Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
7Static
static
703c9076aef...36.exe
windows10-1703-x64
703c9076aef...36.exe
windows11-21h2-x64
70e9cc0b9e4...bb.exe
windows10-1703-x64
70e9cc0b9e4...bb.exe
windows11-21h2-x64
71b3fe3d032...46.exe
windows10-1703-x64
71b3fe3d032...46.exe
windows11-21h2-x64
72ed120988f...11.exe
windows10-1703-x64
12ed120988f...11.exe
windows11-21h2-x64
1e700024137...26.exe
windows10-1703-x64
1e700024137...26.exe
windows11-21h2-x64
1$PLUGINSDI...ds.dll
windows10-1703-x64
3$PLUGINSDI...ds.dll
windows11-21h2-x64
3$PLUGINSDI...LL.dll
windows10-1703-x64
3$PLUGINSDI...LL.dll
windows11-21h2-x64
3$PLUGINSDI...oc.dll
windows10-1703-x64
7$PLUGINSDI...oc.dll
windows11-21h2-x64
7$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...Ex.dll
windows10-1703-x64
3$PLUGINSDI...Ex.dll
windows11-21h2-x64
3$PLUGINSDI...ry.dll
windows10-1703-x64
3$PLUGINSDI...ry.dll
windows11-21h2-x64
3Behavioral task
behavioral1
Sample
03c9076aefc85294b3a6748931ec671b16de225ae2ed0813e42c02b403f16d36.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
03c9076aefc85294b3a6748931ec671b16de225ae2ed0813e42c02b403f16d36.exe
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
0e9cc0b9e4f5b377252d4d3ae5eb1f6ce211fe18381e0968bf133ae13ac84dbb.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
0e9cc0b9e4f5b377252d4d3ae5eb1f6ce211fe18381e0968bf133ae13ac84dbb.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
1b3fe3d03273f7e337c30f8a68d5520cd2cef2f2b9a53179eee1507443747b46.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
1b3fe3d03273f7e337c30f8a68d5520cd2cef2f2b9a53179eee1507443747b46.exe
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
2ed120988f4925c67b25e64d727c0c1df4dfc28d848db3fa0788c325f7b95e11.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
2ed120988f4925c67b25e64d727c0c1df4dfc28d848db3fa0788c325f7b95e11.exe
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
e70002413704ea8a9c75ae9a3151cb477a07f48775ddea992bbf598bdd530e26.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
e70002413704ea8a9c75ae9a3151cb477a07f48775ddea992bbf598bdd530e26.exe
Resource
win11-20240221-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ChromePasswords.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/ChromePasswords.dll
Resource
win11-20240221-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win11-20240221-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/KillProc.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/KillProc.dll
Resource
win11-20240221-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240221-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/dialogsEx.dll
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/dialogsEx.dll
Resource
win11-20240214-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/registry.dll
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/registry.dll
Resource
win11-20240221-en
Target
Desktop.zip
Size
2.2MB
MD5
0eec047eabbfc531b6d2dca434e7cd77
SHA1
916f109168358ec93c54f3e75dd86d5f8eb84d9d
SHA256
d253d43a182b2ff84e69414c156f76f07736b471362ad37050099c75ced33610
SHA512
95ce174213b141ef94f3b9e9906e8edc2f8cbb26a9cfe80686952a923616a7abd9b32df80e2708631318911bcc242dd61b6ec2bce62431c6f5f86d40e66ff758
SSDEEP
49152:Q4JniyvGPs6gfRK7Gx+eibjqIGmKLMCvQXSePC2AcfYH:Q4RG0hK7Y+Zb+IGmoM4QXS8CfcAH
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack002/$PLUGINSDIR/KillProc.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack002/$PLUGINSDIR/KillProc.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/03c9076aefc85294b3a6748931ec671b16de225ae2ed0813e42c02b403f16d36.exe |
unpack001/0e9cc0b9e4f5b377252d4d3ae5eb1f6ce211fe18381e0968bf133ae13ac84dbb.exe |
unpack001/1b3fe3d03273f7e337c30f8a68d5520cd2cef2f2b9a53179eee1507443747b46.exe |
unpack002/$PLUGINSDIR/ChromePasswords.dll |
unpack002/$PLUGINSDIR/FindProcDLL.dll |
unpack002/$PLUGINSDIR/KillProc.dll |
unpack003/out.upx |
unpack002/$PLUGINSDIR/System.dll |
unpack002/$PLUGINSDIR/dialogsEx.dll |
unpack002/$PLUGINSDIR/registry.dll |
resource | yara_rule |
---|---|
static1/unpack001/e70002413704ea8a9c75ae9a3151cb477a07f48775ddea992bbf598bdd530e26.exe | nsis_installer_1 |
static1/unpack001/e70002413704ea8a9c75ae9a3151cb477a07f48775ddea992bbf598bdd530e26.exe | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
CopyFileW
GlobalFree
lstrcmpW
DeactivateActCtx
ActivateActCtx
CompareStringW
SizeofResource
GetVersionExW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
FreeResource
GetCurrentProcessId
ReleaseActCtx
MultiByteToWideChar
GetLocaleInfoW
GetSystemDefaultUILanguage
ConvertDefaultLocale
GetUserDefaultUILanguage
GetCurrentThread
lstrcmpA
SetThreadPriority
GetPrivateProfileIntW
WritePrivateProfileStringW
GetPrivateProfileStringW
GlobalGetAtomNameW
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
lstrlenA
GetThreadLocale
FileTimeToSystemTime
GetCurrentDirectoryW
DeleteFileW
lstrcpyW
lstrcmpiW
CreateFileW
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileW
GetVolumeInformationW
LocalFree
GetWindowsDirectoryW
GetNumberFormatW
GetFileAttributesExW
FileTimeToLocalFileTime
GetFileAttributesW
GetFileSizeEx
GetFileTime
GetTempFileNameW
GetTempPathW
GetProfileIntW
SearchPathW
VirtualProtect
GetUserDefaultLCID
FindResourceExW
RtlUnwind
RaiseException
ExitThread
CreateThread
DecodePointer
EncodePointer
HeapSetInformation
GetStartupInfoW
HeapReAlloc
ExitProcess
HeapSize
HeapQueryInformation
GetSystemTimeAsFileTime
GetSystemInfo
VirtualQuery
SetStdHandle
GetFileType
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetEnvironmentVariableA
MulDiv
FindResourceW
LoadResource
GetFullPathNameW
LockResource
GetCommandLineA
GetModuleHandleW
GetConsoleWindow
GetModuleFileNameW
GetTickCount
OpenProcess
GetExitCodeProcess
GetSystemDirectoryA
CreateProcessA
VirtualAllocEx
GetThreadContext
SetThreadContext
ResumeThread
GetLocalTime
TryEnterCriticalSection
LoadLibraryW
GetProcAddress
SetWaitableTimer
CreateWaitableTimerW
ResetEvent
lstrlenW
WideCharToMultiByte
CancelIo
CreateEventW
InterlockedExchange
SetLastError
GetCurrentThreadId
SwitchToThread
GetLastError
FormatMessageW
SetEvent
WaitForSingleObject
Sleep
CloseHandle
CreateEventA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
InterlockedDecrement
InterlockedIncrement
InterlockedCompareExchange
VirtualAlloc
FreeLibrary
VirtualFree
ReleaseCapture
DestroyIcon
LoadImageW
DestroyMenu
LoadMenuW
ReuseDDElParam
UnpackDDElParam
GetSystemMetrics
IsZoomed
IsRectEmpty
DeleteMenu
GetSystemMenu
SetParent
GetSysColorBrush
RealChildWindowFromPoint
InflateRect
GetMenuItemInfoW
SystemParametersInfoW
EnumDisplayMonitors
SetLayeredWindowAttributes
CharUpperW
CharNextW
CopyAcceleratorTableW
SetRect
InvalidateRgn
SetCapture
GetNextDlgGroupItem
MessageBeep
PostThreadMessageW
GetKeyNameTextW
MapVirtualKeyW
UnionRect
WindowFromPoint
GetDCEx
LockWindowUpdate
RedrawWindow
GetMenuDefaultItem
GetAsyncKeyState
InvertRect
DrawFocusRect
HideCaret
EnableScrollBar
NotifyWinEvent
GetIconInfo
CopyImage
DrawIconEx
SetWindowRgn
DestroyAcceleratorTable
SetClassLongW
DrawStateW
DrawEdge
DrawFrameControl
ToUnicodeEx
GetKeyboardLayout
GetKeyboardState
CreateAcceleratorTableW
SetCursorPos
OpenClipboard
SetClipboardData
CloseClipboard
EmptyClipboard
IsCharLowerW
MapVirtualKeyExW
UpdateLayeredWindow
MonitorFromPoint
IsMenu
WaitMessage
DefFrameProcW
DefMDIChildProcW
DrawMenuBar
TranslateMDISysAccel
CreateMenu
SetMenuDefaultItem
IsClipboardFormatAvailable
FrameRect
GetUpdateRect
CopyIcon
CharUpperBuffW
GetDoubleClickTime
SubtractRect
DrawIcon
DestroyCursor
GetWindowRgn
GetCursorPos
PostQuitMessage
GetWindowThreadProcessId
IsWindowEnabled
MoveWindow
SetWindowTextW
IsDialogMessageW
CheckDlgButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
LoadAcceleratorsW
CheckMenuItem
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
IsWindow
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
PostMessageW
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetParent
GetWindowRect
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
CopyRect
PtInRect
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
SendMessageW
DefWindowProcW
CallWindowProcW
GetMenu
GetWindowLongW
SetWindowLongW
SetWindowPos
GetWindow
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
ClientToScreen
ScreenToClient
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
GetMenuState
GetMenuStringW
AppendMenuW
GetMenuItemID
InsertMenuW
GetMenuItemCount
GetSubMenu
RemoveMenu
DispatchMessageW
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjects
LoadCursorW
LoadBitmapW
GetClientRect
GetDC
ValidateRect
SetTimer
KillTimer
EnableWindow
UpdateWindow
GetInputState
ShowWindow
InvalidateRect
IsIconic
InsertMenuItemW
CreatePopupMenu
IntersectRect
SetRectEmpty
OffsetRect
BringWindowToTop
TranslateAcceleratorW
GetDesktopWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
RegisterClipboardFormatW
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
SetCursor
GetMessageW
EnableMenuItem
GetActiveWindow
SetRectRgn
CombineRgn
GetMapMode
PatBlt
DPtoLP
CreateDIBitmap
EnumFontFamiliesW
GetTextCharsetInfo
GetBkColor
GetTextColor
GetRgnBox
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
RealizePalette
GetSystemPaletteEntries
CreateDIBSection
CreateRoundRectRgn
CreatePolygonRgn
CreateEllipticRgn
Polyline
Ellipse
Polygon
SetDIBColorTable
CopyMetaFileW
CreateDCW
SaveDC
RestoreDC
SetBkColor
SetBkMode
SetPolyFillMode
SetROP2
SetTextColor
CreateRectRgnIndirect
SetMapMode
GetClipBox
ExcludeClipRect
IntersectClipRect
CreateCompatibleBitmap
GetObjectW
CreateCompatibleDC
BitBlt
StretchBlt
CreateFontIndirectW
GetTextExtentPoint32W
GetTextMetricsW
StretchDIBits
CreateFontW
GetCharWidthW
CreateHatchBrush
LineTo
MoveToEx
CreateSolidBrush
CreatePen
GetObjectType
SelectPalette
GetStockObject
CreateBitmap
CreatePatternBrush
SetTextAlign
GetLayout
SetLayout
DeleteObject
SelectClipRgn
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
GetDeviceCaps
GetTextFaceW
SetPixelV
SetPaletteEntries
ExtFloodFill
GetBoundsRect
FrameRgn
FillRgn
PtInRegion
GetViewportOrgEx
GetWindowOrgEx
LPtoDP
SetPixel
Rectangle
OffsetRgn
EnumFontFamiliesExW
SetWindowExtEx
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyW
RegQueryValueW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyExW
RegCreateKeyW
RegSetValueExW
RegQueryValueExW
AlphaBlend
TransparentBlt
ImageList_GetIconSize
InitCommonControlsEx
PathIsUNCW
PathStripToRootW
PathFindFileNameW
PathFindExtensionW
PathRemoveFileSpecW
OleUIBusyW
WSAEnumNetworkEvents
WSACloseEvent
WSASetLastError
WSAStartup
WSAResetEvent
WSACleanup
closesocket
setsockopt
WSAIoctl
connect
htons
gethostbyname
socket
recv
select
send
WSAGetLastError
WSAEventSelect
WSACreateEvent
WSAWaitForMultipleEvents
shutdown
PlaySoundW
mciSendStringW
timeGetTime
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
GdipGetImageGraphicsContext
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipDeleteGraphics
GdipDrawImageI
GdipFree
GdipAlloc
GdipBitmapUnlockBits
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
ClosePrinter
OpenPrinterW
DocumentPropertiesW
GetFileTitleW
DragFinish
SHGetFileInfoW
SHGetDesktopFolder
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
SHBrowseForFolderW
SHAppBarMessage
DragQueryFileW
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
OleLockRunning
DoDragDrop
CLSIDFromProgID
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
CoCreateGuid
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
CreateStreamOnHGlobal
CoInitializeEx
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitialize
CoUninitialize
CoCreateInstance
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
OleGetClipboard
CLSIDFromString
SysFreeString
SysAllocString
VariantCopy
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysStringLen
VarBstrFromDate
OleCreateFontIndirect
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
ResetEvent
CreateEventW
CancelIo
TryEnterCriticalSection
SetWaitableTimer
LoadLibraryW
GetProcAddress
LeaveCriticalSection
GetThreadContext
SetThreadContext
OpenProcess
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
ResumeThread
GetTickCount
GetConsoleWindow
GetModuleFileNameW
CreateThread
CreateFileW
LCMapStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
HeapDestroy
InitializeCriticalSectionAndSpinCount
HeapFree
HeapAlloc
VirtualAlloc
CreateWaitableTimerW
VirtualFree
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
FlushFileBuffers
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwindEx
FlsAlloc
FlsFree
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
DecodePointer
EncodePointer
GetCommandLineW
RaiseException
RtlPcToFileHeader
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapSetInformation
GetVersion
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FlsGetValue
FlsSetValue
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
WSAWaitForMultipleEvents
WSAIoctl
connect
select
htons
WSAResetEvent
WSACleanup
recv
socket
closesocket
gethostbyname
send
WSASetLastError
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
setsockopt
WSAStartup
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
HeapCreate
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
Sleep
CreateEventA
GetLastError
CloseHandle
GetCurrentThreadId
SwitchToThread
SetLastError
WideCharToMultiByte
lstrlenW
ResetEvent
CreateEventW
CancelIo
TryEnterCriticalSection
SetWaitableTimer
LoadLibraryW
LeaveCriticalSection
CreateWaitableTimerW
GetThreadContext
SetThreadContext
OpenProcess
GetExitCodeProcess
CreateProcessA
GetSystemDirectoryA
VirtualAllocEx
ResumeThread
GetTickCount
GetConsoleWindow
GetModuleFileNameW
CreateFileW
LCMapStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
HeapDestroy
InitializeCriticalSectionAndSpinCount
HeapFree
HeapAlloc
VirtualAlloc
GetProcAddress
VirtualFree
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
FlushFileBuffers
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwindEx
FlsAlloc
FlsFree
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
CreateThread
DecodePointer
EncodePointer
GetCommandLineW
RaiseException
RtlPcToFileHeader
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapSetInformation
GetVersion
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FlsGetValue
FlsSetValue
DispatchMessageW
PostThreadMessageA
PeekMessageW
TranslateMessage
MsgWaitForMultipleObjects
ShowWindow
GetInputState
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
WSAWaitForMultipleEvents
WSAIoctl
WSAStartup
select
htons
WSAResetEvent
WSACleanup
recv
socket
closesocket
gethostbyname
send
WSASetLastError
WSACreateEvent
shutdown
WSAEventSelect
WSAEnumNetworkEvents
WSAGetLastError
WSACloseEvent
setsockopt
connect
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetUserNameA
AcquireSRWLockExclusive
CloseHandle
CompareStringW
CreateFileW
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileSizeEx
GetFileType
GetLastError
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetUserDefaultLCID
GlobalMemoryStatusEx
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringEx
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
ReleaseSRWLockExclusive
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetEnvironmentVariableW
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
SleepConditionVariableSRW
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WakeAllConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetFileAttributesA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CompareFileTime
SearchPathA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
CreateDirectoryA
lstrcmpiA
GetTempPathA
GetCommandLineA
GetVersion
SetErrorMode
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
LoadLibraryA
SetFileTime
CloseHandle
GlobalFree
lstrcmpA
ExpandEnvironmentStringsA
GetExitCodeProcess
GlobalAlloc
WaitForSingleObject
ExitProcess
GetWindowsDirectoryA
GetProcAddress
FindFirstFileA
FindNextFileA
DeleteFileA
SetFilePointer
ReadFile
FindClose
GetPrivateProfileStringA
WritePrivateProfileStringA
WriteFile
MulDiv
LoadLibraryExA
GetModuleHandleA
MultiByteToWideChar
FreeLibrary
GetWindowRect
EnableMenuItem
GetSystemMenu
ScreenToClient
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetForegroundWindow
PostQuitMessage
RegisterClassA
EndDialog
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
OpenClipboard
TrackPopupMenu
SendMessageTimeoutA
GetDC
LoadImageA
GetDlgItem
FindWindowExA
IsWindow
SetClipboardData
SetWindowLongA
EmptyClipboard
SetTimer
CreateDialogParamA
wsprintfA
ShowWindow
SetWindowTextA
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
RegDeleteValueA
SetFileSecurityA
RegOpenKeyExA
RegDeleteKeyA
RegEnumValueA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ImageList_Create
ImageList_Destroy
ord17
ImageList_AddMasked
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
F:\User\Programming\NSIS\GoogleChromePortable\ChromePasswords\Release\ChromePasswords.pdb
WriteFile
InitializeCriticalSection
WideCharToMultiByte
LoadLibraryW
Sleep
FormatMessageW
GetVersionExW
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
ReadFile
CreateFileW
MultiByteToWideChar
FlushFileBuffers
GetTempPathW
GetLastError
GetProcAddress
LockFileEx
FormatMessageA
GetDiskFreeSpaceW
LoadLibraryA
GetDiskFreeSpaceA
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DeleteFileW
GetCurrentProcessId
GetTempPathA
LocalFree
GetSystemTime
AreFileApisANSI
DeleteFileA
SetEnvironmentVariableA
CompareStringW
GetSystemTimeAsFileTime
GetTickCount
LockFile
UnlockFile
InterlockedCompareExchange
QueryPerformanceCounter
FreeLibrary
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileA
GetFullPathNameW
GetFullPathNameA
EnterCriticalSection
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
HeapFree
HeapAlloc
HeapReAlloc
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
EncodePointer
GetTimeZoneInformation
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
LCMapStringW
GetStringTypeW
MessageBoxA
MessageBoxW
CryptDestroyKey
CryptAcquireContextW
CryptHashData
CryptDestroyHash
CryptDecrypt
CryptGetHashParam
CryptCreateHash
CryptEncrypt
CryptReleaseContext
CryptDeriveKey
CryptProtectData
CryptUnprotectData
ExportPasswords
HashPassword
ImportPasswords
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
lstrcpyA
CloseHandle
Sleep
GetExitCodeProcess
WaitForSingleObject
TerminateProcess
GetLongPathNameA
lstrcmpiA
QueryDosDeviceA
GetLogicalDriveStringsA
lstrlenA
OpenProcess
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetVersionExA
FindProc
KillProc
WaitProcEnd
WaitProcStart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
FindProcesses
KillProcesses
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
GlobalAlloc
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
GetProcessHeap
lstrcpyA
GetModuleHandleA
lstrcatA
HeapFree
HeapAlloc
RegisterClassExA
LoadCursorA
GetSysColorBrush
UpdateWindow
ShowWindow
CreateWindowExA
GetSystemMetrics
UnregisterClassA
EnableWindow
CallWindowProcA
GetParent
SetFocus
SendMessageA
DefWindowProcA
IsWindowEnabled
PostQuitMessage
DestroyWindow
SetWindowLongA
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetMessageA
LoadIconA
GetWindowTextA
wsprintfA
FindWindowExA
GetWindowTextLengthA
SetWindowTextA
IsWindow
GetStockObject
GetOpenFileNameA
GetSaveFileNameA
SHGetPathFromIDListA
SHBrowseForFolderA
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoTaskMemFree
FileBox
FolderBox
InputBox
InputRegBox
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
SearchPathA
CloseHandle
CreateFileA
lstrcpynA
lstrcatA
FindFirstFileA
FindClose
lstrlenA
lstrcmpiA
lstrcpyA
GlobalFree
GlobalAlloc
WriteFile
SendMessageA
FindWindowExA
GetDlgItem
wsprintfA
CharUpperA
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumValueA
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCloseKey
_Close
_CopyKey
_CopyValue
_CreateKey
_DeleteKey
_DeleteKeyEmpty
_DeleteValue
_Find
_HexToStr
_KeyExists
_MoveKey
_MoveValue
_Open
_Read
_ReadExtra
_RestoreKey
_SaveKey
_StrToHex
_Unload
_Write
_WriteExtra
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ