Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
7Static
static
7ac00a66178...18.exe
windows7-x64
7ac00a66178...18.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
7$PLUGINSDI...ol.dll
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...nz.dll
windows7-x64
3$PLUGINSDI...nz.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
7$PLUGINSDI...on.dll
windows10-2004-x64
7$_18_/caloa_app.exe
windows7-x64
7$_18_/caloa_app.exe
windows10-2004-x64
7CaloaConst...ent.js
windows7-x64
3CaloaConst...ent.js
windows10-2004-x64
3HtmlStartS...ler.js
windows7-x64
3HtmlStartS...ler.js
windows10-2004-x64
3Locales.js
windows7-x64
3Locales.js
windows10-2004-x64
3PcvisitBox...ent.js
windows7-x64
3PcvisitBox...ent.js
windows10-2004-x64
3Queue.js
windows7-x64
3Queue.js
windows10-2004-x64
3Remote.hos...up.exe
windows7-x64
7Remote.hos...up.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7Behavioral task
behavioral1
Sample
ac00a661789e13272b25395b818eee20_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ac00a661789e13272b25395b818eee20_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/version.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/version.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$_18_/caloa_app.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$_18_/caloa_app.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
CaloaConstantsNamesClient.js
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
CaloaConstantsNamesClient.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
HtmlStartScreensController.js
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
HtmlStartScreensController.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Locales.js
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Locales.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
PcvisitBoxConstantsNamesClient.js
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
PcvisitBoxConstantsNamesClient.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Queue.js
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
Queue.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
Remote.host.12.setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
Remote.host.12.setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uninstall.exe
Resource
win10v2004-20240508-en
Target
ac00a661789e13272b25395b818eee20_JaffaCakes118
Size
5.5MB
MD5
ac00a661789e13272b25395b818eee20
SHA1
21e3f8fc0375a9359883d61aa707607230e72907
SHA256
7184476ea5f337f8fbfc15a2a15a6f3c7a8d856cf5fa0706b410f50ac132cbe6
SHA512
8b1ffb578838cde7d9cc9fce86e3ba52a4a1f6d4a86885a20cc714146470eaad0ec71ab5b64b8cd30dff17b422889633a2a40a5b9df970388265a00c9a320ba4
SSDEEP
98304:04BWrjmVHJEOStMb1/7zNl+eDMosxdSB5Hoh5JHHM7GzZwo0a8qPTvaa7jZUyO6J:04BoSrE3Mb5X+QyiQRXzKo0a8qPTTDOt
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/$PLUGINSDIR/AccessControl.dll | acprotect |
static1/unpack001/$PLUGINSDIR/version.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/$PLUGINSDIR/AccessControl.dll | upx |
static1/unpack001/$PLUGINSDIR/version.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/AccessControl.dll |
unpack002/out.upx |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/UserInfo.dll |
unpack001/$PLUGINSDIR/nsisunz.dll |
unpack001/$PLUGINSDIR/version.dll |
unpack003/out.upx |
unpack005/$PLUGINSDIR/System.dll |
unpack005/$PLUGINSDIR/UserInfo.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
static1/unpack004/Remote.host.12.setup.exe | nsis_installer_1 |
static1/unpack004/Remote.host.12.setup.exe | nsis_installer_2 |
static1/unpack005/uninstall.exe | nsis_installer_1 |
static1/unpack005/uninstall.exe | nsis_installer_2 |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
MulDiv
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
RegisterClassA
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
wvsprintfA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
EmptyClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
SetForegroundWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ClearOnFile
ClearOnRegKey
DenyOnFile
DenyOnRegKey
DisableFileInheritance
DisableRegKeyInheritance
EnableFileInheritance
EnableRegKeyInheritance
GetCurrentUserName
GetFileGroup
GetFileOwner
GetRegKeyGroup
GetRegKeyOwner
GrantOnFile
GrantOnRegKey
NameToSid
RevokeOnFile
RevokeOnRegKey
SetFileGroup
SetFileOwner
SetOnFile
SetOnRegKey
SetRegKeyGroup
SetRegKeyOwner
SidToName
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
lstrcpynA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
GetOriginalAccountType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteCriticalSection
InitializeCriticalSection
CreateDirectoryA
lstrcpyA
GetVersion
lstrlenA
lstrcatA
GlobalFree
lstrcpynA
GlobalAlloc
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
lstrcmpA
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapFree
GetLastError
CloseHandle
WriteFile
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapAlloc
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
RtlUnwind
InterlockedExchange
VirtualQuery
CreateFileA
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
HeapSize
GetLocaleInfoA
GetStringTypeA
MessageBoxA
CharPrevA
PeekMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
GetDlgItem
SendMessageA
wsprintfA
Unzip
UnzipToLog
UnzipToStack
extract_RunDLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetWindowsVersion
IsWindows2000
IsWindows2003
IsWindows31
IsWindows95
IsWindows98
IsWindows98orLater
IsWindowsME
IsWindowsNT351
IsWindowsNT40
IsWindowsPlatform9x
IsWindowsPlatformNT
IsWindowsXP
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\hudson\workspace\pcvisit_12_0_x_win_release_clean\co\cpp_projects\bin\win32\vc90\Release\caloa_app.pdb
QueryPerformanceCounter
QueryPerformanceFrequency
ResumeThread
SetThreadPriority
SetThreadAffinityMask
SetPriorityClass
GetPriorityClass
GlobalMemoryStatus
GetComputerNameA
GetCurrentThread
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
SetWaitableTimer
PostQueuedCompletionStatus
QueueUserAPC
TerminateThread
GetQueuedCompletionStatus
CreateIoCompletionPort
InterlockedCompareExchange
ReleaseSemaphore
LocalAlloc
lstrcpyA
GetTempFileNameA
GetTempPathA
LoadLibraryA
GetSystemTimeAsFileTime
CreateSemaphoreA
GetThreadPriority
GetThreadTimes
OutputDebugStringA
GetUserDefaultLangID
FormatMessageA
GetShortPathNameA
GetTickCount
OpenProcess
SetHandleInformation
CreateFileA
FileTimeToSystemTime
Sleep
CreateProcessW
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
CopyFileExA
MoveFileWithProgressA
SetFileAttributesA
GetLogicalDriveStringsA
SetEnvironmentVariableA
GetCommandLineA
DuplicateHandle
FindFirstFileA
GetStdHandle
AllocConsole
ExitProcess
FreeResource
LockResource
EnumResourceNamesA
DeleteFileA
GetVersion
GetFileType
FlushConsoleInputBuffer
SleepEx
GetSystemDirectoryA
CreateWaitableTimerA
GetSystemTime
CreateNamedPipeA
ConnectNamedPipe
WaitNamedPipeA
GetOverlappedResult
DisconnectNamedPipe
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
SystemTimeToFileTime
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoA
VirtualProtect
GetModuleHandleW
GlobalSize
MoveFileA
ExitThread
CreateThread
SetFileTime
LocalFileTimeToFileTime
SetStdHandle
GetTimeZoneInformation
HeapReAlloc
SetConsoleCtrlHandler
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
FileTimeToLocalFileTime
GetFileInformationByHandle
SetFilePointer
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeW
HeapSize
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
FlushFileBuffers
GetFullPathNameA
GetCurrentDirectoryA
GetStringTypeA
GetTimeFormatA
GetDateFormatA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CompareStringA
CompareStringW
WriteConsoleA
WriteConsoleW
SetEndOfFile
CreateFileW
WaitForMultipleObjects
PeekNamedPipe
ReadFile
GetConsoleOutputCP
WriteFile
GetVolumeInformationW
GetDriveTypeA
LocalFree
SetThreadExecutionState
OpenEventA
ResetEvent
ProcessIdToSessionId
GetCurrentProcessId
GlobalAlloc
GlobalLock
GlobalUnlock
GetModuleFileNameA
MulDiv
lstrcmpA
DeleteCriticalSection
InitializeCriticalSection
lstrlenW
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
HeapAlloc
GetProcessHeap
HeapFree
GetModuleHandleA
GetProcAddress
SetLastError
GetCurrentProcess
FlushInstructionCache
RaiseException
LeaveCriticalSection
EnterCriticalSection
GetUserDefaultLCID
ExpandEnvironmentStringsA
GetLocaleInfoA
GlobalMemoryStatusEx
GetExitCodeProcess
OpenMutexA
CreateMutexA
VirtualQuery
CreatePipe
CreateProcessA
SuspendThread
GetFileSize
UnlockFile
LockFileEx
GetFileAttributesA
FindNextFileA
GetFileAttributesExW
GetFileSizeEx
GetThreadContext
SetThreadContext
CreateDirectoryA
RemoveDirectoryA
GetCurrentThreadId
SetEvent
WaitForSingleObject
CreateEventA
CloseHandle
TlsAlloc
GetLastError
InterlockedExchangeAdd
TlsFree
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
FindClose
GetSystemInfo
GetUserObjectInformationA
SendMessageTimeoutA
FindWindowA
SetProcessWindowStation
GetUserObjectInformationW
MsgWaitForMultipleObjects
UnregisterClassA
OffsetRect
ClipCursor
SetRect
AdjustWindowRectEx
SetScrollInfo
ShowScrollBar
ScrollWindowEx
UpdateWindow
GetAsyncKeyState
TranslateAcceleratorA
UpdateLayeredWindow
LoadIconA
LoadAcceleratorsA
GetAncestor
EnableMenuItem
IsWindowVisible
SetWindowPlacement
GetWindowPlacement
IsZoomed
IsIconic
GetSystemMenu
GetForegroundWindow
CreateAcceleratorTableA
GetSysColor
GetDesktopWindow
SetFocus
DestroyAcceleratorTable
BeginPaint
EndPaint
FillRect
ReleaseCapture
GetClassNameA
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
MoveWindow
ExitWindowsEx
GetProcessWindowStation
GetUserObjectSecurity
SetUserObjectSecurity
OpenInputDesktop
GetThreadDesktop
OpenDesktopA
SetThreadDesktop
CloseDesktop
MapVirtualKeyA
MessageBoxA
keybd_event
EnumDisplayMonitors
GetWindowDC
RemoveMenu
CreateMenu
GetMenuItemCount
GetMenuItemInfoA
SetClipboardData
SetParent
GetUpdateRect
ValidateRect
KillTimer
SetTimer
CreatePopupMenu
GetActiveWindow
PtInRect
RegisterClipboardFormatA
GetClipboardData
ChangeClipboardChain
SetClipboardViewer
EnumClipboardFormats
OpenClipboard
EmptyClipboard
GetClipboardFormatNameA
CloseClipboard
GetClipboardOwner
OpenWindowStationA
EnumDesktopsA
CloseWindowStation
GetTopWindow
GetWindowInfo
GetWindowRgn
SendInput
GetCursorInfo
VkKeyScanW
GetKeyState
GetIconInfo
GetKeyboardState
ToUnicode
CharNextA
LoadStringA
IsChild
SetCapture
ScreenToClient
ClientToScreen
PostThreadMessageA
GetWindowTextLengthA
GetWindowTextA
SetMenuItemInfoA
DestroyIcon
GetCursorPos
GetSubMenu
TrackPopupMenu
LoadMenuA
SetMenuDefaultItem
MonitorFromPoint
GetMenuItemID
PostMessageA
SendMessageA
DestroyMenu
CreateWindowExA
RegisterClassExA
CallWindowProcA
DefWindowProcA
LoadImageA
LoadCursorA
GetClassInfoExA
BringWindowToTop
EnableWindow
CreateDialogParamA
GetDlgItem
SetWindowTextA
IsDialogMessageA
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoA
GetClientRect
MapWindowPoints
IsWindow
ShowWindow
GetWindowLongA
SetWindowLongA
DestroyWindow
PeekMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
SystemParametersInfoA
EnumWindows
GetWindowThreadProcessId
SetForegroundWindow
SetWindowPos
GetSystemMetrics
EnumDisplayDevicesA
EnumDisplaySettingsA
TrackPopupMenuEx
WindowFromPoint
ToAscii
VkKeyScanA
DrawIconEx
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
SetCursorPos
GetCapture
FlashWindowEx
SetMenu
SetWindowRgn
CreateIconIndirect
MapVirtualKeyW
MapVirtualKeyExW
MapVirtualKeyExA
GetKeyboardLayout
SetCursor
GetClassLongA
InsertMenuItemA
SetClassLongA
GetFocus
LoadTypeLi
GetErrorInfo
VarUI4FromStr
SafeArrayDestroy
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
SysFreeString
LoadRegTypeLi
OleCreateFontIndirect
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
DispCallFunc
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysAllocStringLen
VariantChangeType
VariantClear
VariantInit
SysStringLen
WSAEventSelect
WSAAddressToStringA
__WSAFDIsSet
getservbyport
gethostbyaddr
getservbyname
getpeername
ntohs
getsockname
send
recv
socket
WSARecv
shutdown
accept
getsockopt
connect
gethostname
gethostbyname
inet_ntoa
inet_addr
ioctlsocket
closesocket
WSAStringToAddressA
recvfrom
WSASend
listen
setsockopt
WSASocketA
WSAGetLastError
htons
WSASetLastError
ntohl
htonl
WSACleanup
WSAStartup
WSACloseEvent
WSACreateEvent
WSAIoctl
sendto
select
bind
AcceptEx
GetAcceptExSockaddrs
NetUserGetLocalGroups
NetApiBufferFree
NetWkstaUserGetInfo
SHGetValueA
CreateDIBSection
CreateDCA
SelectClipRgn
EnumEnhMetaFile
GetTextMetricsA
PlayEnhMetaFileRecord
SetEnhMetaFileBits
GetEnhMetaFileHeader
GetRegionData
GetRgnBox
GetClipBox
RectInRegion
EqualRgn
GetRandomRgn
OffsetRgn
SetBkColor
ExtTextOutA
SetStretchBltMode
StretchBlt
CreateRectRgn
GdiFlush
SetViewportOrgEx
SetRectRgn
CombineRgn
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
GetStockObject
SetTextColor
SetBkMode
GetObjectA
ShellExecuteExA
DragFinish
DragAcceptFiles
SHFileOperationA
SHGetFileInfoA
Shell_NotifyIconA
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
DragQueryFileA
CoCreateInstance
CoTaskMemRealloc
CoInitializeEx
CoSetProxyBlanket
OleRun
CoInitialize
CoTaskMemFree
CoUninitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoTaskMemAlloc
OleLockRunning
OleSetContainedObject
OleCreate
CoGetMalloc
StringFromGUID2
GetSaveFileNameA
GetOpenFileNameA
DeleteService
ChangeServiceConfigA
CreateServiceA
ChangeServiceConfig2A
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
LookupAccountNameA
GetNamedSecurityInfoA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryValueA
RegQueryInfoKeyA
LogonUserA
SetTokenInformation
ImpersonateLoggedOnUser
CreateProcessAsUserA
AllocateAndInitializeSid
RevertToSelf
CreateProcessWithLogonW
FreeSid
CopySid
GetSecurityDescriptorDacl
IsValidSid
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
OpenProcessToken
GetTokenInformation
LookupAccountSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetUserNameA
RegCloseKey
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
DuplicateTokenEx
ImpersonateSelf
OpenThreadToken
ControlService
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
QueryServiceStatus
RegisterEventSourceA
ReportEventA
DeregisterEventSource
InternetGetConnectedState
InternetAutodial
InternetQueryOptionA
URLDownloadToFileA
DestroyPropertySheetPage
CreatePropertySheetPageA
InitCommonControlsEx
ImageList_GetIconSize
PropertySheetA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
EnumProcessModules
WTSEnumerateSessionsA
WTSFreeMemory
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
MulDiv
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
RegisterClassA
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
wvsprintfA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
EmptyClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
SetForegroundWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
lstrcpynA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
GetOriginalAccountType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
MulDiv
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
RegisterClassA
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
wvsprintfA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
EmptyClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
SetForegroundWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ