dialog
initDialog
show
Overview
overview
10Static
static
7HA_TWinMD5-042_CZ.exe
windows7-x64
3HA_TWinMD5-042_CZ.exe
windows10-2004-x64
3$PLUGINSDI...NS.dll
windows7-x64
3$PLUGINSDI...NS.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...NU.dll
windows7-x64
3$PLUGINSDI...NU.dll
windows10-2004-x64
3$PLUGINSDI...EM.dll
windows7-x64
3$PLUGINSDI...EM.dll
windows10-2004-x64
3$PLUGINSDIR/nsWeb.dll
windows7-x64
3$PLUGINSDIR/nsWeb.dll
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...52.exe
windows7-x64
8$PROGRAM_F...52.exe
windows10-2004-x64
8File,Diz.exe
windows7-x64
10File,Diz.exe
windows10-2004-x64
10Lang2052.exe
windows7-x64
8Lang2052.exe
windows10-2004-x64
8WinMD5.exe
windows7-x64
3WinMD5.exe
windows10-2004-x64
3uninst.exe
windows7-x64
3uninst.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...iz.exe
windows7-x64
10$PROGRAM_F...iz.exe
windows10-2004-x64
10�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
HA_TWinMD5-042_CZ.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HA_TWinMD5-042_CZ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/INSTALLOPTIONS.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INSTALLOPTIONS.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/STARTMENU.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/STARTMENU.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SYSTEM.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SYSTEM.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES_COMMON/NSISLog/Lang2052.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
File,Diz.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
File,Diz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Lang2052.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Lang2052.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
WinMD5.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
WinMD5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/KILLPROCDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PROGRAM_FILES/Baidu/bar/BaiduBar.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PROGRAM_FILES_COMMON/NSISLog/File,Diz.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
$PROGRAM_FILES_COMMON/NSISLog/File,Diz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
ⷴ.url
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ⷴ.url
Resource
win10v2004-20240802-en
Target
d1d6b0aff63df7ff1745e72356bc8410_JaffaCakes118
Size
980KB
MD5
d1d6b0aff63df7ff1745e72356bc8410
SHA1
efcae91eea4ce3de9819a8ceef5de52f63886a86
SHA256
d92cb7e568554000f7f3fec67a47d0f6ab2700782fb20640b2ca23e900e2f340
SHA512
407216a9854a66fdfb49fe18f81b93d435ede26b05956accc634774e7d7112bdb4cbdf0f08cca9479cbae0f3a02f7a0680fba02941bb57b0a53664989ef8d73e
SSDEEP
24576:3BQsGmJXNNGhsMMPThfqXhcQgfKcxa8PxX2g6X86:3BzJdNGhsxTpqGHfla8PxX2gx6
resource | yara_rule |
---|---|
static1/unpack002/չ.EXE | upx |
static1/unpack002/Ƴչ.EXE | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/HA_TWinMD5-042_CZ.EXE |
unpack002/$PLUGINSDIR/INSTALLOPTIONS.DLL |
unpack002/$PLUGINSDIR/KILLPROCDLL.DLL |
unpack002/$PLUGINSDIR/STARTMENU.DLL |
unpack002/$PLUGINSDIR/SYSTEM.DLL |
unpack002/$PLUGINSDIR/nsWeb.dll |
unpack002/$PROGRAM_FILES/Baidu/bar/BaiduBar.DLL |
unpack002/$PROGRAM_FILES_COMMON/NSISLog/Lang2052.DAT |
unpack002/File,Diz.ThX |
unpack002/Lang2052.DAT |
unpack002/WinMD5.EXE |
unpack002/uninst.exe |
unpack003/$PLUGINSDIR/KILLPROCDLL.DLL |
unpack003/$PROGRAM_FILES/Baidu/bar/BaiduBar.DLL |
unpack003/$PROGRAM_FILES_COMMON/NSISLog/File,Diz.ThX |
unpack002/չ.EXE |
unpack004/out.upx |
unpack002/Ƴչ.EXE |
unpack005/out.upx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
CloseHandle
OpenProcess
FreeLibrary
LoadLibraryA
GetProcAddress
GetVersionExA
GlobalFree
lstrcpyA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
RtlUnwind
GetCPInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
KillProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
GlobalAlloc
MulDiv
GetModuleHandleA
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
lstrcmpiA
lstrcatA
lstrcpyA
GetMessageA
IsDialogMessageA
PostMessageA
CallWindowProcA
TranslateMessage
CheckDlgButton
ShowWindow
LoadIconA
GetClientRect
MoveWindow
ScreenToClient
GetWindowRect
ReleaseDC
GetDC
EnableWindow
SetWindowTextA
SendMessageA
GetWindowTextA
IsDlgButtonChecked
DispatchMessageA
DestroyWindow
GetDlgItem
CreateDialogParamA
SetWindowLongA
wsprintfA
GetWindowLongA
GetTextMetricsA
SelectObject
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Init
Select
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
HeapAlloc
GetProcessHeap
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GlobalFree
lstrcpyA
GlobalAlloc
MapWindowPoints
GetWindowRect
SendMessageA
PostMessageA
MoveWindow
GetDlgItem
GetWindowLongA
GetClientRect
SetWindowLongA
ShowWindow
UpdateWindow
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
CreateDialogParamA
CallWindowProcA
OleInitialize
OleUninitialize
OleSetContainedObject
OleCreate
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocStringLen
VariantClear
SysAllocString
VariantInit
SafeArrayAccessData
CreateURLMoniker
InternetAttemptConnect
IsInet
ShowHTMLInPage
ShowWebInPage
ShowWebInPopUp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RemoveDirectoryA
CopyFileA
CreateDirectoryA
MoveFileExA
GetVersionExA
DeviceIoControl
GetTickCount
Sleep
GetFileAttributesA
ReleaseMutex
WaitForSingleObject
CreateMutexA
SetFilePointer
FindClose
FindNextFileA
SetFileAttributesA
FindFirstFileA
GetTempPathA
GetPrivateProfileSectionA
SetErrorMode
GetEnvironmentVariableA
ReadProcessMemory
VirtualProtect
GlobalUnlock
GlobalLock
LocalFree
FormatMessageA
HeapFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GlobalFree
GlobalAlloc
ResumeThread
DeleteFileA
CreateFileA
InitializeCriticalSection
GetWindowsDirectoryA
GetSystemDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetShortPathNameA
DisableThreadLibraryCalls
FlushInstructionCache
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
LoadLibraryW
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
SetLastError
lstrlenW
GetCurrentProcess
WriteProcessMemory
CreateThread
WideCharToMultiByte
GetLastError
GetFileSize
GetProcessHeap
HeapAlloc
ReadFile
CloseHandle
WriteFile
MultiByteToWideChar
lstrcpyW
InterlockedIncrement
lstrlenA
OutputDebugStringA
GetTempFileNameA
lstrcatA
lstrcpyA
LoadLibraryA
HeapDestroy
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GetModuleFileNameA
DeleteCriticalSection
WritePrivateProfileSectionA
InterlockedDecrement
DebugBreak
TranslateMessage
CopyRect
CheckMenuRadioItem
MapWindowPoints
PtInRect
ScreenToClient
GetWindowRect
SetCapture
ReleaseCapture
RedrawWindow
CallWindowProcA
CreateWindowExA
GetMenuStringA
wsprintfA
CharUpperA
KillTimer
EndDialog
ShowWindow
SetWindowTextA
IsWindow
GetDlgItem
BeginPaint
SetWindowLongA
GetWindowLongA
EndPaint
wvsprintfA
CharNextA
LoadStringA
CharLowerA
CheckMenuItem
EnableMenuItem
GetAsyncKeyState
CallNextHookEx
GetActiveWindow
PostMessageA
FindWindowExA
SendMessageA
DialogBoxParamA
GetSubMenu
GetClientRect
DestroyWindow
GetFocus
SetFocus
UnhookWindowsHookEx
SetWindowsHookExA
MessageBoxA
LoadImageA
LoadCursorA
RegisterClassExA
GetClassInfoExA
IsWindowVisible
DefWindowProcA
GetWindow
GetParent
GetWindowTextA
DestroyMenu
DispatchMessageA
GetClassInfoA
GetKeyState
SetCursor
LoadMenuA
SetTimer
SetWindowPos
LoadBitmapA
SetRectEmpty
GetCursorPos
TrackPopupMenu
SetForegroundWindow
InsertMenuA
CreatePopupMenu
SystemParametersInfoA
GetDesktopWindow
OffsetRect
FindWindowA
DeleteObject
MoveToEx
SelectObject
CreatePen
GetStockObject
SetBkColor
SetBkMode
GetObjectA
DeleteDC
SetTextColor
CreateBitmap
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
TextOutA
CreateFontIndirectA
LineTo
RegDeleteKeyA
ControlService
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegCreateKeyA
CloseServiceHandle
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
OpenServiceA
OpenSCManagerA
EnumDependentServicesA
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
RegGetKeySecurity
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAce
InitializeAcl
AllocateAndInitializeSid
RegEnumKeyA
RegSetKeySecurity
GetUserNameA
SHGetSpecialFolderPathA
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
CoTaskMemRealloc
CoGetClassObject
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
RegisterDragDrop
RevokeDragDrop
ReleaseStgMedium
CoInitialize
OleUninitialize
OleInitialize
SysStringByteLen
SysFreeString
VariantChangeType
VariantInit
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
VariantCopy
LoadTypeLi
SysAllocString
SysAllocStringLen
VariantClear
VarUI4FromStr
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
StrStrIA
SHSetValueA
CoInternetGetSession
_wcsnicmp
_stricmp
_wcsicmp
_strnicmp
strstr
_mbsrchr
_mbsstr
__CxxFrameHandler
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_fullpath
_endthreadex
_mbsnbcmp
_memicmp
_mbsnbcpy
_beginthread
_endthread
_local_unwind2
printf
fgets
_vsnprintf
_CxxThrowException
atol
fwrite
wcsstr
strcmp
fseek
ftell
toupper
isxdigit
isalnum
_beginthreadex
abs
_snprintf
_mbsicmp
fread
realloc
_mbstok
malloc
_purecall
fopen
fputs
fclose
_except_handler3
strchr
strncpy
_strlwr
strlen
wcscmp
memset
strrchr
strcat
_stat
_mbsnbicmp
time
srand
rand
sprintf
strcpy
memmove
??3@YAXPAX@Z
_mbschr
_ismbcspace
wcslen
memcmp
free
??2@YAPAXI@Z
memcpy
_ismbcdigit
atoi
_mbscmp
InternetSetOptionA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetReadFile
InternetSetFilePointer
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
FindFirstUrlCacheEntryA
InternetOpenA
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheGroup
DeleteUrlCacheGroup
FindFirstUrlCacheGroup
SetupIterateCabinetA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
GetNetworkParams
gethostname
gethostbyname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Install
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenProcess
lstrcatA
GetLastError
lstrcpynA
lstrcmpiA
WinExec
GetModuleFileNameA
TerminateProcess
lstrlenA
LoadLibraryA
WritePrivateProfileStringA
GetModuleHandleA
GetVersion
WriteFile
MoveFileExA
GetSystemDirectoryA
CreateFileA
DeviceIoControl
DeleteFileA
GetVersionExA
GetCurrentProcess
CloseHandle
GetTempPathA
GetProcAddress
GlobalAlloc
FreeLibrary
LoadLibraryExA
GetSystemDefaultLangID
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetOEMCP
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringA
GetEnvironmentStrings
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
GetCPInfo
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualFree
LCMapStringW
HeapDestroy
HeapCreate
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
ExitWindowsEx
wsprintfA
MessageBoxA
CloseServiceHandle
RegOpenKeyExA
RegCloseKey
OpenSCManagerA
CreateServiceA
StartServiceA
ControlService
OpenServiceA
OpenProcessToken
LookupPrivilegeValueA
DeleteService
RegDeleteKeyA
RegEnumKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
MessageBoxA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenProcess
lstrcatA
GetLastError
lstrcpynA
lstrcmpiA
WinExec
GetModuleFileNameA
TerminateProcess
lstrlenA
LoadLibraryA
WritePrivateProfileStringA
GetModuleHandleA
GetVersion
WriteFile
MoveFileExA
GetSystemDirectoryA
CreateFileA
DeviceIoControl
DeleteFileA
GetVersionExA
GetCurrentProcess
CloseHandle
GetTempPathA
GetProcAddress
GlobalAlloc
FreeLibrary
LoadLibraryExA
GetSystemDefaultLangID
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetOEMCP
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringA
GetEnvironmentStrings
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
GetCPInfo
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualFree
LCMapStringW
HeapDestroy
HeapCreate
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
ExitWindowsEx
wsprintfA
MessageBoxA
CloseServiceHandle
RegOpenKeyExA
RegCloseKey
OpenSCManagerA
CreateServiceA
StartServiceA
ControlService
OpenServiceA
OpenProcessToken
LookupPrivilegeValueA
DeleteService
RegDeleteKeyA
RegEnumKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHDeleteKeyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateProcess
CloseHandle
OpenProcess
FreeLibrary
LoadLibraryA
GetProcAddress
GetVersionExA
GlobalFree
lstrcpyA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
RtlUnwind
GetCPInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
KillProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RemoveDirectoryA
CopyFileA
CreateDirectoryA
MoveFileExA
GetVersionExA
DeviceIoControl
GetTickCount
Sleep
GetFileAttributesA
ReleaseMutex
WaitForSingleObject
CreateMutexA
SetFilePointer
FindClose
FindNextFileA
SetFileAttributesA
FindFirstFileA
GetTempPathA
GetPrivateProfileSectionA
SetErrorMode
GetEnvironmentVariableA
ReadProcessMemory
VirtualProtect
GlobalUnlock
GlobalLock
LocalFree
FormatMessageA
HeapFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GlobalFree
GlobalAlloc
ResumeThread
DeleteFileA
CreateFileA
InitializeCriticalSection
GetWindowsDirectoryA
GetSystemDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetShortPathNameA
DisableThreadLibraryCalls
FlushInstructionCache
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
LoadLibraryW
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
SetLastError
lstrlenW
GetCurrentProcess
WriteProcessMemory
CreateThread
WideCharToMultiByte
GetLastError
GetFileSize
GetProcessHeap
HeapAlloc
ReadFile
CloseHandle
WriteFile
MultiByteToWideChar
lstrcpyW
InterlockedIncrement
lstrlenA
OutputDebugStringA
GetTempFileNameA
lstrcatA
lstrcpyA
LoadLibraryA
HeapDestroy
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GetModuleFileNameA
DeleteCriticalSection
WritePrivateProfileSectionA
InterlockedDecrement
DebugBreak
TranslateMessage
CopyRect
CheckMenuRadioItem
MapWindowPoints
PtInRect
ScreenToClient
GetWindowRect
SetCapture
ReleaseCapture
RedrawWindow
CallWindowProcA
CreateWindowExA
GetMenuStringA
wsprintfA
CharUpperA
KillTimer
EndDialog
ShowWindow
SetWindowTextA
IsWindow
GetDlgItem
BeginPaint
SetWindowLongA
GetWindowLongA
EndPaint
wvsprintfA
CharNextA
LoadStringA
CharLowerA
CheckMenuItem
EnableMenuItem
GetAsyncKeyState
CallNextHookEx
GetActiveWindow
PostMessageA
FindWindowExA
SendMessageA
DialogBoxParamA
GetSubMenu
GetClientRect
DestroyWindow
GetFocus
SetFocus
UnhookWindowsHookEx
SetWindowsHookExA
MessageBoxA
LoadImageA
LoadCursorA
RegisterClassExA
GetClassInfoExA
IsWindowVisible
DefWindowProcA
GetWindow
GetParent
GetWindowTextA
DestroyMenu
DispatchMessageA
GetClassInfoA
GetKeyState
SetCursor
LoadMenuA
SetTimer
SetWindowPos
LoadBitmapA
SetRectEmpty
GetCursorPos
TrackPopupMenu
SetForegroundWindow
InsertMenuA
CreatePopupMenu
SystemParametersInfoA
GetDesktopWindow
OffsetRect
FindWindowA
DeleteObject
MoveToEx
SelectObject
CreatePen
GetStockObject
SetBkColor
SetBkMode
GetObjectA
DeleteDC
SetTextColor
CreateBitmap
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
TextOutA
CreateFontIndirectA
LineTo
RegDeleteKeyA
ControlService
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegCreateKeyA
CloseServiceHandle
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
OpenServiceA
OpenSCManagerA
EnumDependentServicesA
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
RegGetKeySecurity
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAce
InitializeAcl
AllocateAndInitializeSid
RegEnumKeyA
RegSetKeySecurity
GetUserNameA
SHGetSpecialFolderPathA
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
CoTaskMemRealloc
CoGetClassObject
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
RegisterDragDrop
RevokeDragDrop
ReleaseStgMedium
CoInitialize
OleUninitialize
OleInitialize
SysStringByteLen
SysFreeString
VariantChangeType
VariantInit
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
VariantCopy
LoadTypeLi
SysAllocString
SysAllocStringLen
VariantClear
VarUI4FromStr
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
StrStrIA
SHSetValueA
CoInternetGetSession
_wcsnicmp
_stricmp
_wcsicmp
_strnicmp
strstr
_mbsrchr
_mbsstr
__CxxFrameHandler
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_fullpath
_endthreadex
_mbsnbcmp
_memicmp
_mbsnbcpy
_beginthread
_endthread
_local_unwind2
printf
fgets
_vsnprintf
_CxxThrowException
atol
fwrite
wcsstr
strcmp
fseek
ftell
toupper
isxdigit
isalnum
_beginthreadex
abs
_snprintf
_mbsicmp
fread
realloc
_mbstok
malloc
_purecall
fopen
fputs
fclose
_except_handler3
strchr
strncpy
_strlwr
strlen
wcscmp
memset
strrchr
strcat
_stat
_mbsnbicmp
time
srand
rand
sprintf
strcpy
memmove
??3@YAXPAX@Z
_mbschr
_ismbcspace
wcslen
memcmp
free
??2@YAPAXI@Z
memcpy
_ismbcdigit
atoi
_mbscmp
InternetSetOptionA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetReadFile
InternetSetFilePointer
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
FindFirstUrlCacheEntryA
InternetOpenA
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheGroup
DeleteUrlCacheGroup
FindFirstUrlCacheGroup
SetupIterateCabinetA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
GetNetworkParams
gethostname
gethostbyname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Install
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
MessageBoxA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ