Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
VeraCrypt Portable 1.26.15.exe
Resource
win11-20240802-en
Target
VeraCrypt Portable 1.26.15.exe
Size
34.2MB
MD5
c7bac9661fc5f69941ce1fd044d00637
SHA1
e0f573e99ad51152e035905f77960389b1e4a5d3
SHA256
9678c92aea7f557b7522f6dc942fa1d00e813dfde4e7774c61e37c19e914a3a4
SHA512
2653eda33020d42840b3b11a2d4b8be5b2cc51caa62587a8438f6fa2c6612d3a8372684d6858dc7bbd46c1fdd29034bb8b08ab90fd26a58bf12c4c0496927842
SSDEEP
786432:FyQPZFCasuRpKm+oi3EFBBwl1iT6uO1mZhhxo2UQkEtk4B2z99xrnGGxF+DKHf:FyQPZFCasuRpKm+oi3EFBBwl1iT6uO1T
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\dev\prj\Github\VeraCrypt\src\Setup\PortableRelease\VeraCryptPortable.pdb
GetModuleFileNameW
MoveFileExW
DeleteFileW
CloseHandle
DeviceIoControl
GetUserDefaultUILanguage
GetProcAddress
GetModuleHandleW
Sleep
GetLastError
HeapFree
HeapAlloc
GetProcessHeap
GetCurrentProcess
FindClose
FindNextFileW
FindFirstFileW
LocalFree
FormatMessageW
GetSystemDirectoryW
MultiByteToWideChar
SetLastError
SetFilePointerEx
ReadFile
GetFileSizeEx
CreateFileW
CreateDirectoryW
WriteFile
GetDriveTypeW
GetFileSize
SetFileTime
GetFileTime
GetVersionExW
InitializeCriticalSection
DeleteCriticalSection
UnhandledExceptionFilter
WaitForSingleObject
GetCurrentThread
GetCurrentThreadId
SetUnhandledExceptionFilter
ReleaseMutex
CreateMutexW
LeaveCriticalSection
FlushFileBuffers
LockResource
SizeofResource
LoadResource
FindResourceW
GetFileAttributesW
OpenProcess
InterlockedIncrement
SetEndOfFile
GetCurrentProcessId
SetDllDirectoryW
EnterCriticalSection
GetCurrentDirectoryW
WideCharToMultiByte
FreeLibrary
LoadLibraryW
InterlockedDecrement
SetFilePointer
SetErrorMode
LoadLibraryExW
VirtualLock
SetFileAttributesW
GetFileAttributesExW
GetTickCount
GetFileType
VirtualAlloc
VirtualFree
ResumeThread
SetThreadAffinityMask
CreateEventW
SetEvent
ResetEvent
CreateSemaphoreW
ReleaseSemaphore
IsProcessorFeaturePresent
LocalAlloc
InterlockedExchange
LoadLibraryA
RaiseException
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExW
ExitProcess
DecodePointer
EncodePointer
RtlUnwind
ExitThread
CreateThread
GetSystemTimeAsFileTime
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsDebuggerPresent
TerminateProcess
GetStringTypeW
HeapReAlloc
GetFullPathNameW
GetFileInformationByHandle
PeekNamedPipe
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
SetHandleCount
LCMapStringW
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
lstrlenA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ