GetHookAPIs
NotifyShims
Behavioral task
behavioral1
Sample
AcGenral.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
AcLayers.dll
Resource
win7-20231023-en
Target
File.zip
Size
5.4MB
MD5
fd07c66c72aeeceecd3b54da560b03da
SHA1
159e64c7bb5f7dea64a89f80502cf02a95397e0a
SHA256
14fd3cd7e81a48af0c056c420dc62f7fd52f95ae96617e379e2f7ffc166d37aa
SHA512
76623f00d4f02f805797f7952dd1530324f2991ceb4625515e8879f9ea0dc3c2cc958809f3fb7d9ccbc4181d52ad4c03ccac86c13d6d6d6f22beb52790c9a392
SSDEEP
98304:kNoOrhfhzTCp8vX0Ty6kiKX1NXQHdnCVpEJyZsb9zfYodEROYH:Yjfhnv6kiI4dC/EJyZsFQxOYH
resource | yara_rule |
---|---|
static1/unpack001/Install.exe | themida |
Checks for missing Authenticode signature.
resource |
---|
unpack001/AcGenral.dll |
unpack001/AcLayers.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SE_COM_AddHook
SE_COM_HookObject
SE_COM_Lookup
SE_COM_HookInterface
SE_CALLBACK_Lookup
SE_ShimDPF
SE_GetShimId
SdbInitDatabase
SdbGetPDBFromGUID
SdbResolveDatabase
SdbOpenLocalDatabase
SE_COM_AddServer
SE_CALLBACK_AddHook
SdbReleaseDatabase
SdbGetStringTagPtr
SdbFindNextTag
SdbFindFirstTag
memcmp
_local_unwind4
_CxxThrowException
memcpy
__CxxFrameHandler3
_wcsicmp
_vsnwprintf
_XcptFilter
_amsg_exit
free
malloc
_initterm
?terminate@@YAXXZ
_except_handler4_common
_lock
memmove
__dllonexit
_onexit
??1type_info@@UAE@XZ
_vscprintf
_wcsupr
wcspbrk
wcschr
wcscpy_s
towupper
towlower
iswctype
wcsspn
toupper
wcsrchr
memset
_unlock
strrchr
wcstoul
_errno
_wcsnicmp
strchr
strtoul
wcstol
atoi
_vscwprintf
_vsnprintf
wcsncmp
strtok
atol
wcsstr
_stricmp
strstr
qsort
_wtoi
wprintf
_wcslwr_s
_wcslwr
_wsplitpath_s
iswspace
swscanf_s
_strnicmp
strncmp
wcscat_s
wcstok_s
_tempnam
RtlIsNameInExpression
RtlInitializeCriticalSection
NtQueryInformationThread
NtQueryVirtualMemory
NtProtectVirtualMemory
DbgPrint
NtSetInformationProcess
NtClose
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlUnicodeStringToInteger
RtlInitUnicodeString
RtlGUIDFromString
RtlIsDosDeviceName_U
RtlCreateServiceSid
RtlGetNtSystemRoot
RtlDosPathNameToNtPathName_U
NtOpenFile
NtQuerySecurityObject
RtlGetOwnerSecurityDescriptor
RtlEqualSid
NtOpenKey
NtQueryValueKey
NtCreateKey
NtSetValueKey
RtlFormatCurrentUserKeyPath
NtQueryObject
NtConnectPort
NtQueryVolumeInformationFile
RtlFreeUnicodeString
RtlOemStringToUnicodeString
RtlNtStatusToDosError
RtlImageNtHeader
RtlReAllocateHeap
RtlSubAuthoritySid
NtRequestWaitReplyPort
RtlGetDaclSecurityDescriptor
RtlSubAuthorityCountSid
NtQueryInformationToken
RtlFreeHeap
RtlAllocateHeap
RtlIdentifierAuthoritySid
RtlLengthRequiredSid
NtOpenThreadToken
NtOpenProcessToken
RtlInitializeSid
NtQueryInformationProcess
EnumDependentServicesW
ControlService
OpenServiceW
CloseServiceHandle
OpenSCManagerW
CreateServiceW
StartServiceW
DeleteService
ChangeServiceConfigW
QueryServiceStatusEx
EventWriteTransfer
SHGetValueW
SHStrDupW
ord619
SHDeleteKeyW
SetThemeAppProperties
ord67
AllowSetForegroundWindow
MsgWaitForMultipleObjects
PeekMessageW
SetWindowsHookExAW
SetCursor
GetWindowLongA
mouse_event
GetForegroundWindow
ShowWindow
InvalidateRect
SetForegroundWindow
PostMessageW
GetAncestor
GetClassNameW
EmptyClipboard
CharUpperW
DestroyIcon
CreateIconIndirect
GetIconInfo
SetPropW
RemovePropW
PostQuitMessage
RegisterWindowMessageA
EnumDesktopWindows
GetWindowTextA
GetWindowTextLengthA
ScreenToClient
GetWindowInfo
IsWindowVisible
GetWindow
IsChild
WindowFromDC
GetUpdateRgn
ShowCursor
GetActiveWindow
DefWindowProcA
GetShellWindow
SystemParametersInfoA
CloseDesktop
CharNextA
SetThreadDesktop
OpenInputDesktop
EnumDisplayDevicesW
ReleaseDC
GetDC
CallNextHookEx
GetKeyState
SetWindowsHookExA
DispatchMessageW
TranslateMessage
GetMessageW
SetSystemCursor
DestroyCursor
CopyIcon
LoadCursorW
GetWindowLongW
CallWindowProcA
EnumDisplaySettingsW
SendMessageW
RegisterSuspendResumeNotification
GetParent
SetWindowPos
GetWindowRect
GetDesktopWindow
GetMonitorInfoW
MonitorFromRect
GetSystemMetrics
SetRect
SystemParametersInfoW
GetWindowThreadProcessId
GetGUIThreadInfo
wvsprintfA
ChangeWindowMessageFilterEx
ChangeDisplaySettingsA
EnumDisplaySettingsA
SetDlgItemTextA
IsWindow
GetClientRect
IsCharAlphaA
GetPropW
SelectPalette
RealizePalette
DeleteObject
GetCurrentObject
GetPaletteEntries
GetClipBox
CreateRectRgnIndirect
CreatePalette
CreateRectRgn
SetRectRgn
CombineRgn
GetStockObject
CreateDIBSection
GetObjectW
CreateCompatibleDC
GetRgnBox
SelectObject
SetSystemPaletteUse
SetViewportOrgEx
DeleteDC
BitBlt
CreateDCW
GetDeviceCaps
mciSendCommandA
NetLocalGroupAddMembers
NetLocalGroupAdd
CoUninitialize
CoInitialize
CoGetObject
CoTaskMemFree
StringFromCLSID
StringFromGUID2
CoCreateInstance
SysAllocString
SysFreeString
RegisterTypeLibForUser
acmStreamOpen
acmStreamSize
GetFileVersionInfoExW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
SHGetFolderPathEx
SHGetFolderPathW
SHChangeNotify
SHCreateDirectoryExW
SHGetSpecialFolderPathA
ShellExecuteExA
SHGetMalloc
ShellExecuteExW
ord165
SHGetSpecialFolderPathW
GetUserProfileDirectoryA
GetUserProfileDirectoryW
GetAllUsersProfileDirectoryW
DwmIsCompositionEnabled
CoInternetSetFeatureEnabled
GetDriveTypeA
WritePrivateProfileStringW
GetPrivateProfileStringW
CompareStringOrdinal
CompareStringW
CompareStringA
IsDBCSLeadByteEx
lstrlenA
GetLocaleInfoW
IsValidLocale
lstrcmpA
GetVolumeInformationW
DeviceIoControl
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetProcessAffinityMask
GetLogicalProcessorInformationEx
GetCurrentProcessorNumberEx
GetModuleHandleA
CheckElevationEnabled
ExpandEnvironmentStringsW
GetUserDefaultUILanguage
ResumeThread
WriteProcessMemory
DuplicateHandle
VirtualAllocEx
ReadProcessMemory
OpenProcess
GetSystemInfo
GetWindowsDirectoryW
lstrcmpW
FormatMessageW
QueryPerformanceFrequency
GetSystemTime
ReadFile
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
GetSystemWindowsDirectoryW
AddDllDirectory
IsNLSDefinedString
FindNLSStringEx
WideCharToMultiByte
HeapReAlloc
FindNextFileA
InitializeCriticalSection
OutputDebugStringA
RaiseException
SearchPathA
QueryActCtxSettingsW
GetShortPathNameW
GetLongPathNameW
GetFullPathNameW
GetTempPathW
GetTempFileNameW
SearchPathW
lstrcmpiW
GlobalAlloc
ResolveDelayLoadedAPI
DelayLoadFailureHook
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
ProcessIdToSessionId
CreateActCtxW
LCMapStringEx
GetLocaleInfoEx
LCIDToLocaleName
CompareStringEx
GetTickCount64
GetBinaryTypeW
GetShortPathNameA
Module32First
CreateToolhelp32Snapshot
SetEvent
ResetEvent
WaitForMultipleObjects
CreateEventW
LoadLibraryA
GetSystemDirectoryA
CreateThread
ReleaseActCtx
QueryActCtxW
SetThreadPriority
SetThreadPriorityBoost
GetVersionExW
GetCommandLineW
GetDiskFreeSpaceExW
GetDiskFreeSpaceExA
GlobalFree
GetUserDefaultLCID
FreeLibrary
LoadLibraryExW
SetEnvironmentVariableA
FlushFileBuffers
DeleteFileW
FreeResource
GetFileSize
MapViewOfFile
UnmapViewOfFile
SetFileAttributesA
CopyFileA
MoveFileA
GetFileAttributesA
GetEnvironmentVariableA
MultiByteToWideChar
FindResourceW
CloseHandle
OpenMutexW
GetCurrentProcessId
CreateMutexW
Sleep
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleW
GetProcAddress
HeapAlloc
GetProcessHeap
GetCommandLineA
GetEnvironmentVariableW
SetEnvironmentVariableW
CreateProcessA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
HeapSize
HeapValidate
InitializeCriticalSectionAndSpinCount
VirtualAlloc
VirtualFree
SetProcessInformation
IsWow64Process
WaitForSingleObject
GetExitCodeProcess
GetModuleFileNameW
HeapFree
GetCurrentThread
CreateFileMappingA
CreateFileMappingW
GetLastError
LocalFree
GetDriveTypeW
CopyFileW
SetFileAttributesW
GetSystemDirectoryW
LoadLibraryW
MoveFileExW
GetTempPathA
GetTempFileNameA
CreateProcessW
WriteFile
GetFileAttributesW
FindFirstFileW
FindNextFileW
FindClose
GetLogicalDrives
lstrlenW
FindResourceA
SizeofResource
LocalAlloc
LoadResource
LockResource
CreateFileA
DeleteFileA
SetErrorMode
SetLastError
GetCurrentDirectoryW
IsDBCSLeadByte
IsBadWritePtr
IsBadReadPtr
IsBadStringPtrA
IsBadStringPtrW
VirtualQuery
VirtualProtect
GlobalMemoryStatusEx
GetModuleFileNameA
CreateFileW
DeleteCriticalSection
RegSetKeySecurity
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegSetValueExW
RegEnumKeyExW
ConvertStringSidToSidW
LookupAccountSidW
RegOpenKeyExA
RegQueryValueExA
SetNamedSecurityInfoW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorDacl
GetSecurityDescriptorControl
OpenProcessToken
LookupPrivilegeValueW
QueryServiceStatus
GetTokenInformation
CheckTokenMembership
RegUnLoadKeyW
RegLoadKeyW
GetNamedSecurityInfoW
RegGetValueW
FreeSid
AllocateAndInitializeSid
EqualSid
GetAclInformation
SetEntriesInAclW
GetExplicitEntriesFromAclW
GetAce
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AdjustTokenPrivileges
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSecurityDescriptorLength
RegGetKeySecurity
LsaClose
LsaAddAccountRights
LsaNtStatusToWinError
LsaOpenPolicy
CreateWellKnownSid
RegSetValueExA
RegDeleteValueW
RegDeleteKeyExW
RegOpenKeyExW
OpenPrinterA
ord201
GetPrinterA
ClosePrinter
EnumPrintersA
RpcBindingSetAuthInfoExW
I_RpcExceptionFilter
RpcAsyncCompleteCall
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcAsyncInitializeHandle
NdrAsyncClientCall
RpcStringFreeW
RpcAsyncCancelCall
RpcBindingFree
WNetGetConnectionW
GetUserNameExW
ApiSetQueryApiSetPresence
GetHookAPIs
NotifyShims
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SE_COM_AddServer
SE_COM_HookObject
SE_COM_Lookup
SE_ShimDPF
SE_COM_AddHook
SE_GetShimId
memcpy
memcmp
_CxxThrowException
memmove
__CxxFrameHandler3
_wcsicmp
_vscwprintf
_vsnwprintf
_vsnprintf
_stricmp
atol
strstr
sprintf_s
vsprintf_s
sscanf_s
wcsncmp
_wcsnicmp
_scwprintf
wcsrchr
wcsspn
iswctype
towlower
wcscpy_s
wcscat_s
wcschr
wcspbrk
_wcslwr
wcsstr
_vscprintf
iswspace
_XcptFilter
_amsg_exit
free
malloc
_initterm
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_except_handler4_common
memset
RtlAllocateHeap
RtlFreeHeap
RtlInitUnicodeString
RtlEqualUnicodeString
RtlImageNtHeader
NtClose
RtlReportException
NtTerminateProcess
RtlRaiseException
NtQueryInformationProcess
RtlUniform
RtlValidateHeap
RtlCaptureStackBackTrace
RtlCaptureContext
WinSqmAddToStream
NtOpenFile
NtQueryObject
LdrAccessResource
NtQuerySystemInformation
RtlLengthRequiredSid
RtlInitializeSid
NtQueryInformationToken
RtlSubAuthoritySid
RtlCreateUnicodeStringFromAsciiz
RtlFreeUnicodeString
RtlMultiByteToUnicodeN
RtlNtStatusToDosError
RtlUnicodeToMultiByteSize
RtlUnicodeToMultiByteN
NtQueryKey
NtOpenKey
NtQueryValueKey
RtlGetOwnerSecurityDescriptor
RtlEqualSid
RtlAppendUnicodeToString
RtlFormatCurrentUserKeyPath
RtlGetLastNtStatus
RtlSetLastWin32ErrorAndNtStatusFromNtStatus
RtlCreateServiceSid
RtlGetNtSystemRoot
RtlDosPathNameToNtPathName_U
NtQuerySecurityObject
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExA
RegGetKeySecurity
RegDeleteKeyExW
RegEnumKeyExW
RegOpenKeyExW
GetSecurityDescriptorDacl
GetTokenInformation
GetAce
CheckTokenMembership
GetFileSecurityW
CopySid
AllocateAndInitializeSid
GetAclInformation
FreeSid
EventWriteTransfer
AllowSetForegroundWindow
MsgWaitForMultipleObjects
CharUpperW
EnumDisplaySettingsW
GetCapture
ScreenToClient
GetAncestor
WindowFromPoint
InvalidateRect
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
SetLayeredWindowAttributes
RegisterClassExW
LoadCursorW
GetClassInfoExW
KillTimer
EndPaint
BeginPaint
DefWindowProcW
GetSystemMetrics
PostQuitMessage
SetWindowPos
ChangeDisplaySettingsA
EnumDisplaySettingsA
GetWindowThreadProcessId
GetGUIThreadInfo
GetDesktopWindow
GetMonitorInfoW
PeekMessageW
SetCursor
EnableWindow
CreateWindowExW
GdiFlush
GetObjectType
CreateCompatibleDC
CreateDIBSection
GetDIBits
DeleteObject
DeleteDC
CreateSolidBrush
OffsetWindowOrgEx
CreateCompatibleBitmap
SelectObject
OffsetClipRgn
OffsetRgn
SHGetFolderPathW
SHGetFolderPathA
ord9
ord10
StrChrA
StrRChrA
ord8
StrCmpNIA
ord7
StrStrIA
StrCSpnA
StrToIntA
StrChrW
StrRChrW
ord346
StrCmpNIW
StrStrW
StrRetToBufW
StrCSpnW
StrToIntW
StrChrIA
StrChrIW
StrRChrIA
StrRChrIW
StrRStrIA
StrRStrIW
StrCSpnIA
StrCSpnIW
IntlStrEqWorkerA
IntlStrEqWorkerW
PathFindFileNameW
StrCmpNW
StrStrA
StrCmpNA
StrStrIW
SysReAllocString
WNetGetConnectionW
IsDebuggerPresent
ReadFile
WaitForSingleObject
CancelIo
OutputDebugStringA
InitializeCriticalSection
CreateEventW
DeleteCriticalSection
SetNamedPipeHandleState
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
InitializeSRWLock
GetCurrentThread
WerRegisterMemoryBlock
CreateProcessW
IsBadReadPtr
IsWow64Process
ProcessIdToSessionId
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DelayLoadFailureHook
ResolveDelayLoadedAPI
SearchPathW
GetFullPathNameW
GetCurrentDirectoryW
CreateMutexW
OpenMutexW
CreateActCtxW
GetTempFileNameW
GetTempFileNameA
GetTempPathA
GetFileSize
SetFilePointer
CreateFileW
GetVolumeNameForVolumeMountPointW
GetSystemDirectoryW
GetModuleFileNameW
GetWindowsDirectoryW
GetDriveTypeW
GetLogicalDriveStringsW
QueryPerformanceFrequency
QueryPerformanceCounter
WaitForSingleObjectEx
CreateThread
ResetEvent
SetEvent
GetFileAttributesW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
lstrcmpA
RegisterApplicationRestart
GetApplicationRestartSettings
ExpandEnvironmentStringsA
TlsAlloc
GetShortPathNameW
TlsSetValue
GetShortPathNameA
lstrcmpiA
TlsGetValue
GetVersionExW
CompareStringW
CompareStringA
FindClose
FindNextFileW
FindFirstFileW
CreateDirectoryW
GetTempPathW
DeleteFileW
CopyFileW
DeleteFileA
CopyFileA
QueryFullProcessImageNameW
LoadLibraryW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockShared
GetCurrentThreadId
AcquireSRWLockShared
AddAtomW
FindNLSStringEx
IsNLSDefinedString
HeapReAlloc
LCMapStringEx
HeapFree
MultiByteToWideChar
GetProcessHeap
HeapAlloc
GetLocaleInfoEx
CompareStringEx
LCIDToLocaleName
WideCharToMultiByte
ExpandEnvironmentStringsW
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
ResumeThread
SetLastError
ReleaseActCtx
QueryActCtxW
GetCurrentActCtx
LocalFree
LocalAlloc
GetLastError
ExitProcess
GetCurrentProcess
GetModuleHandleW
GetSystemFirmwareTable
CloseHandle
CreateFileA
Sleep
WriteProcessMemory
GetCurrentProcessId
GetEnvironmentVariableA
SetEnvironmentVariableA
WriteFile
GetStartupInfoA
LoadLibraryA
GetProcAddress
GetCommandLineA
GetModuleHandleA
GetVersion
WaitForDebugEvent
ReadProcessMemory
PnpIsFilePnpDriver
SfcIsFileProtected
SfcIsKeyProtected
ord203
RpcBindingFromStringBindingW
RpcStringBindingComposeW
I_RpcExceptionFilter
RpcAsyncCompleteCall
RpcBindingSetAuthInfoExW
RpcStringFreeW
RpcAsyncCancelCall
RpcBindingFree
NdrAsyncClientCall
RpcAsyncInitializeHandle
ApiSetQueryApiSetPresence
GetHookAPIs
NotifyShims
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ