- Specify -tu to query the user store (the machine store is the default option).
- Combine with '-v' to Sigcheck to download Microsoft trusted root certificate list, and export only valid certificates that cannot be rooted in a certificate in that list. If the website cannot be accessed, authrootstl.cab or authroot.stl in the current directory is used instead (if available). -u If VirusTotal's checking feature is enabled, files that VirusTotal does not identify or detect non-zero (containing other digits) will be displayed, otherwise it will only display files signed only. -v [rs] - VirusTotal query (www.virustotal.com) for hash-based malware.
- Add 'r' to open the report for detected files that are non-zero.
- Files that are reported to have not been scanned before will be uploaded to VirusTotal, if the 's' option is specified. Note that it takes 5 minutes or more to get the scan results. -vt Before using VirusTotal features, users must accept VirusTotal's terms of service. Visit https://www.virustotal.com/en/about/terms-of-service/ for more details. If you do not accept the terms and ignore this option, the user will see a warning message appear.
One way to use this tool is to check the unsigned files in the WindowsSystem32 directories with this command:
sigcheck -u -ec:windowssystem32
Users should check any unsigned files.
Sigcheck tool runs on:
Download Sigcheck.
Please refer to the article: The software's Certificate Checker is safe for more details on how to use Sigcheck.
See more: