Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ContentV3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ContentV3.exe
Resource
win10v2004-20241007-en
Target
ContentV3.exe
Size
595KB
MD5
60db193bce83f05363c874fec9b310c5
SHA1
e1ceb44b70f37f47d92a02c113b59414ba346d81
SHA256
10fb5a7c13814e3d45fabfe448ea1fd7e3a12fbded649385310b005cfe8ab18f
SHA512
6b87de59cd3e769c2a4eb8db24f1c3c5d7eea78abd014fa326da8b4d1b119d2d7a9796ccc8d38e51ec963d9f7e13bc46c34293cae411159c83849d78a7bc81a2
SSDEEP
12288:JOLUaILIM4h22OuxwOPKhHlkz3YqJiWFTsOhZ9uGIutCXHGajnj:Y820cKhW3YqJiETfhZ9NIuIXHGSj
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\src\master\Client\Confidence\Loader\Release\rkverify.pdb
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
GetModuleFileNameExA
GetTempPathA
SetEvent
CreateEventA
GetCurrentProcessId
GetModuleFileNameA
GetCurrentProcess
GetVersion
InitializeSListHead
Process32Next
GetTempFileNameA
CreateToolhelp32Snapshot
InterlockedPopEntrySList
Thread32Next
Thread32First
WaitForSingleObject
InterlockedIncrement
InterlockedDecrement
InterlockedPushEntrySList
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
InterlockedCompareExchange
ResetEvent
WaitForMultipleObjects
GetTickCount
Sleep
DeleteFileA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
GetProcAddress
FormatMessageA
lstrlenA
LocalAlloc
FreeLibrary
CloseHandle
GetBinaryTypeA
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
GetVersionExA
OpenProcess
LocalFree
GetCurrentThreadId
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
Process32First
TryEnterCriticalSection
SetCriticalSectionSpinCount
ReleaseMutex
ReleaseSemaphore
CancelWaitableTimer
SetWaitableTimer
OpenEventA
CreateMutexA
OpenMutexA
CreateSemaphoreA
CreateWaitableTimerA
GetComputerNameA
GetSystemDirectoryA
HeapFree
HeapAlloc
GetProcessHeap
GetExitCodeThread
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
SystemTimeToFileTime
CompareFileTime
GetSystemTimeAsFileTime
FileTimeToSystemTime
GetSystemTime
GetLocalTime
GetDateFormatA
GetTimeFormatA
SetEnvironmentVariableA
LoadLibraryExA
FindClose
FindFirstFileA
FindNextFileA
FindFirstFileW
FindNextFileW
GetShortPathNameA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
CreateDirectoryA
WriteFile
SetFilePointer
CreateFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
InterlockedExchange
InitializeCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitThread
CreateThread
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapSize
HeapCreate
HeapDestroy
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
FatalAppExitA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
LoadLibraryW
GetLocaleInfoW
VirtualQuery
HeapQueryInformation
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetStdHandle
GetTimeZoneInformation
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
CreateFileW
SetEndOfFile
CompareStringW
GetModuleFileNameW
LoadMenuA
LoadStringA
PostMessageA
LoadImageA
EnumWindows
EnumChildWindows
ExitWindowsEx
InvalidateRect
UnhookWindowsHookEx
GetSystemMetrics
MessageBoxA
GetWindowThreadProcessId
SetWindowsHookExA
GetClassNameA
RegSetKeySecurity
RegSaveKeyA
RegFlushKey
RegQueryInfoKeyA
InitializeAcl
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ConvertSidToStringSidA
GetTokenInformation
SetTokenInformation
GetLengthSid
GetSidSubAuthority
GetSidSubAuthorityCount
IsValidSid
DuplicateTokenEx
SetSecurityDescriptorDacl
AddAccessAllowedAce
RegDeleteKeyA
RegCreateKeyExA
RegEnumValueA
RegEnumKeyExA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetFileSecurityA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
SetSecurityInfo
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
CoTaskMemFree
SysFreeString
VariantInit
VariantClear
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
SHCopyKeyA
SHGetSpecialFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ