dialog
initDialog
show
Overview
overview
3Static
static
3675aff1fbe...18.exe
windows7-x64
3675aff1fbe...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3360se3/Shi...ox.exe
windows7-x64
3360se3/Shi...ox.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...il.exe
windows7-x64
1$PLUGINSDI...il.exe
windows10-2004-x64
1$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SbieDll.dll
windows7-x64
1SbieDll.dll
windows10-2004-x64
3SbieDllX.dll
windows7-x64
1SbieDllX.dll
windows10-2004-x64
3SbieDrv.sys
windows7-x64
1SbieDrv.sys
windows10-2004-x64
1SbieMsg.dll
windows7-x64
1SbieMsg.dll
windows10-2004-x64
1SbieSvc.exe
windows7-x64
SbieSvc.exe
windows10-2004-x64
Static task
static1
Behavioral task
behavioral1
Sample
675aff1fbe03adc1502d6f37c15632f2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
675aff1fbe03adc1502d6f37c15632f2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
360se3/Shield/Install/360sandbox.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
360se3/Shield/Install/360sandbox.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/KmdUtil.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/KmdUtil.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
SbieDll.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
SbieDll.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
SbieDllX.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
SbieDllX.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
SbieDrv.sys
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
SbieDrv.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
SbieMsg.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
SbieMsg.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
SbieSvc.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
SbieSvc.exe
Resource
win10v2004-20240709-en
Target
675aff1fbe03adc1502d6f37c15632f2_JaffaCakes118
Size
301KB
MD5
675aff1fbe03adc1502d6f37c15632f2
SHA1
7a9f8ddffdc4180bf17311efb82f5ff5d394568e
SHA256
a355b9f50131a796388d278a2da202d984ad9e9b62ae8d5c37eef36a6e475d2b
SHA512
549ab3e123ee9f2118e1f0093f709cd23cdde36d40b059a25372d8a577d31a19aadfc7f69516b569b86d23cbd02c099461e911187306c40079c7912dac619fe8
SSDEEP
6144:xp8lXV9G4fHFxw+XIP4mAwyTCnWXc90l/p:wVE4fHJXIbH90Bp
Checks for missing Authenticode signature.
resource |
---|
675aff1fbe03adc1502d6f37c15632f2_JaffaCakes118 |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/Processes.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/360se3/Shield/Install/360sandbox.exe |
unpack002/$PLUGINSDIR/InstallOptions.dll |
unpack002/$PLUGINSDIR/LangDLL.dll |
unpack002/$PLUGINSDIR/System.dll |
unpack002/SbieSvc.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
static1/unpack001/360se3/Shield/Install/360sandbox.exe | nsis_installer_1 |
static1/unpack001/360se3/Shield/Install/360sandbox.exe | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
FreeLibrary
OpenProcess
CloseHandle
TerminateProcess
GlobalFree
lstrcpyA
GetCommandLineA
GetVersionExA
ExitProcess
GetModuleHandleA
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
UnhandledExceptionFilter
DisableThreadLibraryCalls
WriteFile
SetFilePointer
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
GetLocaleInfoA
VirtualProtect
GetSystemInfo
FindWindowA
GetDesktopWindow
wsprintfA
UpdateWindow
FindDevice
FindProcess
KillProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\kmdutil\obj\i386\KmdUtil.pdb
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
exit
_cexit
_XcptFilter
_exit
_c_exit
memset
wcslen
_wcsicmp
_wcsnicmp
wcscpy
_acmdln
wcscat
swprintf
StartServiceW
RegSetValueExW
CreateServiceW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
OpenServiceW
DeleteService
ControlService
OpenSCManagerW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegCreateKeyExW
GetCommandLineW
Sleep
FormatMessageW
CloseHandle
GetCurrentProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetLastError
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
MessageBoxW
NtClose
NtUnloadDriver
NtDeviceIoControlFile
RtlInitUnicodeString
NtOpenFile
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
GetACP
lstrlenA
lstrcmpA
lstrcpynA
GetModuleHandleA
MulDiv
lstrcpyA
GlobalAlloc
SetWindowTextA
SetDlgItemTextA
SendDlgItemMessageA
EndDialog
DialogBoxParamA
LoadIconA
SendMessageA
ShowWindow
GetDC
CreateFontIndirectA
GetDeviceCaps
DeleteObject
LangDialog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sbie\core\dll\obj\i386\SbieDll.pdb
RtlFreeAnsiString
NtAssignProcessToJobObject
LdrGetProcedureAddress
RtlCreateProcessParameters
NtDeviceIoControlFile
_vsnprintf
NtRegisterThreadTerminatePort
NtRequestWaitReplyPort
NtAdjustPrivilegesToken
LdrLoadDll
NtQuerySecurityObject
NtDuplicateObject
NtOpenThread
NtOpenProcess
NtQuerySystemInformation
RtlUnwind
NtQueryVirtualMemory
NtLoadDriver
LdrUnloadDll
NtDeleteKey
NtEnumerateKey
NtEnumerateValueKey
NtQueryMultipleValueKey
NtNotifyChangeKey
NtNotifyChangeMultipleKeys
NtSaveKey
NtSetInformationKey
NtCreatePort
NtConnectPort
NtCreateEvent
NtOpenEvent
NtCreateMutant
NtOpenMutant
NtCreateSemaphore
NtOpenSemaphore
NtCreateSection
NtOpenSection
RtlInitString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
strchr
sprintf
_stricmp
RtlUnicodeStringToAnsiString
strncmp
wcsncmp
_wtoi
NtQueryAttributesFile
NtSetInformationFile
NtCreateNamedPipeFile
NtCreateMailslotFile
NtFsControlFile
RtlGetCurrentDirectory_U
RtlGetFullPathName_U
NtDeleteFile
towlower
NtReadFile
NtWriteFile
NtQueryInformationToken
RtlConvertSidToUnicodeString
NtQueryObject
RtlCompareUnicodeString
NtQueryInformationFile
NtCreateFile
NtQueryFullAttributesFile
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
memmove
RtlQueryRegistryValues
NtOpenDirectoryObject
NtSetInformationProcess
NtOpenFile
_wcsicmp
NtQueryDirectoryFile
wcscmp
wcsncpy
RtlCompareMemory
wcschr
_wcslwr
RtlCreateSecurityDescriptor
RtlSetDaclSecurityDescriptor
NtProtectVirtualMemory
wcsrchr
wcsstr
NtDeleteValueKey
NtQueryValueKey
NtQueryKey
NtOpenKey
wcscpy
wcscat
RtlInitUnicodeString
NtCreateKey
swprintf
NtSetValueKey
wcslen
NtOpenProcessToken
NtPrivilegeCheck
NtClose
NtSetSecurityObject
_wcsnicmp
CreateMutexW
CreateFileMappingW
ReleaseMutex
GetWindowsDirectoryW
HeapDestroy
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
OpenProcess
CreateFileA
FindResourceExW
FormatMessageW
QueueUserWorkItem
GetLongPathNameW
GetFullPathNameW
OpenFileMappingW
MapViewOfFile
CreateThread
GetSystemWindowsDirectoryW
WinExec
CreateProcessA
GetCurrentDirectoryW
GetEnvironmentStringsW
InterlockedIncrement
InterlockedDecrement
GetTickCount
Sleep
CreateEventW
OpenEventW
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringW
VirtualFree
RaiseException
SleepEx
GetCommandLineW
LoadLibraryW
FreeLibrary
FindResourceW
FindResourceA
LoadResource
LockResource
OpenThread
GetThreadTimes
GlobalAddAtomW
WideCharToMultiByte
GetModuleFileNameW
SetConsoleTitleA
SetConsoleTitleW
GetCurrentThread
QueueUserAPC
CreateFileW
GetSystemTimeAsFileTime
GetCurrentThreadId
InterlockedExchange
SetEvent
InterlockedCompareExchange
TlsGetValue
TlsSetValue
TlsAlloc
InitializeCriticalSection
DisableThreadLibraryCalls
GetCurrentProcessId
GetCurrentProcess
EnterCriticalSection
VirtualAlloc
LeaveCriticalSection
VirtualProtect
ExitProcess
GetModuleHandleW
ExpandEnvironmentStringsW
CreateProcessW
WaitForSingleObject
CloseHandle
SetLastError
LocalAlloc
LocalFree
GetProcAddress
GetLastError
HeapCreate
SbieApi_Log
SbieApi_LogEx
_SbieApi_CallServer@4
_SbieApi_CallZero@4
_SbieApi_CreateDirOrLink@8
_SbieApi_DisableForceProcess@8
_SbieApi_DuplicateObject@20
_SbieApi_EnumBoxes@8
_SbieApi_EnumProcessEx@16
_SbieApi_FreeReply@4
_SbieApi_GetInjectSaveArea@12
_SbieApi_GetLicense@4
_SbieApi_GetSetDeviceMap@4
_SbieApi_GetVersion@4
_SbieApi_GetWork@12
_SbieApi_HookTramp@8
_SbieApi_KillProcess@4
_SbieApi_PortName@0
_SbieApi_QueryBoxPath@28
_SbieApi_QueryConf@20
_SbieApi_QueryPathList@12
_SbieApi_QueryProcess@20
_SbieApi_QueryProcessPath@28
_SbieApi_ReloadConf@4
_SbieApi_RenameFile@16
_SbieApi_SetLicense@8
_SbieApi_SetUserName@8
_SbieApi_StartProcess@16
_SbieDll_AssocQueryCommand@4
_SbieDll_AssocQueryProgram@4
_SbieDll_CanElevateOnVista@0
_SbieDll_DeviceChange@8
_SbieDll_FormatMessage0@4
_SbieDll_FormatMessage1@8
_SbieDll_FormatMessage2@12
_SbieDll_FormatMessage@8
_SbieDll_GetAllUsersPath@0
_SbieDll_GetBoxFilePath@8
_SbieDll_GetDrivePath@4
_SbieDll_GetHandlePath@12
_SbieDll_GetLanguage@4
_SbieDll_GetUserPath@0
_SbieDll_Hook@12
_SbieDll_InitPStore@0
_SbieDll_InitProcess@0
_SbieDll_IsBoxedService@4
_SbieDll_IsDirectory@4
_SbieDll_IsWow64@0
_SbieDll_RunFromHome@16
_SbieDll_StartCOM@0
_SbieDll_StartSbieDrv@4
_SbieDll_StartSbieSvc@4
_SbieDll_TranslateNtToDosPath@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sbie\core\dll\obj\i386\SbieDll.pdb
RtlFreeAnsiString
NtAssignProcessToJobObject
LdrGetProcedureAddress
RtlCreateProcessParameters
NtDeviceIoControlFile
_vsnprintf
NtRegisterThreadTerminatePort
NtRequestWaitReplyPort
NtAdjustPrivilegesToken
LdrLoadDll
NtQuerySecurityObject
NtDuplicateObject
NtOpenThread
NtOpenProcess
NtQuerySystemInformation
RtlUnwind
NtQueryVirtualMemory
NtLoadDriver
LdrUnloadDll
NtDeleteKey
NtEnumerateKey
NtEnumerateValueKey
NtQueryMultipleValueKey
NtNotifyChangeKey
NtNotifyChangeMultipleKeys
NtSaveKey
NtSetInformationKey
NtCreatePort
NtConnectPort
NtCreateEvent
NtOpenEvent
NtCreateMutant
NtOpenMutant
NtCreateSemaphore
NtOpenSemaphore
NtCreateSection
NtOpenSection
RtlInitString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
strchr
sprintf
_stricmp
RtlUnicodeStringToAnsiString
strncmp
wcsncmp
_wtoi
NtQueryAttributesFile
NtSetInformationFile
NtCreateNamedPipeFile
NtCreateMailslotFile
NtFsControlFile
RtlGetCurrentDirectory_U
RtlGetFullPathName_U
NtDeleteFile
towlower
NtReadFile
NtWriteFile
NtQueryInformationToken
RtlConvertSidToUnicodeString
NtQueryObject
RtlCompareUnicodeString
NtQueryInformationFile
NtCreateFile
NtQueryFullAttributesFile
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
memmove
RtlQueryRegistryValues
NtOpenDirectoryObject
NtSetInformationProcess
NtOpenFile
_wcsicmp
NtQueryDirectoryFile
wcscmp
wcsncpy
RtlCompareMemory
wcschr
_wcslwr
RtlCreateSecurityDescriptor
RtlSetDaclSecurityDescriptor
NtProtectVirtualMemory
wcsrchr
wcsstr
NtDeleteValueKey
NtQueryValueKey
NtQueryKey
NtOpenKey
wcscpy
wcscat
RtlInitUnicodeString
NtCreateKey
swprintf
NtSetValueKey
wcslen
NtOpenProcessToken
NtPrivilegeCheck
NtClose
NtSetSecurityObject
_wcsnicmp
CreateMutexW
CreateFileMappingW
ReleaseMutex
GetWindowsDirectoryW
HeapDestroy
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
OpenProcess
CreateFileA
FindResourceExW
FormatMessageW
QueueUserWorkItem
GetLongPathNameW
GetFullPathNameW
OpenFileMappingW
MapViewOfFile
CreateThread
GetSystemWindowsDirectoryW
WinExec
CreateProcessA
GetCurrentDirectoryW
GetEnvironmentStringsW
InterlockedIncrement
InterlockedDecrement
GetTickCount
Sleep
CreateEventW
OpenEventW
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringW
VirtualFree
RaiseException
SleepEx
GetCommandLineW
LoadLibraryW
FreeLibrary
FindResourceW
FindResourceA
LoadResource
LockResource
OpenThread
GetThreadTimes
GlobalAddAtomW
WideCharToMultiByte
GetModuleFileNameW
SetConsoleTitleA
SetConsoleTitleW
GetCurrentThread
QueueUserAPC
CreateFileW
GetSystemTimeAsFileTime
GetCurrentThreadId
InterlockedExchange
SetEvent
InterlockedCompareExchange
TlsGetValue
TlsSetValue
TlsAlloc
InitializeCriticalSection
DisableThreadLibraryCalls
GetCurrentProcessId
GetCurrentProcess
EnterCriticalSection
VirtualAlloc
LeaveCriticalSection
VirtualProtect
ExitProcess
GetModuleHandleW
ExpandEnvironmentStringsW
CreateProcessW
WaitForSingleObject
CloseHandle
SetLastError
LocalAlloc
LocalFree
GetProcAddress
GetLastError
HeapCreate
SbieApi_Log
SbieApi_LogEx
_SbieApi_CallServer@4
_SbieApi_CallZero@4
_SbieApi_CreateDirOrLink@8
_SbieApi_DisableForceProcess@8
_SbieApi_DuplicateObject@20
_SbieApi_EnumBoxes@8
_SbieApi_EnumProcessEx@16
_SbieApi_FreeReply@4
_SbieApi_GetInjectSaveArea@12
_SbieApi_GetLicense@4
_SbieApi_GetSetDeviceMap@4
_SbieApi_GetVersion@4
_SbieApi_GetWork@12
_SbieApi_HookTramp@8
_SbieApi_KillProcess@4
_SbieApi_PortName@0
_SbieApi_QueryBoxPath@28
_SbieApi_QueryConf@20
_SbieApi_QueryPathList@12
_SbieApi_QueryProcess@20
_SbieApi_QueryProcessPath@28
_SbieApi_ReloadConf@4
_SbieApi_RenameFile@16
_SbieApi_SetLicense@8
_SbieApi_SetUserName@8
_SbieApi_StartProcess@16
_SbieDll_AssocQueryCommand@4
_SbieDll_AssocQueryProgram@4
_SbieDll_CanElevateOnVista@0
_SbieDll_DeviceChange@8
_SbieDll_FormatMessage0@4
_SbieDll_FormatMessage1@8
_SbieDll_FormatMessage2@12
_SbieDll_FormatMessage@8
_SbieDll_GetAllUsersPath@0
_SbieDll_GetBoxFilePath@8
_SbieDll_GetDrivePath@4
_SbieDll_GetHandlePath@12
_SbieDll_GetLanguage@4
_SbieDll_GetUserPath@0
_SbieDll_Hook@12
_SbieDll_InitPStore@0
_SbieDll_InitProcess@0
_SbieDll_IsBoxedService@4
_SbieDll_IsDirectory@4
_SbieDll_IsWow64@0
_SbieDll_RunFromHome@16
_SbieDll_StartCOM@0
_SbieDll_StartSbieDrv@4
_SbieDll_StartSbieSvc@4
_SbieDll_TranslateNtToDosPath@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\core\drv\obj\i386\SbieDrv.pdb
_except_handler3
ProbeForWrite
wcslen
ZwClose
ZwSetEvent
ZwOpenEvent
RtlInitUnicodeString
wcsncpy
ExRaiseStatus
IoCreateDevice
IoDeleteDevice
wcscpy
RtlFreeUnicodeString
memmove
wcschr
wcscat
_wcsicmp
KeDelayExecutionThread
RtlQueryRegistryValues
_itow
_wcsnicmp
ExFreePoolWithTag
ExAllocatePoolWithTag
RtlUnicodeStringToInteger
swprintf
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwQueryInformationFile
ZwCreateFile
PsGetVersion
ObfDereferenceObject
ObReferenceObjectByHandle
wcsrchr
ZwQueryValueKey
ZwOpenKey
ZwAdjustPrivilegesToken
ZwDuplicateToken
ZwOpenProcessToken
ZwOpenProcess
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
ZwSetInformationFile
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
MmGetSystemRoutineAddress
KeGetCurrentThread
PsLookupThreadByThreadId
ZwQuerySystemInformation
ZwOpenThread
ZwAllocateVirtualMemory
PsGetCurrentProcessId
ExGetPreviousMode
KeSetTargetProcessorDpc
KeSetImportanceDpc
KeInitializeDpc
KeQueryActiveProcessors
PsGetCurrentThreadId
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
MmBuildMdlForNonPagedPool
KeServiceDescriptorTable
ZwYieldExecution
ZwAccessCheckAndAuditAlarm
RtlCompareMemory
wcstombs
IoCreateFile
ZwReadFile
wcsstr
_wcslwr
ZwCreateDirectoryObject
ZwQueryInformationProcess
ZwCreateSymbolicLinkObject
wcscmp
ZwLoadKey
ZwUnloadKey
ZwSetValueKey
KeQuerySystemTime
ZwCreateKey
IoWriteErrorLogEntry
IoAllocateErrorLogEntry
DbgPrint
ObOpenObjectByName
ObQueryNameString
RtlCaptureStackBackTrace
PsSetLoadImageNotifyRoutine
PsSetCreateProcessNotifyRoutine
RtlIntegerToUnicodeString
PsLookupProcessByProcessId
_alldiv
SeTokenIsAdmin
PsReferencePrimaryToken
IoGetCurrentProcess
wcsncmp
ZwQueryInformationToken
ZwFreeVirtualMemory
IoGetRequestorProcessId
ZwSetInformationProcess
NtDuplicateObject
SeSinglePrivilegeCheck
IoThreadToProcess
RtlConvertSidToUnicodeString
ZwOpenThreadToken
ProbeForRead
KeBugCheckEx
KeInsertQueueDpc
IofCompleteRequest
KfLowerIrql
KeGetCurrentIrql
KfRaiseIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sbie\core\msg\obj\i386\SbieMsg.pdb
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\core\svc\obj\i386\SbieSvc.pdb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ