InstallKeyboardHook
KeyboardProc
SetOptions
UnInstallKeyboardHook
Overview
overview
7Static
static
3Bonus!!!/F...up.exe
windows7-x64
1Bonus!!!/F...up.exe
windows10-2004-x64
1FKL.chm
windows7-x64
1FKL.chm
windows10-2004-x64
1Links/Down...on.url
windows7-x64
1Links/Down...on.url
windows10-2004-x64
1Links/Mail...rt.url
windows7-x64
1Links/Mail...rt.url
windows10-2004-x64
1Links/Othe...s.html
windows7-x64
1Links/Othe...s.html
windows10-2004-x64
1Links/Prog...ge.url
windows7-x64
1Links/Prog...ge.url
windows10-2004-x64
1Links/Regi...on.url
windows7-x64
6Links/Regi...on.url
windows10-2004-x64
3QuickStart.html
windows7-x64
1QuickStart.html
windows10-2004-x64
1ResetSettings.bat
windows7-x64
1ResetSettings.bat
windows10-2004-x64
1ctfmon.dll
windows7-x64
1ctfmon.dll
windows10-2004-x64
1ctfmon.exe
windows7-x64
1ctfmon.exe
windows10-2004-x64
1ctfs.dll
windows7-x64
3ctfs.dll
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7InternetSpy-setup.exe
windows7-x64
1InternetSpy-setup.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Bonus!!!/FamilyKeyLogger-setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Bonus!!!/FamilyKeyLogger-setup.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
FKL.chm
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
FKL.chm
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
Links/Download lastest version.url
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Links/Download lastest version.url
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Links/Mail to support.url
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Links/Mail to support.url
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Links/OtherProducts.html
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Links/OtherProducts.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
Links/Program's home page.url
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Links/Program's home page.url
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Links/Registration.url
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Links/Registration.url
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
QuickStart.html
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
QuickStart.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
ResetSettings.bat
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
ResetSettings.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
ctfmon.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
ctfmon.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
ctfmon.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
ctfmon.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
ctfs.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
ctfs.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
uninstall.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
InternetSpy-setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
InternetSpy-setup.exe
Resource
win10v2004-20240704-en
Target
2985fda21b4364b58efedafd415c9aa7_JaffaCakes118
Size
193KB
MD5
2985fda21b4364b58efedafd415c9aa7
SHA1
55c7f96cb295311abd2e80be2c5a36a72115f639
SHA256
768cc061023b72d0a97d449fd425b8021f88598c2b65081d1da0f16be4329427
SHA512
25e663646fa6a5f842cf0bd82c95d5c6a317dd76212fe90abc131eb121dc2c8a17e09f10314e02e1effd9c4705db3bf05e55432188ef7c13a2fc05ef04fff2dc
SSDEEP
3072:3D11a8YBJYAo+fl2K6tHoF64yrJs2Uqj6X31WzqCj/Ms+CJylMrR5UOQzl7FEGaG:RHYWalz8s2Uqu1+iCUSvUFz7EGaH0nf
Checks for missing Authenticode signature.
resource |
---|
unpack001/Bonus!!!/FamilyKeyLogger-setup.exe |
unpack002/ctfmon.dll |
unpack002/ctfmon.exe |
unpack002/ctfs.dll |
unpack002/uninstall.exe |
unpack001/InternetSpy-setup.exe |
resource | yara_rule |
---|---|
static1/unpack001/Bonus!!!/FamilyKeyLogger-setup.exe | nsis_installer_1 |
static1/unpack002/uninstall.exe | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
FindNextFileA
DeleteFileA
FindFirstFileA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
CopyFileA
ExitProcess
lstrcpynA
GetCommandLineA
lstrcmpiA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
MulDiv
FindClose
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
WritePrivateProfileStringA
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetCurrentProcess
GetWindowsDirectoryA
CharNextA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
PostQuitMessage
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ExitWindowsEx
GetDeviceCaps
CreateFontIndirectA
DeleteObject
CreateBrushIndirect
CreateFontA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
CloseHandle
WriteFile
lstrlenA
lstrcmpA
CreateFileA
GetLocalTime
IsBadStringPtrA
SetFilePointer
SetEndOfFile
GetWindowTextA
GetForegroundWindow
MessageBeep
ToAscii
GetKeyboardState
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
MapVirtualKeyA
wsprintfA
GetUserNameA
InstallKeyboardHook
KeyboardProc
SetOptions
UnInstallKeyboardHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindFirstFileA
DeleteFileA
FindNextFileA
GetModuleFileNameA
FindClose
RemoveDirectoryA
ReadFile
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetCommandLineA
Sleep
lstrcatA
CreateFileA
CloseHandle
GetCurrentProcessId
lstrcmpiA
ExitProcess
lstrlenA
CreateMutexA
GetLastError
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
WriteFile
UpdateWindow
EnableWindow
GetDlgItemTextA
InsertMenuItemA
CreatePopupMenu
GetSystemMetrics
ReleaseDC
GetWindowDC
GetDesktopWindow
DrawIconEx
DrawTextA
InflateRect
FrameRect
CopyRect
IsDlgButtonChecked
SendDlgItemMessageA
GetDlgItem
SetClassLongA
GetSysColor
GetDlgCtrlID
PostQuitMessage
UnregisterHotKey
PostMessageA
SetForegroundWindow
GetCursorPos
TrackPopupMenuEx
DestroyWindow
DialogBoxParamA
DefWindowProcA
RegisterHotKey
MessageBeep
FindWindowA
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
LoadCursorA
RegisterClassExA
CreateWindowExA
MessageBoxA
SetMenuDefaultItem
LoadMenuA
GetSubMenu
LoadIconA
EndDialog
CreateSolidBrush
CreatePen
SetBkMode
MoveToEx
LineTo
DeleteObject
GetStockObject
SetTextColor
GetTextExtentPoint32A
CreateFontA
CreateBrushIndirect
SetBkColor
SelectObject
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetFileSecurityA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
Shell_NotifyIconA
ExtractIconA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
GetProcAddress
GetCommandLineA
GetCommandLineW
OpenProcess
GetCurrentProcessId
GetVersionExA
WriteProcessMemory
VirtualProtect
lstrcmpiA
FreeLibrary
LoadLibraryA
LCMapStringW
LCMapStringA
InterlockedDecrement
InterlockedIncrement
GetLastError
WideCharToMultiByte
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
RtlUnwind
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
CommandLineToArgvW
GetMsgProc
HideProcess
InstallGetMsgHook
UnHideProcess
UnInstallGetMsgHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
FindNextFileA
DeleteFileA
FindFirstFileA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
CopyFileA
ExitProcess
lstrcpynA
GetCommandLineA
lstrcmpiA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
MulDiv
FindClose
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
WritePrivateProfileStringA
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetCurrentProcess
GetWindowsDirectoryA
CharNextA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
PostQuitMessage
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ExitWindowsEx
GetDeviceCaps
CreateFontIndirectA
DeleteObject
CreateBrushIndirect
CreateFontA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
FindNextFileA
DeleteFileA
FindFirstFileA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
CopyFileA
ExitProcess
lstrcpynA
GetCommandLineA
lstrcmpiA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
MulDiv
FindClose
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
WritePrivateProfileStringA
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetCurrentProcess
GetWindowsDirectoryA
CreateDialogParamA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
DestroyWindow
SetTimer
SetWindowTextA
SetForegroundWindow
ShowWindow
CharNextA
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
PostQuitMessage
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ExitWindowsEx
GetDeviceCaps
CreateFontIndirectA
DeleteObject
CreateBrushIndirect
CreateFontA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ