Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
10Static
static
1007c8ad2195...f7.exe
windows7-x64
107c8ad2195...f7.exe
windows10-2004-x64
108e33db082...36.exe
windows7-x64
1008e33db082...36.exe
windows10-2004-x64
100ca5581683...e8.dll
windows7-x64
10ca5581683...e8.dll
windows10-2004-x64
11cbc53c799...2e.dll
windows7-x64
11cbc53c799...2e.dll
windows10-2004-x64
131793ff8cd...49.exe
windows7-x64
131793ff8cd...49.exe
windows10-2004-x64
1Behavioral task
behavioral1
Sample
07c8ad2195949e03142d49ed59e851c2f7b9823eab51b3ec232f75ef866d01f7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
07c8ad2195949e03142d49ed59e851c2f7b9823eab51b3ec232f75ef866d01f7.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
0ca5581683ce097e382c9bf177c33508110e79985b5332eadd3d806e2a8302e8.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
0ca5581683ce097e382c9bf177c33508110e79985b5332eadd3d806e2a8302e8.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
1cbc53c7993f35b97dd450f01b0e972016fdbeff1aa2c2674235dd931fdda12e.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
1cbc53c7993f35b97dd450f01b0e972016fdbeff1aa2c2674235dd931fdda12e.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
31793ff8cdff66c5eb829ff1637d12b7afebd5fc95794946baccb6e96bf54649.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
31793ff8cdff66c5eb829ff1637d12b7afebd5fc95794946baccb6e96bf54649.exe
Resource
win10v2004-20230915-en
Target
mkpub_part_a.zip
Size
756KB
MD5
9a7c1989736fbff2c7b7320e33ebc4a3
SHA1
aa129c50b5cc73545044db9783dfcaae51a6177a
SHA256
ce9c6915ead719b2079c1e9092e9162e69730ba51ca1e6da1f9cfa69ec48c377
SHA512
5da884bd2c747e7e0ac9cb75398d7a9dad8be9d6de7292d7523d181dd350da57f806e46255cc3ee9b6d09fd76d9d3a96a87285daa850c83f1deaa44526d3d090
SSDEEP
12288:S7LcD2Lk58wQxPd9UDsojqQnFvuS2FtJ6kUP72pE+r5YYNJA2xV4Iej7kphGSsg:d6Lkuj5EsUuTFtJ4PiSEvJkHkRsg
amadey
3.89
http://77.91.124.1/theme/index.php
fefffe8cea
explothe.exe
36a96139c1118a354edf72b1080d4b2f
Checks for missing Authenticode signature.
resource |
---|
unpack001/08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236.bin |
unpack001/0ca5581683ce097e382c9bf177c33508110e79985b5332eadd3d806e2a8302e8.bin |
unpack001/1cbc53c7993f35b97dd450f01b0e972016fdbeff1aa2c2674235dd931fdda12e.bin |
unpack001/31793ff8cdff66c5eb829ff1637d12b7afebd5fc95794946baccb6e96bf54649.bin |
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
?Windows8_1@QOperatingSystemVersion@@2V1@B
?compare@QOperatingSystemVersion@@CAHAEBV1@0@Z
?current@QOperatingSystemVersion@@SA?AV1@XZ
?setFileName@QLibrary@@QEAAXAEBVQString@@@Z
?load@QLibrary@@QEAA_NXZ
??0QCoreApplication@@QEAA@AEAHPEAPEADH@Z
??1QLibrary@@UEAA@XZ
??0QLibrary@@QEAA@PEAVQObject@@@Z
??1QString@@QEAA@XZ
?qErrnoWarning@@YAXHPEBDZZ
?warning@QMessageLogger@@QEBAXPEBDZZ
??0QMessageLogger@@QEAA@PEBDH0@Z
??1QCoreApplication@@UEAA@XZ
?resolve@QLibrary@@QEAAP6AXXZPEBD@Z
EventWriteTransfer
EventUnregister
EventRegister
RegQueryValueExW
GetTokenInformation
SetTokenInformation
SetEntriesInAclW
GetSecurityInfo
SetSecurityInfo
AccessCheck
EqualSid
FreeSid
GetAce
ImpersonateLoggedOnUser
IsValidSid
MapGenericMask
RevertToSelf
GetNamedSecurityInfoW
OpenProcessToken
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
LookupPrivilegeValueW
GetKernelObjectSecurity
GetLengthSid
GetSecurityDescriptorSacl
SetKernelObjectSecurity
ConvertSidToStringSidW
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SystemFunction036
CopySid
CreateWellKnownSid
GetSidSubAuthority
InitializeSid
CreateProcessAsUserW
SetThreadToken
RegCloseKey
RegDisablePredefinedCache
RegOpenKeyExW
RegCreateKeyExW
GetProcessWindowStation
SetProcessWindowStation
CreateWindowStationW
GetThreadDesktop
CreateDesktopW
CloseWindowStation
CloseDesktop
GetUserObjectInformationW
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
CloseHandle
GetLastError
GetCurrentProcessId
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetLastError
LocalFree
GetModuleHandleW
GetProcAddress
DuplicateHandle
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetEvent
ResetEvent
WaitForSingleObject
CreateEventW
GetCurrentProcess
CreateThread
GetCurrentThreadId
TerminateJobObject
SetInformationJobObject
RegisterWaitForSingleObject
UnregisterWait
SetHandleInformation
GetCurrentThread
GetProcessHandleCount
GetCurrentProcessorNumber
VirtualFree
GetModuleHandleA
SetThreadAffinityMask
GetProcessHeaps
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
LoadLibraryW
CreateJobObjectW
AssignProcessToJobObject
CreateNamedPipeW
DebugBreak
lstrlenW
HeapSetInformation
ReleaseSRWLockExclusive
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
SearchPathW
GetCurrentDirectoryW
GetThreadId
CreateRemoteThread
CreateProcessW
ProcessIdToSessionId
GetFileType
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SignalObjectAndWait
CreateMutexW
TerminateProcess
FreeLibrary
HeapDestroy
GetTickCount
GetUserDefaultLangID
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
UnregisterWaitEx
CreateFileW
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
ReadProcessMemory
VirtualFreeEx
GetThreadPriority
InitializeCriticalSectionAndSpinCount
RtlVirtualUnwind
InitOnceExecuteOnce
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
GetVersionExW
GetNativeSystemInfo
GetProductInfo
IsWow64Process
WriteFile
OutputDebugStringA
GetLocalTime
GetModuleFileNameW
FormatMessageA
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
VirtualQuery
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryThreadCycleTime
SetThreadPriority
ExpandEnvironmentStringsW
GetCommandLineW
LoadLibraryExW
TlsGetValue
GetProcessTimes
RaiseException
SetCurrentDirectoryW
IsDebuggerPresent
SwitchToThread
K32QueryWorkingSetEx
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
TlsAlloc
TlsSetValue
TlsFree
Sleep
CoTaskMemFree
?staticSandboxInterfaceInfo@QtWebEngineCore@@YAPEAUSandboxInterfaceInfo@sandbox@@PEAU23@@Z
?processMain@QtWebEngineCore@@YAHHPEAPEBD@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?tellp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z
?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?width@ios_base@std@@QEAA_J_J@Z
?width@ios_base@std@@QEBA_JXZ
?flags@ios_base@std@@QEBAHXZ
?good@ios_base@std@@QEBA_NXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
memcmp
__std_exception_destroy
_CxxThrowException
memmove
memchr
__std_exception_copy
__C_specific_handler
_purecall
__CxxFrameHandler3
memset
__std_terminate
strchr
strstr
memcpy
free
_set_new_mode
realloc
malloc
_callnewh
_set_app_type
_cexit
_get_narrow_winmain_command_line
_initterm
_invalid_parameter_noinfo_noreturn
_initterm_e
_errno
_seh_filter_exe
exit
_c_exit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_register_thread_local_exe_atexit_callback
_exit
_initialize_narrow_environment
_configure_narrow_argv
abort
terminate
wcscmp
_wcsdup
_wcsicmp
isxdigit
_wcsnicmp
__p__commode
_set_fmode
fwrite
fflush
__acrt_iob_func
__stdio_common_vsnprintf_s
__stdio_common_vsprintf
__stdio_common_vswprintf
__stdio_common_vsnwprintf_s
__stdio_common_vsscanf
round
exp
log
ceil
_dtest
floor
__setusermatherr
getenv
_configthreadlocale
CommandLineToArgvW
timeGetTime
GetHandleVerifier
IsSandboxedProcess
TargetConfigureOPMProtectedOutput
TargetConfigureOPMProtectedOutput64
TargetCreateNamedPipeW
TargetCreateNamedPipeW64
TargetCreateOPMProtectedOutputs
TargetCreateOPMProtectedOutputs64
TargetCreateProcessA
TargetCreateProcessA64
TargetCreateProcessW
TargetCreateProcessW64
TargetCreateThread
TargetCreateThread64
TargetDestroyOPMProtectedOutput
TargetDestroyOPMProtectedOutput64
TargetEnumDisplayDevicesA
TargetEnumDisplayDevicesA64
TargetEnumDisplayMonitors
TargetEnumDisplayMonitors64
TargetGdiDllInitialize
TargetGdiDllInitialize64
TargetGetCertificate
TargetGetCertificate64
TargetGetCertificateByHandle
TargetGetCertificateByHandle64
TargetGetCertificateSize
TargetGetCertificateSize64
TargetGetCertificateSizeByHandle
TargetGetCertificateSizeByHandle64
TargetGetMonitorInfoA
TargetGetMonitorInfoA64
TargetGetMonitorInfoW
TargetGetMonitorInfoW64
TargetGetOPMInformation
TargetGetOPMInformation64
TargetGetOPMRandomNumber
TargetGetOPMRandomNumber64
TargetGetStockObject
TargetGetStockObject64
TargetGetSuggestedOPMProtectedOutputArraySize
TargetGetSuggestedOPMProtectedOutputArraySize64
TargetNtCreateEvent
TargetNtCreateEvent64
TargetNtCreateFile
TargetNtCreateFile64
TargetNtCreateKey
TargetNtCreateKey64
TargetNtCreateSection
TargetNtCreateSection64
TargetNtMapViewOfSection
TargetNtMapViewOfSection64
TargetNtOpenEvent
TargetNtOpenEvent64
TargetNtOpenFile
TargetNtOpenFile64
TargetNtOpenKey
TargetNtOpenKey64
TargetNtOpenKeyEx
TargetNtOpenKeyEx64
TargetNtOpenProcess
TargetNtOpenProcess64
TargetNtOpenProcessToken
TargetNtOpenProcessToken64
TargetNtOpenProcessTokenEx
TargetNtOpenProcessTokenEx64
TargetNtOpenThread
TargetNtOpenThread64
TargetNtOpenThreadToken
TargetNtOpenThreadToken64
TargetNtOpenThreadTokenEx
TargetNtOpenThreadTokenEx64
TargetNtQueryAttributesFile
TargetNtQueryAttributesFile64
TargetNtQueryFullAttributesFile
TargetNtQueryFullAttributesFile64
TargetNtSetInformationFile
TargetNtSetInformationFile64
TargetNtSetInformationThread
TargetNtSetInformationThread64
TargetNtUnmapViewOfSection
TargetNtUnmapViewOfSection64
TargetRegisterClassW
TargetRegisterClassW64
TargetSetOPMSigningKeyAndSequenceNumbers
TargetSetOPMSigningKeyAndSequenceNumbers64
g_handles_to_close
g_interceptions
g_nt
g_originals
g_shared_IPC_size
g_shared_delayed_integrity_level
g_shared_delayed_mitigations
g_shared_policy_size
g_shared_section
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
CloseHandle
GetSystemInfo
CreateThread
GetThreadContext
GetProcAddress
VirtualAllocEx
RemoveDirectoryA
GetFileAttributesA
CreateProcessA
CreateDirectoryA
SetThreadContext
WriteConsoleW
ReadConsoleW
SetEndOfFile
HeapReAlloc
HeapSize
GetLastError
CopyFileA
GetTempPathA
Sleep
GetModuleHandleA
SetCurrentDirectoryA
ResumeThread
GetComputerNameExW
GetVersionExW
CreateMutexA
VirtualAlloc
WriteFile
VirtualFree
WriteProcessMemory
GetModuleFileNameA
ReadProcessMemory
ReadFile
SetFilePointerEx
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
DeleteFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RaiseException
SetLastError
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
MultiByteToWideChar
CompareStringW
LCMapStringW
DecodePointer
RegCloseKey
RegQueryValueExA
GetSidSubAuthorityCount
GetSidSubAuthority
GetUserNameA
LookupAccountNameA
RegSetValueExA
RegOpenKeyExA
GetSidIdentifierAuthority
ShellExecuteA
ord680
SHGetFolderPathA
HttpOpenRequestA
InternetReadFile
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
InternetOpenW
InternetOpenUrlA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
_CorDllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ