Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
10Static
static
3Media-Play...89.exe
windows7-x64
3Media-Play...89.exe
windows10-2004-x64
5Empire of dicks.exe
windows7-x64
1Empire of dicks.exe
windows10-2004-x64
102903faf44...7b.exe
windows7-x64
1002903faf44...7b.exe
windows10-2004-x64
10073731fa5a...56.exe
windows7-x64
10073731fa5a...56.exe
windows10-2004-x64
10172c26f891...27.exe
windows7-x64
1172c26f891...27.exe
windows10-2004-x64
101b59b0fa61...12.ps1
windows7-x64
11b59b0fa61...12.ps1
windows10-2004-x64
11d801e2756...cf.exe
windows7-x64
71d801e2756...cf.exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
Media-Player_160889.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Media-Player_160889.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Empire of dicks.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Empire of dicks.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
02903faf446ed43d79a8509e7743b41eab9605cfb48261bb2105176c3d4a877b.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
02903faf446ed43d79a8509e7743b41eab9605cfb48261bb2105176c3d4a877b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
172c26f8914c92702cdbe134bf65280a1381a91e869f7eac0e62f7527.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
172c26f8914c92702cdbe134bf65280a1381a91e869f7eac0e62f7527.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
1b59b0fa612e7c3d9ce272143058be6815b4ec563dfd7e1782657fe7c2f23812.ps1
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
1b59b0fa612e7c3d9ce272143058be6815b4ec563dfd7e1782657fe7c2f23812.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
1d801e2756c864d01cd456f68752a86c52981576839625759ae9e400f0d2a2cf.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
1d801e2756c864d01cd456f68752a86c52981576839625759ae9e400f0d2a2cf.exe
Resource
win10v2004-20231215-en
Target
Malware-Database-main (1).zip
Size
96.5MB
MD5
51305dd56975d19b89383f89cd0c345d
SHA1
c5f19481cefa5f79e04a289e451bdc20f3dc164c
SHA256
cd76a354a02015517a2b50d75aa3b68dd0e3164adbb040f6317251016bc62b21
SHA512
cfd62d333665ca237668504a219a0b1a137ed1ddca18299feb371b53afcc0d681259865e0b643edb6f031b8cb9f036b41d82e60ec8359eb7e48a1887a4137b52
SSDEEP
1572864:EUUx1ZUzfiNuLKno6PwohFZPKbtr3aLS6I2Mzv7c6uNhGQvbz6Km7xWf5l:EU+1KzQu+wsvP2t8JFwjc6ERPgW/
resource | yara_rule |
---|---|
static1/unpack008/1d801e2756c864d01cd456f68752a86c52981576839625759ae9e400f0d2a2cf.exe | pyinstaller |
Checks for missing Authenticode signature.
resource |
---|
unpack003/Empire of dicks.exe |
unpack005/073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe |
unpack006/172c26f8914c92702cdbe134bf65280a1381a91e869f7eac0e62f7527.exe |
unpack008/1d801e2756c864d01cd456f68752a86c52981576839625759ae9e400f0d2a2cf.exe |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTextFaceW
GetRegionData
CreateRectRgn
SetTextColor
DeleteObject
SetWorldTransform
GetCharABCWidthsI
SetGraphicsMode
GetTextMetricsW
CreateCompatibleDC
CreateDIBSection
GetCharABCWidthsW
CreateBitmap
RemoveFontMemResourceEx
CreateFontIndirectW
GetStockObject
SelectObject
DeleteDC
GetCharABCWidthsFloatW
SetTextAlign
AddFontMemResourceEx
EnumFontFamiliesExW
GetObjectW
CreateDCW
OffsetRgn
GetDeviceCaps
SelectClipRgn
GetDIBits
GetTextExtentPoint32W
GetFontData
GdiFlush
SetBkMode
CreateCompatibleBitmap
GetOutlineTextMetricsW
ExtTextOutW
GetGlyphOutlineW
CombineRgn
RemoveFontResourceExW
AddFontResourceExW
BitBlt
SystemTimeToVariantTime
VariantChangeType
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocString
ImmReleaseContext
ImmNotifyIME
ImmGetCompositionStringW
ImmSetCompositionWindow
ImmGetDefaultIMEWnd
ImmSetCandidateWindow
ImmGetContext
PlaySoundW
SetFileAttributesW
GetUserDefaultLangID
MapViewOfFile
SetFilePointerEx
CopyFileW
FindFirstFileExW
WriteConsoleW
FormatMessageW
MultiByteToWideChar
GetDateFormatW
DuplicateHandle
SetThreadPriority
GetDateFormatA
SleepEx
OutputDebugStringA
GetFileType
PeekNamedPipe
CompareStringW
GetSystemTime
SystemTimeToTzSpecificLocalTime
GetStringTypeW
GetLocaleInfoW
GetThreadPriority
FreeEnvironmentStringsW
GetEnvironmentStringsW
lstrlenA
TerminateProcess
InterlockedIncrement
GetTimeFormatA
GetFileAttributesExW
WriteFile
Sleep
OpenProcess
TlsSetValue
FreeLibrary
GetDriveTypeW
GetCurrentDirectoryW
GetModuleFileNameA
GlobalUnlock
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
ReleaseMutex
UnhandledExceptionFilter
GetVersionExW
CheckRemoteDebuggerPresent
GetCPInfo
InitializeCriticalSectionAndSpinCount
IsValidLocale
lstrcmpW
GetACP
LoadLibraryW
GetModuleHandleA
GetLongPathNameW
GetUserGeoID
GlobalLock
DeleteFileA
CreateSemaphoreW
MoveFileExW
GetFileAttributesW
GetCommandLineW
SetErrorMode
HeapFree
DeleteCriticalSection
VirtualQuery
GetProcessHeap
GetCurrentThreadId
LeaveCriticalSection
IsValidLanguageGroup
EncodePointer
GetCurrentThread
InterlockedDecrement
FindClose
GetFileSize
SetHandleCount
TlsFree
SetEvent
FindNextFileW
GetModuleHandleW
HeapCreate
GetCurrentProcessId
DecodePointer
CreateThread
GetTempPathW
FindFirstFileW
GetSystemDirectoryW
FileTimeToLocalFileTime
GetCurrencyFormatW
GetGeoInfoW
RtlUnwind
SetLastError
GlobalSize
GetSystemInfo
FileTimeToSystemTime
EnumSystemLocalesA
GetTickCount64
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
LCMapStringW
GetUserDefaultLCID
OpenFileMappingW
ExitProcess
GetConsoleCP
GetLogicalDrives
ExpandEnvironmentStringsW
WaitForSingleObject
LocalFree
SetEndOfFile
HeapAlloc
OutputDebugStringW
GetFileSizeEx
VirtualFree
GetProcAddress
SetEnvironmentVariableA
GetConsoleMode
GetStartupInfoW
DeleteFileW
IsValidCodePage
DeviceIoControl
WaitForMultipleObjects
IsProcessorFeaturePresent
GetTickCount
GetFileInformationByHandle
SetFilePointer
HeapReAlloc
QueryPerformanceFrequency
HeapSize
GetVolumeInformationW
CreateProcessW
GetCurrentProcess
GlobalAlloc
GetLastError
GetConsoleWindow
GetOEMCP
LoadLibraryA
SetUnhandledExceptionFilter
TlsAlloc
ExitThread
CreateFileA
VerSetConditionMask
GetUserDefaultUILanguage
EnterCriticalSection
CloseHandle
CreateFileW
ReleaseSemaphore
CreateMutexW
ResetEvent
CreateFileMappingW
WideCharToMultiByte
GetTimeFormatW
GetLocaleInfoA
ResumeThread
CreateEventW
GetSystemTimeAsFileTime
TerminateThread
GetCommandLineA
GetTimeZoneInformation
TlsGetValue
InterlockedExchange
GetLocalTime
FlushFileBuffers
GetEnvironmentVariableA
VerifyVersionInfoW
RaiseException
HeapSetInformation
ReadFile
SetStdHandle
GetStdHandle
UnmapViewOfFile
MoveFileW
InitializeCriticalSection
TrackMouseEvent
InvalidateRect
CreateWindowExW
MessageBeep
GetWindowPlacement
SystemParametersInfoW
NotifyWinEvent
SetCursor
GetSysColor
GetWindowTextW
GetClassInfoW
ChangeClipboardChain
RegisterWindowMessageW
ScreenToClient
PeekMessageW
ReleaseDC
SetTimer
GetClipboardFormatNameW
EnumDisplayMonitors
GetUpdateRect
GetCursorInfo
DestroyIcon
IsIconic
GetKeyboardState
GetWindowLongW
PostMessageW
MoveWindow
SetWindowPos
SetClipboardViewer
GetDoubleClickTime
CharNextExA
GetFocus
GetSystemMenu
RegisterClassExW
SetWindowLongW
IsChild
GetCapture
GetAncestor
GetMonitorInfoW
GetSystemMetrics
EnumWindows
SetWindowsHookExW
SetCursorPos
GetParent
FlashWindowEx
ClientToScreen
ReleaseCapture
GetMenu
RealGetWindowClassW
CallNextHookEx
GetClientRect
IsWindowVisible
CreateIconIndirect
SetForegroundWindow
DestroyWindow
GetDC
EnableMenuItem
IsZoomed
MessageBoxW
SetFocus
CreateCursor
LoadImageW
GetForegroundWindow
GetIconInfo
EndPaint
DispatchMessageW
UnhookWindowsHookEx
SetWindowTextW
BeginPaint
AdjustWindowRectEx
GetSysColorBrush
TrackPopupMenuEx
HideCaret
GetAsyncKeyState
GetWindowRect
CreateCaret
TranslateMessage
MapVirtualKeyW
SetCaretPos
UnregisterClassW
GetQueueStatus
ToAscii
DrawIconEx
KillTimer
ToUnicode
SetMenuItemInfoW
LoadIconW
GetCursorPos
GetWindowThreadProcessId
SendMessageW
GetCaretBlinkTime
DestroyCursor
SetCapture
MsgWaitForMultipleObjectsEx
GetKeyState
GetKeyboardLayoutList
RegisterClassW
GetMessageExtraInfo
SetWindowRgn
ShowWindow
RegisterClipboardFormatW
SetParent
DestroyCaret
DefWindowProcW
ChildWindowFromPointEx
GetDesktopWindow
SHGetPathFromIDListW
SHGetFileInfoW
SHGetMalloc
SHBrowseForFolderW
SHGetSpecialFolderPathW
ShellExecuteW
OleFlushClipboard
CoTaskMemAlloc
DoDragDrop
ReleaseStgMedium
OleIsCurrentClipboard
CoLockObjectExternal
RegisterDragDrop
CoTaskMemFree
OleSetClipboard
CoGetMalloc
CoCreateGuid
OleInitialize
CoInitialize
CoUninitialize
RevokeDragDrop
OleUninitialize
CoCreateInstance
OleGetClipboard
RegQueryValueExW
CryptAcquireContextW
RegEnumValueW
CryptGetHashParam
CryptEncrypt
GetLengthSid
RegQueryInfoKeyW
CryptReleaseContext
RegSetValueExW
RegOpenKeyExW
CryptDestroyKey
FreeSid
RegCreateKeyExW
CryptHashData
RegDeleteValueW
RegEnumKeyExW
RegCloseKey
CryptImportKey
CryptDestroyHash
CopySid
CryptGenRandom
GetTokenInformation
CryptCreateHash
RegDeleteKeyW
OpenProcessToken
RegFlushKey
htons
getsockopt
getpeername
socket
connect
WSASetLastError
WSAEnumNetworkEvents
bind
accept
listen
htonl
sendto
recvfrom
select
__WSAFDIsSet
ioctlsocket
gethostname
ntohs
getsockname
setsockopt
freeaddrinfo
recv
WSACloseEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
getaddrinfo
WSACreateEvent
WSAStartup
WSACleanup
WSAGetLastError
send
closesocket
WSAAsyncSelect
WSAIoctl
CertCloseStore
CertFindCertificateInStore
CertAddCertificateContextToStore
CertCreateCertificateChainEngine
CryptDecodeObjectEx
CertOpenStore
CertFindExtension
CertFreeCertificateChain
CertGetCertificateChain
CertEnumCertificatesInStore
CryptStringToBinaryW
CertFreeCertificateChainEngine
CertFreeCertificateContext
PFXImportCertStore
CryptQueryObject
ord117
ord216
ord73
ord301
ord167
ord79
ord142
ord46
ord27
ord127
ord147
ord133
ord26
ord208
ord145
ord219
ord14
ord41
z_adler32
z_adler32_combine
z_adler32_combine64
z_compress
z_compress2
z_compressBound
z_crc32
z_crc32_combine
z_crc32_combine64
z_deflate
z_deflateBound
z_deflateCopy
z_deflateEnd
z_deflateInit2_
z_deflateInit_
z_deflateParams
z_deflatePrime
z_deflateReset
z_deflateSetDictionary
z_deflateSetHeader
z_deflateTune
z_get_crc_table
z_inflate
z_inflateCopy
z_inflateEnd
z_inflateGetHeader
z_inflateInit2_
z_inflateInit_
z_inflateMark
z_inflatePrime
z_inflateReset
z_inflateReset2
z_inflateSetDictionary
z_inflateSync
z_inflateSyncPoint
z_inflateUndermine
z_uncompress
z_zError
z_zlibCompileFlags
z_zlibVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\Dinaco\source\repos\Empire of dicks\Empire of dicks\obj\Release\Empire of dicks.pdb
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeConsole
InitializeCriticalSection
GetLocaleInfoA
GetModuleHandleA
HeapSize
GetProcAddress
GetCommandLineA
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDlgItemTextA
SendMessageA
GetCursorPos
TrackPopupMenu
ClientToScreen
DestroyMenu
CreatePopupMenu
AppendMenuA
SendDlgItemMessageA
GetDlgItem
GetObjectW
SetDCPenColor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrlenA
LocalAlloc
CheckRemoteDebuggerPresent
CreateFileW
GetProcAddress
LoadLibraryA
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
LoadLibraryA
FreeLibrary
GetTickCount
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
LocalAlloc
LocalFree
GetProcAddress
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
WriteConsoleW
SetStdHandle
IsProcessorFeaturePresent
DecodePointer
GetCommandLineA
RaiseException
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringW
GetStringTypeW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapSize
WriteFile
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
DestroyWindow
CharUpperBuffW
GetObjectW
CoDecodeProxy
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateWindowExW
MessageBoxW
MessageBoxA
SystemParametersInfoW
DestroyIcon
SetWindowLongPtrW
GetWindowLongPtrW
GetClientRect
InvalidateRect
ReleaseDC
GetDC
DrawTextW
GetDialogBaseUnits
EndDialog
DialogBoxIndirectParamW
MoveWindow
SendMessageW
ord380
GetStringTypeW
GetFileAttributesExW
HeapReAlloc
FlushFileBuffers
GetCurrentDirectoryW
IsValidCodePage
GetACP
GetModuleHandleW
MulDiv
GetLastError
SetDllDirectoryW
GetModuleFileNameW
GetProcAddress
GetCommandLineW
GetEnvironmentVariableW
GetOEMCP
ExpandEnvironmentStringsW
CreateDirectoryW
GetTempPathW
WaitForSingleObject
Sleep
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
FreeLibrary
LoadLibraryExW
SetConsoleCtrlHandler
FindClose
FindFirstFileExW
CloseHandle
GetCurrentProcess
LocalFree
FormatMessageW
MultiByteToWideChar
WideCharToMultiByte
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetTimeZoneInformation
HeapSize
WriteConsoleW
SetEnvironmentVariableW
RtlUnwindEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
SetEndOfFile
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
RaiseException
RtlPcToFileHeader
GetCommandLineA
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFullPathNameW
RemoveDirectoryW
FindNextFileW
SetStdHandle
DeleteFileW
ReadFile
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
HeapFree
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleOutputCP
GetFileSizeEx
HeapAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
SelectObject
DeleteObject
CreateFontIndirectW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ