Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
VeraCrypt-x64.exe
Resource
win11-20240802-en
Target
VeraCrypt-x64.exe
Size
5.9MB
MD5
93b44d671561459b5833133947b2961f
SHA1
bf2d79e7f3b0c785cfd96e5c21d6a5614e48cf78
SHA256
aee0d6f335e4346c57e60bbcc74a9207d4400e027f0b83771f5de63df86e132d
SHA512
691d71423e06d0cd6c75961bfa5cdca7b67a4731c521ee4307f92b1a1bff97ff378b15bccb6034981f458014b048ed0a040d85f52ec75ad2d9bd5c2143906d81
SSDEEP
98304:ch3jsOZfOszFbo4oHMm0WQOEPjFbq+5CJDcduOuts0ULdeWdxSbd:chr4szFCsKzOx5q5
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\dev\prj\Github\VeraCrypt\src\Mount\x64\Release\VeraCrypt.pdb
FreeLibrary
GetSystemDirectoryW
GetProcAddress
LoadLibraryW
GetModuleFileNameW
DeleteFileW
FindVolumeClose
FindNextVolumeW
QueryDosDeviceW
FindFirstVolumeW
DeviceIoControl
GetCurrentThreadId
SetProcessShutdownParameters
LocalFree
GetModuleHandleW
WideCharToMultiByte
GetLastError
CloseHandle
Sleep
GetTickCount
GetCommandLineW
GetCommandLineA
MultiByteToWideChar
CreateProcessW
CreateDirectoryW
SetLastError
WriteFile
CreateFileW
lstrlenW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateMutexW
ReadFile
GetFileTime
SetFileTime
GetFileSizeEx
SetFilePointerEx
FindClose
FindNextFileW
FindFirstFileW
SetVolumeMountPointW
DeleteVolumeMountPointW
GetVolumeNameForVolumeMountPointW
SetEvent
WaitForSingleObject
CreateEventW
VirtualLock
CopyFileW
GetFirmwareEnvironmentVariableW
SetFirmwareEnvironmentVariableW
WritePrivateProfileStringW
GetPrivateProfileStringW
MoveFileExW
GetTempFileNameW
GetTempPathW
GetVolumeInformationW
GetDriveTypeW
VirtualUnlock
GetFileSize
GetVersionExW
InitializeCriticalSection
DeleteCriticalSection
DefineDosDeviceW
FormatMessageW
GetCurrentThread
ReleaseMutex
OpenMutexW
LeaveCriticalSection
FlushFileBuffers
GetNativeSystemInfo
GetCurrentProcess
LockResource
SizeofResource
LoadResource
FindResourceW
GetFileAttributesW
GetVolumePathNameW
GlobalUnlock
GlobalLock
GlobalAlloc
GetLogicalDrives
TerminateProcess
OpenProcess
HeapFree
HeapAlloc
GetProcessHeap
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemTime
SetFileValidData
SetEndOfFile
GetCurrentProcessId
SetDllDirectoryW
SetThreadPriority
EnterCriticalSection
GetCurrentDirectoryW
RemoveDirectoryW
SetErrorMode
LoadLibraryExW
SetCurrentDirectoryW
SetFilePointer
GetWindowsDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetDiskFreeSpaceW
GetSystemInfo
ResetEvent
GetFileAttributesExW
GetStartupInfoW
GetProcessWorkingSetSize
GetProcessTimes
GetThreadTimes
GlobalMemoryStatusEx
SetFileAttributesW
GetFileType
VirtualAlloc
VirtualFree
ResumeThread
LocalAlloc
LoadLibraryA
RaiseException
GetStringTypeW
EncodePointer
DecodePointer
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
ExitProcess
GetConsoleCP
GetConsoleMode
ExitThread
CreateThread
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
GetSystemTimeAsFileTime
SetStdHandle
InitializeCriticalSectionAndSpinCount
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExW
HeapReAlloc
LCMapStringW
GetCPInfo
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
GetStdHandle
GetLocaleInfoW
HeapSize
HeapSetInformation
GetVersion
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFullPathNameW
GetFileInformationByHandle
PeekNamedPipe
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
lstrlenA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ