Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
10Static
static
10appconsole.exe
windows7_x64
10appconsole.exe
windows10-2004_x64
10azorult.exe
windows7_x64
10azorult.exe
windows10-2004_x64
10clipper.exe
windows7_x64
1clipper.exe
windows10-2004_x64
1jester_stealer.exe
windows7_x64
10jester_stealer.exe
windows10-2004_x64
10lokibot.exe
windows7_x64
10lokibot.exe
windows10-2004_x64
10pony.exe
windows7_x64
10pony.exe
windows10-2004_x64
10raccoon.exe
windows7_x64
10raccoon.exe
windows10-2004_x64
10redline.exe
windows7_x64
10redline.exe
windows10-2004_x64
10tesla.exe
windows7_x64
10tesla.exe
windows10-2004_x64
10vidar.xll
windows7_x64
7vidar.xll
windows10-2004_x64
10Static task
static1
Behavioral task
behavioral1
Sample
appconsole.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
appconsole.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
azorult.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
azorult.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
clipper.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
clipper.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
jester_stealer.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
jester_stealer.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
lokibot.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
lokibot.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
pony.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
pony.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
raccoon.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
raccoon.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
redline.exe
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
redline.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
tesla.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
tesla.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
vidar.xll
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
vidar.xll
Resource
win10v2004-20220414-en
Target
samples.zip
Size
2.6MB
MD5
6b33fc7cc7e24b1fd6d79a32c1d5f00f
SHA1
4871a227931611944bfee752c98cf266e9b7b547
SHA256
5e4ad329433655e942706e02361b10c21caed15d46cf924a7ebe153932f105ae
SHA512
4644d2551a406da17f8708580422167e1ea69ebb48bdeda35545cfdf186b70906618a1a93853de72b8a1fceff79ed9215f1078fe01a2f541fbb0256e77499ce7
SSDEEP
49152:Ttw19AUY/5oAMPNOk8p5bxmoMohqYX+Ck3pYCftci9Na0QVEL:TtwTG5NrxhxX+CkeCWC
jester
monika_galager
http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/monika_galager
https://api.anonfiles.com/upload?token=d26d620842507144
c6b4a73b-035e-4027-8c9d-f30fcd7f128e
2389157FE6BD3ADCBC3E0EAEF2136325
lokibot
https://firenzelavori.lt/loki/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
pony
http://test.sanbux.ru/gate.php
http://test.sanbux.ru/path/gate.php
redline
@Solitarru
45.133.217.148:65255
Processes:
resource | yara_rule |
---|---|
static1/unpack001/redline | family_redline |
Processes:
resource | yara_rule |
---|---|
static1/unpack001/appconsole | family_stormkitty |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
getaddrinfo
freeaddrinfo
closesocket
WSAStartup
socket
send
recv
connect
GetProcessHeap
HeapFree
HeapAlloc
SetLastError
GetLastError
CoCreateInstance
CoInitialize
CoUninitialize
VariantInit
SysFreeString
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateFileA
ReadFile
CloseHandle
WriteFile
lstrlenA
GlobalLock
GlobalUnlock
LocalFree
LocalAlloc
GetTickCount
lstrcpyA
lstrcatA
GetFileAttributesA
ExpandEnvironmentStringsA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
LoadLibraryA
GetProcAddress
GetTempPathA
CreateDirectoryA
DeleteFileA
GetCurrentProcess
WideCharToMultiByte
GetLastError
lstrcmpA
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
FindFirstFileA
lstrcmpiA
FindNextFileA
FindClose
GetModuleHandleA
GetVersionExA
GetLocaleInfoA
GetSystemInfo
GetWindowsDirectoryA
GetPrivateProfileStringA
SetCurrentDirectoryA
GetPrivateProfileSectionNamesA
GetPrivateProfileIntA
GetCurrentDirectoryA
lstrlenW
MultiByteToWideChar
Sleep
LCMapStringA
ExitProcess
SetUnhandledExceptionFilter
CreateStreamOnHGlobal
GetHGlobalFromStream
CoCreateGuid
CoTaskMemFree
CoCreateInstance
OleInitialize
wsprintfA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
IsTextUnicode
RegOpenCurrentUser
RegEnumValueA
GetUserNameA
InternetCrackUrlA
InternetCreateUrlA
StrStrIA
StrRChrIA
StrToIntA
StrStrA
StrCmpNIA
StrStrIW
ObtainUserAgentString
inet_addr
gethostbyname
socket
connect
closesocket
send
select
recv
setsockopt
WSAStartup
LoadUserProfileA
UnloadUserProfile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=999047-0,CN=Millville Investments Inc.,O=Millville Investments Inc.,L=Montreal,ST=Quebec,C=CA,1.3.6.1.4.1.311.60.2.1.3=#13024341,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
GetEnvironmentStringsW
GetUserDefaultLCID
GetSystemDefaultLCID
ReadConsoleW
GetSystemWindowsDirectoryA
LeaveCriticalSection
VerifyVersionInfoA
WriteConsoleW
FindActCtxSectionGuid
GetACP
GetConsoleOutputCP
InterlockedExchange
GetProcAddress
EnterCriticalSection
PrepareTape
LocalAlloc
GetModuleFileNameA
SetConsoleTitleW
GetModuleHandleA
AddConsoleAliasA
FindActCtxSectionStringW
FindNextVolumeA
GetSystemTime
GetProfileSectionW
GetLocaleInfoA
PulseEvent
GetModuleFileNameW
GetCommandLineW
HeapAlloc
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapSize
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CreateFileA
RaiseException
SetStdHandle
FlushFileBuffers
WriteConsoleA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
ReadFile
GetCharWidthFloatW
BackupEventLogA
@GetAnotherVice@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetModuleHandleW
FindResourceW
LoadResource
LockResource
SizeofResource
SetLastError
GetCurrentProcessId
LocalFree
LocalAlloc
FormatMessageW
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
GetProcAddress
WriteFile
CloseHandle
DeleteFileW
GetFileAttributesW
GetLastError
ReadFile
MultiByteToWideChar
WriteConsoleW
FlushFileBuffers
FreeLibrary
LoadLibraryW
CreateFileW
lstrcpynW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
SetStdHandle
GetProcessHeap
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
InterlockedFlushSList
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
HeapFree
HeapAlloc
GetStringTypeW
GetACP
GetStdHandle
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetWindowThreadProcessId
EnumWindows
MessageBoxW
LoadStringW
RealGetWindowClassW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SafeArrayUnlock
SafeArrayLock
SafeArrayDestroy
SafeArrayCreateVector
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
SysAllocString
CalculationCanceled
CalculationEnded
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RegistrationInfo
SetExcel12EntryPt
SyncMacro
f0
f1
f10
f100
f1000
f1001
f1002
f1003
f1004
f1005
f1006
f1007
f1008
f1009
f101
f1010
f1011
f1012
f1013
f1014
f1015
f1016
f1017
f1018
f1019
f102
f1020
f1021
f1022
f1023
f1024
f1025
f1026
f1027
f1028
f1029
f103
f1030
f1031
f1032
f1033
f1034
f1035
f1036
f1037
f1038
f1039
f104
f1040
f1041
f1042
f1043
f1044
f1045
f1046
f1047
f1048
f1049
f105
f1050
f1051
f1052
f1053
f1054
f1055
f1056
f1057
f1058
f1059
f106
f1060
f1061
f1062
f1063
f1064
f1065
f1066
f1067
f1068
f1069
f107
f1070
f1071
f1072
f1073
f1074
f1075
f1076
f1077
f1078
f1079
f108
f1080
f1081
f1082
f1083
f1084
f1085
f1086
f1087
f1088
f1089
f109
f1090
f1091
f1092
f1093
f1094
f1095
f1096
f1097
f1098
f1099
f11
f110
f1100
f1101
f1102
f1103
f1104
f1105
f1106
f1107
f1108
f1109
f111
f1110
f1111
f1112
f1113
f1114
f1115
f1116
f1117
f1118
f1119
f112
f1120
f1121
f1122
f1123
f1124
f1125
f1126
f1127
f1128
f1129
f113
f1130
f1131
f1132
f1133
f1134
f1135
f1136
f1137
f1138
f1139
f114
f1140
f1141
f1142
f1143
f1144
f1145
f1146
f1147
f1148
f1149
f115
f1150
f1151
f1152
f1153
f1154
f1155
f1156
f1157
f1158
f1159
f116
f1160
f1161
f1162
f1163
f1164
f1165
f1166
f1167
f1168
f1169
f117
f1170
f1171
f1172
f1173
f1174
f1175
f1176
f1177
f1178
f1179
f118
f1180
f1181
f1182
f1183
f1184
f1185
f1186
f1187
f1188
f1189
f119
f1190
f1191
f1192
f1193
f1194
f1195
f1196
f1197
f1198
f1199
f12
f120
f1200
f1201
f1202
f1203
f1204
f1205
f1206
f1207
f1208
f1209
f121
f1210
f1211
f1212
f1213
f1214
f1215
f1216
f1217
f1218
f1219
f122
f1220
f1221
f1222
f1223
f1224
f1225
f1226
f1227
f1228
f1229
f123
f1230
f1231
f1232
f1233
f1234
f1235
f1236
f1237
f1238
f1239
f124
f1240
f1241
f1242
f1243
f1244
f1245
f1246
f1247
f1248
f1249
f125
f1250
f1251
f1252
f1253
f1254
f1255
f1256
f1257
f1258
f1259
f126
f1260
f1261
f1262
f1263
f1264
f1265
f1266
f1267
f1268
f1269
f127
f1270
f1271
f1272
f1273
f1274
f1275
f1276
f1277
f1278
f1279
f128
f1280
f1281
f1282
f1283
f1284
f1285
f1286
f1287
f1288
f1289
f129
f1290
f1291
f1292
f1293
f1294
f1295
f1296
f1297
f1298
f1299
f13
f130
f1300
f1301
f1302
f1303
f1304
f1305
f1306
f1307
f1308
f1309
f131
f1310
f1311
f1312
f1313
f1314
f1315
f1316
f1317
f1318
f1319
f132
f1320
f1321
f1322
f1323
f1324
f1325
f1326
f1327
f1328
f1329
f133
f1330
f1331
f1332
f1333
f1334
f1335
f1336
f1337
f1338
f1339
f134
f1340
f1341
f1342
f1343
f1344
f1345
f1346
f1347
f1348
f1349
f135
f1350
f1351
f1352
f1353
f1354
f1355
f1356
f1357
f1358
f1359
f136
f1360
f1361
f1362
f1363
f1364
f1365
f1366
f1367
f1368
f1369
f137
f1370
f1371
f1372
f1373
f1374
f1375
f1376
f1377
f1378
f1379
f138
f1380
f1381
f1382
f1383
f1384
f1385
f1386
f1387
f1388
f1389
f139
f1390
f1391
f1392
f1393
f1394
f1395
f1396
f1397
f1398
f1399
f14
f140
f1400
f1401
f1402
f1403
f1404
f1405
f1406
f1407
f1408
f1409
f141
f1410
f1411
f1412
f1413
f1414
f1415
f1416
f1417
f1418
f1419
f142
f1420
f1421
f1422
f1423
f1424
f1425
f1426
f1427
f1428
f1429
f143
f1430
f1431
f1432
f1433
f1434
f1435
f1436
f1437
f1438
f1439
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ