SetupIterateCabinetW
SetupDefaultQueueCallbackW
SetupTermDefaultQueueCallback
WinVerifyTrust
CertCloseStore
CertFreeCertificateContext
CryptQueryObject
CertEnumCertificatesInStore
CryptDecodeObject
CryptProtectData
CryptUnprotectData
CertDuplicateCertificateContext
CertNameToStrW
GetModuleFileNameExW
ord165
CommandLineToArgvW
Shell_NotifyIconW
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHGetFolderPathW
ShellExecuteExW
SHFileOperationW
ShellExecuteW
PathRemoveFileSpecW
PathFindExtensionW
PathAddExtensionW
UrlEscapeW
PathFindFileNameW
PathRemoveExtensionW
PathFileExistsW
PathCommonPrefixW
PathRemoveBackslashW
PathCombineW
PathAppendW
PathStripPathW
PathIsDirectoryW
PathIsRelativeW
PathCanonicalizeW
URLDownloadToFileW
HttpOpenRequestW
InternetCloseHandle
DeleteUrlCacheEntryW
InternetCrackUrlW
InternetOpenW
InternetReadFile
InternetConnectW
HttpSendRequestW
HttpQueryInfoW
InternetQueryDataAvailable
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ