dialog
initDialog
show
Overview
overview
7Static
static
3ha-exptize...up.exe
windows7-x64
7ha-exptize...up.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDIR/nsWeb.dll
windows7-x64
3$PLUGINSDIR/nsWeb.dll
windows10-2004-x64
3$TEMP/fzhexp/1.exe
windows7-x64
7$TEMP/fzhexp/1.exe
windows10-2004-x64
7$WINDIR/eS...50.dll
windows7-x64
3$WINDIR/eS...50.dll
windows10-2004-x64
3$WINDIR/eS...ne.dll
windows7-x64
3$WINDIR/eS...ne.dll
windows10-2004-x64
3exptizer.chm
windows7-x64
1exptizer.chm
windows10-2004-x64
1exptizer.exe
windows7-x64
3exptizer.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1.rtf
windows7-x64
4.rtf
windows10-2004-x64
1ha-exptize...om.htm
windows7-x64
3ha-exptize...om.htm
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
ha-exptizerpro-fzh/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ha-exptizerpro-fzh/Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$TEMP/fzhexp/1.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMP/fzhexp/1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$WINDIR/eSellerateControl350.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$WINDIR/eSellerateControl350.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$WINDIR/eSellerateEngine.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$WINDIR/eSellerateEngine.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
exptizer.chm
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
exptizer.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
exptizer.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
exptizer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
.url
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
.rtf
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
ha-exptizerpro-fzh/kaishile.com.htm
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ha-exptizerpro-fzh/kaishile.com.htm
Resource
win10v2004-20240802-en
Target
f9981880662bb99bd4b24a6fed644367_JaffaCakes118
Size
908KB
MD5
f9981880662bb99bd4b24a6fed644367
SHA1
91ed6960b8fd600d43481e7991c793e1725655d6
SHA256
8e15abfc4d604b90258587d7032516c5c57b7df90a8982486b5025cb7fccbb42
SHA512
6b53b89c74550226592f343525929b19a204a5aecf0516fdb4457521888c26cb14b111ebadcce44fd276b7ee2d127c2692be4de942d670b98d84b4b0daabfb73
SSDEEP
24576:ObzVpEClJ2DGKnAhvdEiCN6tS+jvxGVg24Rt8ow3xCG0:OXfECDiAdEdN9OAEeoyxc
Checks for missing Authenticode signature.
resource |
---|
unpack001/ha-exptizerpro-fzh/Setup.exe |
unpack002/$PLUGINSDIR/InstallOptions.dll |
unpack002/$PLUGINSDIR/StartMenu.dll |
unpack002/$PLUGINSDIR/nsWeb.dll |
unpack002/$TEMP/fzhexp/1.exe |
unpack002/$WINDIR/eSellerateControl350.dll |
unpack002/$WINDIR/eSellerateEngine.dll |
unpack002/exptizer.exe |
unpack002/uninst.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
GlobalAlloc
MulDiv
GetModuleHandleA
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
lstrcmpiA
lstrcatA
lstrcpyA
GetMessageA
IsDialogMessageA
PostMessageA
CallWindowProcA
TranslateMessage
CheckDlgButton
ShowWindow
LoadIconA
GetClientRect
MoveWindow
ScreenToClient
GetWindowRect
ReleaseDC
GetDC
EnableWindow
SetWindowTextA
SendMessageA
GetWindowTextA
IsDlgButtonChecked
DispatchMessageA
DestroyWindow
GetDlgItem
CreateDialogParamA
SetWindowLongA
wsprintfA
GetWindowLongA
GetTextMetricsA
SelectObject
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Init
Select
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
HeapAlloc
GetProcessHeap
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GlobalFree
lstrcpyA
GlobalAlloc
MapWindowPoints
GetWindowRect
SendMessageA
PostMessageA
MoveWindow
GetDlgItem
GetWindowLongA
GetClientRect
SetWindowLongA
ShowWindow
UpdateWindow
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
CreateDialogParamA
CallWindowProcA
OleInitialize
OleUninitialize
OleSetContainedObject
OleCreate
SafeArrayCreate
SafeArrayDestroy
SysFreeString
SysAllocStringLen
VariantClear
SysAllocString
VariantInit
SafeArrayAccessData
CreateURLMoniker
InternetAttemptConnect
IsInet
ShowHTMLInPage
ShowWebInPage
ShowWebInPopUp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
FreeSid
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegQueryInfoKeyA
lstrcatA
GetFileAttributesA
GetShortPathNameA
LocalAlloc
GetLastError
GetCurrentProcess
GetPrivateProfileIntA
lstrcmpiA
lstrcpyA
GetModuleFileNameA
FreeLibrary
GetPrivateProfileStringA
lstrlenA
GetSystemDirectoryA
RemoveDirectoryA
GetProcAddress
FindNextFileA
DeleteFileA
SetFileAttributesA
lstrcmpA
FindFirstFileA
_lclose
_llseek
_lopen
WritePrivateProfileStringA
GetWindowsDirectoryA
LoadLibraryA
FindClose
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
IsDBCSLeadByte
ExitProcess
CloseHandle
GetStartupInfoA
GetCommandLineA
LoadResource
FindResourceA
CreateMutexA
SetEvent
CreateEventA
SetCurrentDirectoryA
CreateThread
ResetEvent
TerminateThread
LocalFree
FormatMessageA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetTempPathA
FreeResource
LockResource
SizeofResource
CreateFileA
ReadFile
WriteFile
SetFilePointer
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetTempFileNameA
GetSystemInfo
GetDriveTypeA
lstrcpynA
GetVolumeInformationA
GetCurrentDirectoryA
LoadLibraryExA
GetModuleHandleA
CreateDirectoryA
ExpandEnvironmentStringsA
GetVersionExA
GetDiskFreeSpaceA
MulDiv
GetDeviceCaps
wsprintfA
ExitWindowsEx
CharNextA
CharUpperA
EndDialog
GetDesktopWindow
CharPrevA
GetWindowLongA
CallWindowProcA
GetDlgItem
SetForegroundWindow
SetWindowTextA
SendDlgItemMessageA
SetWindowLongA
EnableWindow
SendMessageA
LoadStringA
MsgWaitForMultipleObjects
PeekMessageA
MessageBoxA
SetWindowPos
ReleaseDC
GetDC
GetWindowRect
ShowWindow
DialogBoxIndirectParamA
SetDlgItemTextA
MessageBeep
GetDlgItemTextA
DispatchMessageA
ord17
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetShortPathNameA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrlenA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
SetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcmpiA
DisableThreadLibraryCalls
CompareStringW
CompareStringA
RtlUnwind
GetStringTypeW
GetStringTypeA
DeleteFileA
MoveFileA
SetFileAttributesA
GetTempFileNameA
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetVersion
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapCreate
VirtualFree
ExitProcess
VirtualAlloc
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
CloseHandle
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
FlushFileBuffers
SetFilePointer
LCMapStringA
LCMapStringW
GetForegroundWindow
GetWindowLongA
CharNextA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumValueA
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
SysReAllocString
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
SysAllocString
VarUI4FromStr
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
WSACleanup
htons
WSAStartup
closesocket
recv
send
socket
WSAAsyncSelect
connect
WSAGetLastError
ioctlsocket
gethostbyname
DeleteFileA
Sleep
GetSystemTime
SetFileAttributesA
GetTempPathA
CreateDirectoryA
GetDriveTypeA
GetDiskFreeSpaceA
FreeLibrary
GetProcAddress
LoadLibraryA
MoveFileA
lstrcpyA
LocalFree
lstrcmpiA
LocalAlloc
lstrlenA
lstrcpynA
lstrlenW
MultiByteToWideChar
GlobalDeleteAtom
GlobalAddAtomA
GetCurrentProcessId
GlobalUnlock
GlobalLock
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
ReadFile
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
DeleteCriticalSection
VirtualFree
CreateFileA
HeapDestroy
GetOEMCP
GetACP
SizeofResource
InitializeCriticalSection
WriteFile
LeaveCriticalSection
EnterCriticalSection
GetLastError
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetLocalTime
GetTimeZoneInformation
InterlockedIncrement
InterlockedDecrement
HeapAlloc
HeapReAlloc
HeapFree
RtlUnwind
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
IsBadReadPtr
SetEndOfFile
CompareStringA
WaitForSingleObject
CloseHandle
FindResourceA
LoadResource
LockResource
GetTickCount
WideCharToMultiByte
GetTempFileNameA
FindFirstFileA
FindClose
GetModuleFileNameA
GetWindowsDirectoryA
GetVolumeInformationA
GlobalMemoryStatus
GetStringTypeA
GetStringTypeW
SetStdHandle
GetCPInfo
FlushFileBuffers
SetFilePointer
IsBadCodePtr
CompareStringW
HeapCreate
SetEnvironmentVariableA
LoadCursorA
CharNextA
RegisterClassA
GetWindowThreadProcessId
ReuseDDElParam
UnpackDDElParam
CreateWindowExA
DefWindowProcA
GetWindowLongA
OpenClipboard
GetClipboardData
SetClassLongA
LoadIconA
GetClassLongA
CloseClipboard
MessageBeep
CallWindowProcA
SetRect
OffsetRect
GetAsyncKeyState
UnregisterClassA
RedrawWindow
DialogBoxParamA
EndDialog
PeekMessageA
TranslateMessage
DispatchMessageA
SetTimer
KillTimer
DrawEdge
InvalidateRect
UpdateWindow
DrawFocusRect
FillRect
GetDlgItemTextA
GetSysColor
DrawTextA
ShowWindow
EnableWindow
GetWindowTextA
SetWindowTextA
GetDC
ReleaseDC
ScreenToClient
SetWindowPos
GetWindowRect
MoveWindow
SetFocus
PostMessageA
GetDlgItem
GetCursorPos
SendMessageA
GetClientRect
CopyRect
IsWindow
GetForegroundWindow
DestroyWindow
SetWindowLongA
SetMapMode
StartDocA
StartPage
EndPage
EndDoc
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
CreateDIBitmap
DeleteDC
CreateFontIndirectA
GetObjectA
DeleteObject
SetTextColor
SelectObject
GetTextExtentPoint32A
GetDeviceCaps
PrintDlgA
GetSaveFileNameA
ord17
ord6
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
SHGetMalloc
ShellExecuteExA
CLSIDFromString
OleInitialize
OleUninitialize
CoCreateInstance
SafeArrayCreateVector
VariantInit
VariantClear
MVESD_Entry2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE