Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
main.7z
Resource
win10v2004-20240426-en
Target
main.7z
Size
15.7MB
MD5
d1379cdf0a168ee0a40657bb3e0f5209
SHA1
d368ebac0ba6a0078f936efeb1158730063909fa
SHA256
fda11b1f0ad7f7724b29c97b309e88274c3b0c831b47ea423edd4403db933c39
SHA512
50617ea1ea343be6c191df328741f3654d6c7d9590eaf7de33e4ba5ffd8dcf0c1faaa9c70822fc7f0d348fe0f8ea262ed34ca696774a2d6f1528b54f911e742f
SSDEEP
393216:hb8rFpcfE5dV2OaUG2yfP4QLe/Z1HLaDn8M8ogsOLia200:KrDc85paN2yY6e/vgkoXOLr27
resource | yara_rule |
---|---|
static1/unpack001/main/cheat.exe | themida |
static1/unpack001/main/loader.exe | themida |
static1/unpack002/map.exe | themida |
static1/unpack001/map/map.exe | themida |
Checks for missing Authenticode signature.
resource |
---|
unpack001/main/cheat.exe |
unpack001/main/loader.exe |
unpack002/map.exe |
unpack001/map/map.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\agent\_work\86\s\exe\Win32\Release\dbgview.pdb
connect
listen
inet_ntoa
htonl
getsockname
bind
accept
WSAGetLastError
WSAStartup
gethostbyname
gethostbyaddr
socket
inet_addr
htons
closesocket
WNetAddConnection2A
WNetCancelConnection2A
ord17
CreateToolbarEx
GetModuleFileNameA
GetCommandLineA
GetSystemDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
FindFirstFileA
SearchPathA
GetComputerNameA
QueryPerformanceCounter
QueryPerformanceFrequency
GetTimeFormatA
GetOverlappedResult
ResetEvent
WaitForMultipleObjects
WriteFile
ReadFile
LockResource
LoadResource
SizeofResource
FindResourceA
CreateFileA
RaiseException
GetTickCount
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
GetProcessHeap
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpyA
lstrcatA
GetDateFormatA
GlobalFree
GetFileSize
WriteFileEx
QueueUserAPC
SleepEx
ExpandEnvironmentStringsA
OutputDebugStringA
FlushFileBuffers
GetConsoleCP
CreateEventA
GetStringTypeW
CreateFileW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetACP
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
SetConsoleMode
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetConsoleMode
GetModuleHandleExW
ExitProcess
EncodePointer
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
RtlUnwind
InterlockedFlushSList
InterlockedPushEntrySList
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
OpenMutexA
CreateMutexA
lstrlenA
lstrcpynA
UnmapViewOfFile
FindFirstFileExW
MapViewOfFile
FormatMessageA
SystemTimeToFileTime
GetSystemTime
CloseHandle
FindClose
DeviceIoControl
WaitForSingleObject
SetEvent
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetLastError
TerminateThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GlobalMemoryStatus
GetVersion
FreeLibrary
InterlockedIncrement
DeleteFileA
GetEnvironmentVariableA
GetLastError
GetCommandLineW
CreateFileMappingA
GetModuleHandleA
LoadLibraryA
GetStdHandle
GetFileType
LocalFree
LocalAlloc
GetProcAddress
OutputDebugStringW
WaitForSingleObjectEx
FindFirstFileExA
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
SetConsoleCtrlHandler
WriteConsoleW
SetFilePointerEx
HeapSize
HeapReAlloc
SetEndOfFile
ReadConsoleW
DecodePointer
CloseClipboard
OpenClipboard
CallWindowProcA
GetParent
DrawFocusRect
GetDialogBaseUnits
IsDlgButtonChecked
CheckRadioButton
RegisterClassExA
GetMessageA
IsDialogMessageA
LoadStringA
LoadIconA
LoadBitmapA
SetClipboardData
GetSysColor
ChildWindowFromPoint
GetCursorPos
GetWindowRect
GetClientRect
GetWindowTextA
InvalidateRgn
InvalidateRect
ReleaseDC
SetForegroundWindow
UpdateWindow
TrackPopupMenu
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EmptyClipboard
GetFocus
EnableWindow
DrawTextA
BeginPaint
EndPaint
ClientToScreen
FindWindowA
DeleteMenu
SetWindowLongA
EnableMenuItem
GetSystemMetrics
TranslateAcceleratorA
LoadAcceleratorsA
KillTimer
SetTimer
MsgWaitForMultipleObjects
ReleaseCapture
SetCapture
SetFocus
SendDlgItemMessageA
GetDlgItemTextA
SetDlgItemTextA
DialogBoxParamA
CreateDialogParamA
IsZoomed
IsIconic
SetWindowPos
MoveWindow
ShowWindow
DestroyWindow
IsWindow
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
AttachThreadInput
PostMessageA
PeekMessageA
DispatchMessageA
TranslateMessage
RegisterWindowMessageA
MessageBoxA
InsertMenuItemA
GetMenuItemCount
GetSubMenu
CheckMenuItem
GetMenu
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
GetWindowThreadProcessId
ScreenToClient
AppendMenuA
CheckDlgButton
GetDC
AbortDoc
SetAbortProc
TextOutA
GetTextExtentPointA
CreateFontA
GetTextExtentPoint32A
ExtTextOutA
SetBkColor
GetObjectA
GetTextMetricsA
GetDeviceCaps
SetMapMode
StartDocA
EndDoc
StartPage
EndPage
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectA
CreateSolidBrush
DeleteDC
DeleteObject
GetStockObject
SelectObject
SetBkMode
SetTextColor
StretchBlt
FindTextA
ChooseColorA
GetSaveFileNameA
PrintDlgA
ChooseFontA
GetOpenFileNameA
InitializeSecurityDescriptor
StartServiceA
QueryServiceStatus
OpenServiceA
OpenSCManagerA
DeleteService
CreateServiceA
ControlService
CloseServiceHandle
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegCreateKeyA
RegOpenKeyA
RegOpenKeyExA
SHGetSpecialFolderLocation
SHGetMalloc
Shell_NotifyIconA
ShellExecuteExA
CommandLineToArgvW
ShellExecuteA
SHBrowseForFolderA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\agent\_work\86\s\exe\Win32\Release\dbgview.pdb
connect
listen
inet_ntoa
htonl
getsockname
bind
accept
WSAGetLastError
WSAStartup
gethostbyname
gethostbyaddr
socket
inet_addr
htons
closesocket
WNetAddConnection2A
WNetCancelConnection2A
ord17
CreateToolbarEx
GetModuleFileNameA
GetCommandLineA
GetSystemDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
FindFirstFileA
SearchPathA
GetComputerNameA
QueryPerformanceCounter
QueryPerformanceFrequency
GetTimeFormatA
GetOverlappedResult
ResetEvent
WaitForMultipleObjects
WriteFile
ReadFile
LockResource
LoadResource
SizeofResource
FindResourceA
CreateFileA
RaiseException
GetTickCount
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
GetProcessHeap
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpyA
lstrcatA
GetDateFormatA
GlobalFree
GetFileSize
WriteFileEx
QueueUserAPC
SleepEx
ExpandEnvironmentStringsA
OutputDebugStringA
FlushFileBuffers
GetConsoleCP
CreateEventA
GetStringTypeW
CreateFileW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetACP
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
SetConsoleMode
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetConsoleMode
GetModuleHandleExW
ExitProcess
EncodePointer
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
RtlUnwind
InterlockedFlushSList
InterlockedPushEntrySList
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
OpenMutexA
CreateMutexA
lstrlenA
lstrcpynA
UnmapViewOfFile
FindFirstFileExW
MapViewOfFile
FormatMessageA
SystemTimeToFileTime
GetSystemTime
CloseHandle
FindClose
DeviceIoControl
WaitForSingleObject
SetEvent
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetLastError
TerminateThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GlobalMemoryStatus
GetVersion
FreeLibrary
InterlockedIncrement
DeleteFileA
GetEnvironmentVariableA
GetLastError
GetCommandLineW
CreateFileMappingA
GetModuleHandleA
LoadLibraryA
GetStdHandle
GetFileType
LocalFree
LocalAlloc
GetProcAddress
OutputDebugStringW
WaitForSingleObjectEx
FindFirstFileExA
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
SetConsoleCtrlHandler
WriteConsoleW
SetFilePointerEx
HeapSize
HeapReAlloc
SetEndOfFile
ReadConsoleW
DecodePointer
CloseClipboard
OpenClipboard
CallWindowProcA
GetParent
DrawFocusRect
GetDialogBaseUnits
IsDlgButtonChecked
CheckRadioButton
RegisterClassExA
GetMessageA
IsDialogMessageA
LoadStringA
LoadIconA
LoadBitmapA
SetClipboardData
GetSysColor
ChildWindowFromPoint
GetCursorPos
GetWindowRect
GetClientRect
GetWindowTextA
InvalidateRgn
InvalidateRect
ReleaseDC
SetForegroundWindow
UpdateWindow
TrackPopupMenu
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EmptyClipboard
GetFocus
EnableWindow
DrawTextA
BeginPaint
EndPaint
ClientToScreen
FindWindowA
DeleteMenu
SetWindowLongA
EnableMenuItem
GetSystemMetrics
TranslateAcceleratorA
LoadAcceleratorsA
KillTimer
SetTimer
MsgWaitForMultipleObjects
ReleaseCapture
SetCapture
SetFocus
SendDlgItemMessageA
GetDlgItemTextA
SetDlgItemTextA
DialogBoxParamA
CreateDialogParamA
IsZoomed
IsIconic
SetWindowPos
MoveWindow
ShowWindow
DestroyWindow
IsWindow
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
AttachThreadInput
PostMessageA
PeekMessageA
DispatchMessageA
TranslateMessage
RegisterWindowMessageA
MessageBoxA
InsertMenuItemA
GetMenuItemCount
GetSubMenu
CheckMenuItem
GetMenu
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
GetWindowThreadProcessId
ScreenToClient
AppendMenuA
CheckDlgButton
GetDC
AbortDoc
SetAbortProc
TextOutA
GetTextExtentPointA
CreateFontA
GetTextExtentPoint32A
ExtTextOutA
SetBkColor
GetObjectA
GetTextMetricsA
GetDeviceCaps
SetMapMode
StartDocA
EndDoc
StartPage
EndPage
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectA
CreateSolidBrush
DeleteDC
DeleteObject
GetStockObject
SelectObject
SetBkMode
SetTextColor
StretchBlt
FindTextA
ChooseColorA
GetSaveFileNameA
PrintDlgA
ChooseFontA
GetOpenFileNameA
InitializeSecurityDescriptor
StartServiceA
QueryServiceStatus
OpenServiceA
OpenSCManagerA
DeleteService
CreateServiceA
ControlService
CloseServiceHandle
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegCreateKeyA
RegOpenKeyA
RegOpenKeyExA
SHGetSpecialFolderLocation
SHGetMalloc
Shell_NotifyIconA
ShellExecuteExA
CommandLineToArgvW
ShellExecuteA
SHBrowseForFolderA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ