Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
VeraCrypt.exe
Resource
win11-20240802-en
Target
VeraCrypt.exe
Size
7.3MB
MD5
86ae751c2526fc7ca9b3e6494d794c69
SHA1
1131f4ca151543cd21e0e2125e425ca744dd31f9
SHA256
e3a64db4464fd857ca3d6d7cb115290458885f103581c51f4ddb3a2c7437857d
SHA512
15a4b08d8c9f5d7b221edc42b443739cba86c79f244d9423db201200b9cbaf90457e293127be12513a9dce7496c5456ccd4dd6ecefc386feb7dc78b5fd2efb8a
SSDEEP
98304:F9ovSCjjlAgd1OZOlq3bo4oHMm0WQOEPjFbq+5CJDcduOutLkMOub4OOGE0ULdeF:Fev7KYA3CsKzOx5vx4TT
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\dev\prj\Github\VeraCrypt\src\Mount\Release\VeraCrypt.pdb
FreeLibrary
GetSystemDirectoryW
GetProcAddress
LoadLibraryW
GetModuleFileNameW
DeleteFileW
FindVolumeClose
FindNextVolumeW
QueryDosDeviceW
FindFirstVolumeW
DeviceIoControl
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
SetProcessShutdownParameters
LocalFree
GetModuleHandleW
WideCharToMultiByte
GetLastError
CloseHandle
Sleep
GetTickCount
GetCommandLineW
GetCommandLineA
MultiByteToWideChar
CreateProcessW
CreateDirectoryW
SetLastError
WriteFile
CreateFileW
lstrlenW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateMutexW
ReadFile
GetFileTime
SetFileTime
GetFileSizeEx
SetFilePointerEx
FindClose
FindNextFileW
FindFirstFileW
SetVolumeMountPointW
DeleteVolumeMountPointW
GetVolumeNameForVolumeMountPointW
SetEvent
WaitForSingleObject
CreateEventW
VirtualLock
CopyFileW
GetFirmwareEnvironmentVariableW
SetFirmwareEnvironmentVariableW
WritePrivateProfileStringW
GetPrivateProfileStringW
MoveFileExW
GetTempFileNameW
GetTempPathW
GetVolumeInformationW
GetDriveTypeW
VirtualUnlock
GetFileSize
GetVersionExW
InitializeCriticalSection
DeleteCriticalSection
DefineDosDeviceW
FormatMessageW
GetCurrentThread
ReleaseMutex
OpenMutexW
LeaveCriticalSection
FlushFileBuffers
GetCurrentProcess
GetNativeSystemInfo
LockResource
SizeofResource
LoadResource
FindResourceW
GetFileAttributesW
GetVolumePathNameW
GlobalUnlock
GlobalLock
GlobalAlloc
GetLogicalDrives
TerminateProcess
OpenProcess
HeapFree
HeapAlloc
GetProcessHeap
SetFileValidData
SetEndOfFile
GetCurrentProcessId
SetDllDirectoryW
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
EnterCriticalSection
GetCurrentDirectoryW
RemoveDirectoryW
SetErrorMode
LoadLibraryExW
SetCurrentDirectoryW
SetFilePointer
GetWindowsDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetDiskFreeSpaceW
InterlockedExchangeAdd
InterlockedExchange
GetSystemInfo
ResetEvent
GetFileAttributesExW
GetStartupInfoW
GetProcessWorkingSetSize
GetProcessTimes
GetThreadTimes
GlobalMemoryStatusEx
SetFileAttributesW
GetFileType
VirtualAlloc
VirtualFree
ResumeThread
IsProcessorFeaturePresent
LocalAlloc
LoadLibraryA
RaiseException
GetStringTypeW
InterlockedCompareExchange
EncodePointer
DecodePointer
RtlUnwind
ExitProcess
GetConsoleCP
GetConsoleMode
ExitThread
CreateThread
IsDebuggerPresent
GetSystemTimeAsFileTime
SetStdHandle
InitializeCriticalSectionAndSpinCount
HeapSetInformation
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExW
HeapReAlloc
LCMapStringW
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetLocaleInfoW
HeapSize
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFullPathNameW
GetFileInformationByHandle
PeekNamedPipe
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
lstrlenA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ