Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Target
safehmpg64.dll
Size
244KB
MD5
50034ef8c42bce4228644a65c86dd360
SHA1
90e82ee94129c13165b5186545721cfc36e9cce1
SHA256
13834e68224e65b8e57f030d044cd194056b068c0a5120331c2eda201bf50483
SHA512
87e4395651c72d92332e421cfe24964f416199a3db15046e98ba4944b8a3f997c6ceca0a9190eec474f12db42df874f35f8b511c0a02ff4a8af1bce159a7eb93
SSDEEP
6144:aJT26cVQrx/vRLcVvHvcTneFUDMGELGcd:Y2vVu/ZLoCDMtSs
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetThreadContext
ResumeThread
Sleep
CreateToolhelp32Snapshot
GetCurrentProcessId
Thread32First
GetCurrentThreadId
Thread32Next
IsBadReadPtr
VirtualProtect
FlushInstructionCache
GetCurrentProcess
lstrcmpiA
GetSystemDirectoryW
GetModuleHandleW
GetProcAddress
TlsSetValue
GetTickCount
TlsGetValue
LocalFree
GetSystemInfo
GetVersionExW
CreateRemoteThread
WaitForSingleObject
TlsAlloc
lstrcpyA
MultiByteToWideChar
CreateFileMappingW
MapViewOfFile
lstrcmpiW
GetPrivateProfileIntW
SuspendThread
CreateEventW
WaitForMultipleObjects
SetEvent
SetLastError
RaiseException
GetModuleHandleA
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
HeapDestroy
OpenThread
IsDebuggerPresent
WideCharToMultiByte
LeaveCriticalSection
GetModuleFileNameW
EnterCriticalSection
CloseHandle
ReadFile
GetFileSize
CreateFileW
lstrlenW
DeleteCriticalSection
GetPrivateProfileSectionW
InitializeCriticalSection
HeapCreate
HeapSetInformation
GetLocaleInfoW
GetModuleFileNameA
GetStdHandle
SetThreadContext
VirtualQuery
WriteFile
ExitProcess
HeapSize
FlsAlloc
FlsFree
FlsGetValue
DecodePointer
EncodePointer
GetCPInfo
LCMapStringW
LCMapStringA
RtlPcToFileHeader
RtlUnwindEx
GetCommandLineA
FlsSetValue
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetLastError
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
GetProcessHeap
HeapAlloc
FlushFileBuffers
CreateFileA
HeapFree
InterlockedPushEntrySList
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
EndDialog
DialogBoxParamW
SendMessageW
UnregisterClassA
TranslateMessage
GetMessageW
PeekMessageW
CreateWindowExW
RegisterClassW
DefWindowProcW
DestroyWindow
PostMessageW
SetTimer
SetWindowPos
SendMessageTimeoutW
FindWindowW
UnhookWindowsHookEx
SetWindowsHookExW
CallNextHookEx
SetWindowLongPtrW
GetWindowLongPtrW
CallWindowProcW
SendMessageA
FindWindowExA
EnumWindows
GetShellWindow
IsWindow
FindWindowExW
GetClassNameW
LoadStringW
DispatchMessageW
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
InitializeSecurityDescriptor
LookupAccountNameW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
SetSecurityInfo
CommandLineToArgvW
SHGetSpecialFolderPathW
ord701
CoCreateInstance
CoInitialize
CoUninitialize
PathUnquoteSpacesW
PathRemoveFileSpecW
SHGetValueW
PathFileExistsW
PathAppendW
StrCmpIW
StrCmpNIW
StrStrW
PathCombineW
PathFindExtensionW
PathIsDirectoryW
PathMatchSpecW
StrStrIW
wnsprintfW
PathFindFileNameW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
NetApiBufferFree
NetWkstaUserGetInfo
ImageNtHeader
ImageDirectoryEntryToDataEx
SafehmpgHelper
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ