Init
UnInit
Overview
overview
10Static
static
7MirServer/...er.exe
windows7-x64
3MirServer/...er.exe
windows10-2004-x64
3MirServer/...��.bat
windows7-x64
1MirServer/...��.bat
windows10-2004-x64
1MirServer/...ev.exe
windows7-x64
10MirServer/...ev.exe
windows10-2004-x64
10MirServer/...er.exe
windows7-x64
3MirServer/...er.exe
windows10-2004-x64
3MirServer/...te.exe
windows7-x64
3MirServer/...te.exe
windows10-2004-x64
3MirServer/...rv.exe
windows7-x64
3MirServer/...rv.exe
windows10-2004-x64
3MirServer/...��.ps1
windows7-x64
3MirServer/...��.ps1
windows10-2004-x64
3MirServer/...al.dll
windows7-x64
3MirServer/...al.dll
windows10-2004-x64
3MirServer/...er.exe
windows7-x64
6MirServer/...er.exe
windows10-2004-x64
6MirServer/...ir.exe
windows7-x64
3MirServer/...ir.exe
windows10-2004-x64
3MirServer/...ad.exe
windows7-x64
10MirServer/...ad.exe
windows10-2004-x64
10MirServer/...��.exe
windows7-x64
3MirServer/...��.exe
windows10-2004-x64
3MirServer/...te.exe
windows7-x64
3MirServer/...te.exe
windows10-2004-x64
311111111Ru...te.exe
windows7-x64
711111111Ru...te.exe
windows10-2004-x64
7MirServer/...te.exe
windows7-x64
3MirServer/...te.exe
windows10-2004-x64
3MirServer/...��.exe
windows7-x64
5MirServer/...��.exe
windows10-2004-x64
5Behavioral task
behavioral1
Sample
MirServer/DBServer/DBServer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MirServer/DBServer/DBServer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
MirServer/D盘开区清空数据.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
MirServer/D盘开区清空数据.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
MirServer/GameCentev.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
MirServer/GameCentev.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
MirServer/LogServer/LogDataServer.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
MirServer/LogServer/LogDataServer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
MirServer/LoginGate/LoginGate.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
MirServer/LoginGate/LoginGate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
MirServer/LoginSrv/LoginSrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
MirServer/LoginSrv/LoginSrv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
MirServer/Mir200/Envir/QuestDiary/Mrrp系列脚本/脱机系统/数据文件/Mrrp_脱机玩家变量数据.ps1
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
MirServer/Mir200/Envir/QuestDiary/Mrrp系列脚本/脱机系统/数据文件/Mrrp_脱机玩家变量数据.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
MirServer/Mir200/IPLocal.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
MirServer/Mir200/IPLocal.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
MirServer/Mir200/M2Server.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
MirServer/Mir200/M2Server.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
MirServer/Mir200/Mir.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
MirServer/Mir200/Mir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
MirServer/Mir200/map/360trad.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
MirServer/Mir200/map/360trad.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
MirServer/Mud2/DB/物品编号排序器.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
MirServer/Mud2/DB/物品编号排序器.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
MirServer/RunGate/RunGate.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
MirServer/RunGate/RunGate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
11111111RunGate0227/RunGate.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
11111111RunGate0227/RunGate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
MirServer/SelGate/SelGate.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
MirServer/SelGate/SelGate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
MirServer/胖妞赌博插件.exe
Resource
win7-20240903-en
Target
52133c6d401b3fad315e1e71758b6daf_JaffaCakes118
Size
16.0MB
MD5
52133c6d401b3fad315e1e71758b6daf
SHA1
f114c1f6f2c4369c8ea4cd2360fbd094ca2cfad9
SHA256
c54e7f63aa28b1ef924a5d22e006532957604ffa8ad62ae48f9e256c88321af7
SHA512
9c2c90260f44424750ed9d954ddeaf8ad0a7334f47256b4b9b2cf1522d90a2bea8cfc2145de4a91ffe3e6c6dbdbd3aa5960c864d888dfb5a7ca67514cf608a5c
SSDEEP
393216:we6XWRwDRdUlpnP6ifpDWKJLgFumYBY2DIgvQuEG+fp6qF+r:wn+ZTnP6ibJLgFnQYCI4rE5QRr
resource | yara_rule |
---|---|
static1/unpack001/MirServer/DBServer/DBServer.exe | aspack_v212_v242 |
static1/unpack001/MirServer/LoginGate/LoginGate.exe | aspack_v212_v242 |
static1/unpack001/MirServer/LoginSrv/LoginSrv.exe | aspack_v212_v242 |
static1/unpack001/MirServer/Mir200/IPLocal.dll | aspack_v212_v242 |
static1/unpack001/MirServer/Mir200/M2Server.exe | aspack_v212_v242 |
static1/unpack001/MirServer/Mir200/Mir.Dat | aspack_v212_v242 |
static1/unpack001/MirServer/Mud2/DB/物品编号排序器.exe | aspack_v212_v242 |
static1/unpack001/MirServer/SelGate/SelGate.exe | aspack_v212_v242 |
resource | yara_rule |
---|---|
static1/unpack005/11111111RunGate0227/RunGate.exe | vmprotect |
resource | yara_rule |
---|---|
static1/unpack001/MirServer/胖妞赌博插件.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/MirServer/DBServer/DBServer.exe |
unpack001/MirServer/GameCentev.exe |
unpack001/MirServer/LogServer/LogDataServer.exe |
unpack001/MirServer/LoginGate/LoginGate.exe |
unpack001/MirServer/LoginSrv/LoginSrv.exe |
unpack001/MirServer/Mir200/IPLocal.dll |
unpack001/MirServer/Mir200/M2Server.exe |
unpack001/MirServer/Mir200/Mir.Dat |
unpack001/MirServer/Mir200/map/360trad.exe |
unpack001/MirServer/Mud2/DB/物品编号排序器.exe |
unpack001/MirServer/RunGate/RunGate.exe |
unpack005/11111111RunGate0227/RunGate.exe |
unpack001/MirServer/SelGate/SelGate.exe |
unpack001/MirServer/胖妞赌博插件.exe |
unpack006/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Init
UnInit
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapAlloc
GetProcessHeap
VirtualAlloc
Sleep
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
GetLastError
RaiseException
InterlockedExchange
LocalAlloc
GetStartupInfoA
GetModuleHandleA
exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_XcptFilter
_exit
??2@YAPAXI@Z
free
realloc
??3@YAXPAX@Z
_acmdln
_stricmp
Hai
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetEnvironmentVariableA
CompareStringW
LCMapStringW
GetConsoleMode
GetConsoleCP
IsProcessorFeaturePresent
GetStringTypeW
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
HeapCreate
GetStdHandle
IsValidCodePage
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapSize
HeapQueryInformation
GetFileType
WideCharToMultiByte
SetStdHandle
HeapReAlloc
VirtualQuery
GetSystemInfo
RaiseException
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
CreateFileW
HeapAlloc
DecodePointer
EncodePointer
FindResourceExW
VirtualProtect
SearchPathA
GetProfileIntA
InitializeCriticalSectionAndSpinCount
GetNumberFormatA
GetWindowsDirectoryA
GetTempPathA
GetTempFileNameA
SetErrorMode
GetOEMCP
GetCPInfo
GetACP
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileAttributesExA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
WriteConsoleW
HeapFree
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
lstrcmpiA
lstrcpyA
DeleteFileA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GetCurrentDirectoryA
InterlockedDecrement
GetModuleFileNameW
ReleaseActCtx
CreateActCtxW
GlobalGetAtomNameA
GlobalFindAtomA
GetVersionExA
lstrcmpW
GlobalAddAtomA
WaitForSingleObject
ResumeThread
SetThreadPriority
CopyFileA
GlobalSize
FormatMessageA
LocalFree
lstrlenW
MulDiv
GlobalUnlock
lstrlenA
GetModuleHandleA
FindResourceA
FreeResource
GlobalFree
LoadLibraryW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
GetUserDefaultUILanguage
ConvertDefaultLocale
GetSystemDefaultUILanguage
GetLocaleInfoA
CompareStringA
ActivateActCtx
GetLastError
DeactivateActCtx
SetLastError
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
GetModuleHandleW
FreeLibrary
CreateThread
InitializeCriticalSection
GetProcAddress
LoadLibraryA
VirtualAlloc
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleFileNameA
CloseHandle
WriteFile
CreateFileA
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
ExitProcess
Sleep
ExitThread
WritePrivateProfileStringA
GetTickCount
GetCommandLineW
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
FrameRect
LoadImageW
EmptyClipboard
CloseClipboard
SetClipboardData
OpenClipboard
CopyImage
GetIconInfo
HideCaret
InvertRect
RegisterClipboardFormatA
LockWindowUpdate
SetCursorPos
CreateAcceleratorTableA
LoadAcceleratorsW
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
DrawFocusRect
DrawFrameControl
DrawEdge
DrawIconEx
SetClassLongA
DestroyAcceleratorTable
SetParent
UnpackDDElParam
ReuseDDElParam
LoadMenuA
LoadImageA
LoadAcceleratorsA
InsertMenuItemA
BringWindowToTop
TranslateAcceleratorA
UnregisterClassA
DestroyIcon
GetMenuDefaultItem
SetMenuDefaultItem
CreatePopupMenu
IsMenu
MonitorFromPoint
UpdateLayeredWindow
EnableScrollBar
UnionRect
IsZoomed
GetAsyncKeyState
NotifyWinEvent
RedrawWindow
SetWindowRgn
GetNextDlgGroupItem
InvalidateRgn
IntersectRect
IsRectEmpty
CopyAcceleratorTableA
OffsetRect
CharNextA
CharUpperA
SetRect
MessageBeep
IsClipboardFormatAvailable
GetSysColorBrush
EnumDisplayMonitors
SetRectEmpty
RealChildWindowFromPoint
DeleteMenu
ReleaseCapture
LoadCursorA
LoadCursorW
WindowFromPoint
SetCapture
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
CheckDlgButton
LoadIconA
SendDlgItemMessageA
CopyIcon
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
InvalidateRect
UpdateWindow
DrawStateA
SystemParametersInfoA
DestroyMenu
GetMenuItemInfoA
InflateRect
ShowOwnedPopups
SetCursor
IsWindowVisible
GetKeyState
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
UnhookWindowsHookEx
GetCursorPos
CallNextHookEx
GetFocus
GetWindowRect
PtInRect
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
CharUpperBuffA
PostThreadMessageA
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
GetWindowRgn
DestroyCursor
SubtractRect
MapVirtualKeyExA
IsCharLowerA
TabbedTextOutA
FillRect
GetMenuState
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
MapVirtualKeyA
GetKeyNameTextA
GetDoubleClickTime
GetUpdateRect
CreateMenu
WinHelpA
TranslateMDISysAccel
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
KillTimer
WaitMessage
PeekMessageA
SetTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowLongA
CreateWindowExA
GetClassNameA
PostQuitMessage
PostMessageA
MessageBoxA
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
LoadMenuW
SendMessageA
AppendMenuA
GetSystemMenu
LoadIconW
EnableWindow
SetLayeredWindowAttributes
GetTextExtentPoint32A
CreateDIBitmap
CreateCompatibleBitmap
GetTextMetricsA
EnumFontFamiliesA
GetTextCharsetInfo
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
SetRectRgn
CombineRgn
GetMapMode
CreateRoundRectRgn
CreateDIBSection
CreatePolygonRgn
CreateEllipticRgn
Polyline
Ellipse
Polygon
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
RealizePalette
CreateFontIndirectA
CreateSolidBrush
SetDIBColorTable
StretchBlt
SetPixel
Rectangle
EnumFontFamiliesExA
ExtFloodFill
SetPaletteEntries
LPtoDP
GetWindowOrgEx
GetViewportOrgEx
PtInRegion
FillRgn
FrameRgn
GetBoundsRect
GetTextFaceA
SetPixelV
SetViewportOrgEx
SelectObject
Escape
GetSystemPaletteEntries
CreateHatchBrush
ExtTextOutA
CreatePen
GetObjectType
OffsetViewportOrgEx
SelectPalette
GetStockObject
CreateCompatibleDC
CreateBitmap
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
OffsetRgn
CreateRectRgnIndirect
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetObjectA
CreateRectRgn
SelectClipRgn
DeleteObject
SetLayout
GetLayout
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateDCA
CopyMetaFileA
GetDeviceCaps
PatBlt
SetViewportExtEx
AlphaBlend
TransparentBlt
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCloseKey
RegEnumValueA
DragQueryFileA
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHAppBarMessage
ShellExecuteA
CommandLineToArgvW
DragFinish
SHGetFileInfoA
InitCommonControlsEx
ImageList_GetIconSize
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathRemoveFileSpecW
CoUninitialize
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
OleLockRunning
CoCreateInstance
CoTaskMemFree
CoLockObjectExternal
RegisterDragDrop
CoInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
IsAccelerator
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CreateStreamOnHGlobal
OleIsCurrentClipboard
OleFlushClipboard
DoDragDrop
CoInitializeEx
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
RevokeDragDrop
CLSIDFromString
CLSIDFromProgID
CoCreateGuid
OleGetClipboard
CoRegisterMessageFilter
CoRevokeClassObject
SysFreeString
VarBstrFromDate
VariantCopy
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysAllocStringLen
ord8
GdiplusStartup
GdipDrawImageI
GdipGetImageGraphicsContext
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdiplusShutdown
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
WSAStartup
WSACleanup
WSASetLastError
inet_ntoa
gethostbyname
gethostname
listen
bind
WSAGetLastError
connect
inet_addr
htons
socket
send
WSAAsyncSelect
setsockopt
ioctlsocket
closesocket
accept
recv
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
ImmGetOpenStatus
ImmReleaseContext
ImmGetContext
PlaySoundA
d�z��U��X*��t*�5�v�f19���gp�~pޓ�]=ia�������pa��7k�^ϻLg�>�"�� x[��;�<zqe*��Vɠ�[$� ����6�L�c���#(��a� ���i�am��r�F{���,?c&$3��`s4?B21vf�#����*�������2ض ��{@���������S#lC����t�������)�6T��x�Uڱ1C{���I~X�j���^��<�d�saV��N�Ż(+qr�4s��28^���|�cP�l�;l0RCqq����d������;^�����w �.ax�����G&pI��%������� C�6u$�]�E�g@X_8�?�3��Oj�p����mĤ$�٬w����� ����2k3��x6�/N�<TCK F�q{7�ؒ���T���L�f�KG�`͎@&����]a���aãrEqv���j�h1R�M���n}�3�$��!w��@���L7_�e�M��՟1� _�E�� �p7m�z_�U����p����`ntY=���x�1O���v-Ss��q��3 ��i��J�`��@�WRx),���%4���J��|���>i:{�8)�`ҙ嘏|�|Xf�I��@B�;����#�~k{O��M�c�`����N�x�-����\@�$�[9�����Ѫ?G����O��V*E���p�>�6!s}4�������s�_#i�w]K�W�㿠:ur����+u(��gB|WϵŤ����������9�K��)�L��3�ll�����i_h~Ji��Np� �����a�si��l����G!8?�¦4Sx�������0�:#��QQSN�m��$�R���@�p0&���j��H���:�J-Ƶ���i���Z=r�U���]��g?�q)��ڦ��J����+zT���]}dz� ����=iq�Ե�<��~����O�j���3+^a{�+�+w���Ԇ��/I���a��yI�߁�d�A����2��y�&��X鸊�r��� 9��eo b䷎�,��g:ѪZ,;��E�bJ:��;���=>+�L�'��{�ڭ�~He0=r��� ۿ~z�(��s������T�vK�P��>� �~ߋ��/8�.����J���zf���)���P�#g�.��SZ����%���ҙ7�.+�%Qe�> '�Γ��N���Quyo�"�D��8�3��MmLg�D��lU:dG�@�<���b��6��I9�;�#'rq<�R�����]H����i�G�^����!'��sa��� v#�V�f�@���J� >�X�s4ꈌLu�t�̢*���ו���Sp��o.x�-���}L�i�ږ[���od�ئ���N &jw�a�!_c�h���PXi!0�C�%'欤0Q�0$[(as�-WGg-ű��Y`�8�v�S1u�Y�G�@�W��z;"=O�;�ǘ\�j�T�t۶k��'��1�&�:�i���ǛRE��/.����[�0�_O��EO��YҘ����̢j��+�Ϛ����㗣5G�Ã�Iք��ѕr^�$en��D+���:-��0���+0�m�}I�8<4�/O=;�X�s��W@<�{�f�^3��ˠ#�]�)70�Cy�����Ȅ������Wp��Oһ�w���_2Z ���S��J6�l�d�g�fI �=O�X�˥t 2�h�l��L�����'�u+{�H�K;L$��t_��:��r�T��J=>ob���z$I��a̸�/��g���)_���:���<j�L�6X�`#�2���|�UΏP�]f��ч��ۃ�R0���&����L$p��'5�T��f5N������@���,��fٛ�,\�IF\:��jT�|Ϊ ǵ�*z�8b!�� e��'1����#d�ܡ�}�Nk�r��U�;������cK4�8�d�H|R7�����,4��a����#�Ş>�Q� �ur��z�FO7�� ���c����g�z�ݡ��-����7d瑸�Y��2�vl�ml�:�P�|T�����_������|=E�6��0��PЃ����A!~��%��G<�W1q��<ߑ+"߯u^s���UǞP�����`�Z�Y]�e��n� �ݸSH"������w���e�3����H�r�{9@��m)��a���j�(c�{c#���Y/���f��4z �����_�f�0���(�C_rLGϾb9���_."�,��7�<�M������_og7I�'V���]Z�{��Z�*_��SVP� Y�e����������i����-�� �6A miD�@(�?����)*�b�Ri|�Z�*X�L� �C�&G"I ��N_�9-��7�V�CQ��r<�P��v��Mvu����{yU{mP��V� ��N��h�͠2�Rr�� ��|�T�'F�'� ���3I6�X�;ɐ���(/�u<`�w6i�)X0�LpG0� �(E���ʞ8"�Oϣ��xH�m+q6nF��� �P���yH�C>� b-�5i�`@����{����A�Jb_5k}产i�a��u������ʜ��r,$�GwǍ�g��)�#��A��U������R��4�&H�k���T���=�rw2\ݳ���G�m�W<&qk��r1�s�I�i��?�f^�'���:ŏ4>Yq=������cI�I����u,��A�ح��ꈹ�M"\Ó��$gZ�m��� � ���CRh��`l�w� ŲO�+�J�%�k��+!���*�2�̡F�w��H-��������Q���3Oo�t��ޗ��m7�x�� ud������Ĕ4�}�4qu��Bٞ�qv+u&�����kXP � Ẅf�����;@�:�`>u�:��?�u�Z�8=�?u6<QK?���j�%a����JE��E���M|��í^��ҕ�4ܻ��-֟����1�܋�Q0~�J/�ޱ,��<�����]���'���������hgS�>?��daf�=��R s�v�%�XD�ȥz�6�ˋ�ۦ%J<��K��*�oS����:��y�9l�^�H��G�zO��� �����~D���1��0O+�����]��7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ