download
download_quiet
Overview
overview
10Static
static
3d748c29d2c...18.exe
windows7-x64
7d748c29d2c...18.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$TEMP/phot....5.exe
windows7-x64
7$TEMP/phot....5.exe
windows10-2004-x64
7$TEMP/windll.dll
windows7-x64
10$TEMP/windll.dll
windows10-2004-x64
10Static task
static1
Behavioral task
behavioral1
Sample
d748c29d2c4775750824df17208cae3e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d748c29d2c4775750824df17208cae3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/photoinstrument-3.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/photoinstrument-3.5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/windll.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$TEMP/windll.dll
Resource
win10v2004-20240802-en
Target
d748c29d2c4775750824df17208cae3e_JaffaCakes118
Size
3.0MB
MD5
d748c29d2c4775750824df17208cae3e
SHA1
657f77eabcc2da6a7d675a7dbb03df6317699beb
SHA256
9723afef93bb4c7e7be7d0f4c255bdd4e4b17117808010d11707acef3ab33c31
SHA512
e910fa006b9b16f81c7c53d8e1a58391a2447391ecd67748d91c6b3db1350c9ab93035e891e3f6d4b5678428bdbb818657199e083eece048f241f0761c50606c
SSDEEP
98304:Ake8uDzrt7fcsUx+MQN8LfVrh61TJut14TSb:Ak9uSN+Mk8L9+10MSb
Checks for missing Authenticode signature.
resource |
---|
d748c29d2c4775750824df17208cae3e_JaffaCakes118 |
unpack001/$PLUGINSDIR/NSISdl.dll |
unpack001/$TEMP/photoinstrument-3.5.exe |
unpack001/$TEMP/windll.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkColor
SetBkMode
SetTextColor
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExA
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
FindWindowExA
GetClassInfoA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
wsprintfA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateSemaphoreA
CreateThread
DeleteFileA
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
GlobalAlloc
GlobalFree
InterlockedDecrement
InterlockedIncrement
MulDiv
ReleaseSemaphore
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
_write
__dllonexit
_errno
_iob
abort
fflush
fputc
fputs
free
fwrite
malloc
memcpy
realloc
strcmp
strcpy
strlen
CallWindowProcA
CharPrevA
CreateWindowExA
DestroyWindow
EnableWindow
FindWindowExA
GetClientRect
GetDlgItem
GetFocus
GetWindowLongA
GetWindowRect
IsWindowVisible
RegisterWindowMessageA
SendMessageA
SetDlgItemTextA
SetWindowLongA
SetWindowTextA
ShowWindow
wsprintfA
WSACleanup
WSAGetLastError
WSAStartup
__WSAFDIsSet
closesocket
connect
gethostbyname
getsockname
htons
inet_addr
ioctlsocket
recv
select
send
shutdown
socket
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetKeyboardType
LoadStringW
MessageBoxA
CharNextW
CreateWindowExW
TranslateMessage
SetWindowLongW
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
GetSystemMetrics
ExitWindowsEx
DispatchMessageW
DestroyWindow
CharUpperBuffW
CallWindowProcW
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
SizeofResource
SignalObjectAndWait
SetLastError
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResetEvent
RemoveDirectoryW
ReadFile
MultiByteToWideChar
LockResource
LoadResource
LoadLibraryW
LeaveCriticalSection
InitializeCriticalSection
GetWindowsDirectoryW
GetVersionExW
GetUserDefaultLangID
GetThreadLocale
GetSystemInfo
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileSize
GetFileAttributesW
GetExitCodeProcess
GetEnvironmentVariableW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentProcess
GetCommandLineW
GetCPInfo
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FindResourceW
EnumCalendarInfoW
EnterCriticalSection
DeleteFileW
DeleteCriticalSection
CreateProcessW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
Sleep
InitCommonControls
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalAlloc
GetAtomNameA
GetCommandLineA
SetEndOfFile
DosDateTimeToFileTime
GetCurrentThread
GetFileSizeEx
ExitProcess
GetProfileStringW
OpenEventW
GetBinaryTypeA
SystemTimeToFileTime
GetSystemDefaultUILanguage
FindResourceA
HeapWalk
SleepEx
CreateTimerQueueTimer
SetCurrentDirectoryW
lstrcatA
GetFileAttributesExW
IsValidLocale
BindIoCompletionCallback
GetThreadPriority
GetModuleHandleW
GetLocaleInfoW
VerLanguageNameW
SetFilePointer
SetProcessWorkingSetSize
IsValidLanguageGroup
UpdateResourceA
LCMapStringW
GetEnvironmentStrings
PostQueuedCompletionStatus
EnumSystemLocalesA
GetTempFileNameA
CreateToolhelp32Snapshot
FlushFileBuffers
GetFileType
SetNamedPipeHandleState
GetLargestConsoleWindowSize
GetProcessAffinityMask
SuspendThread
SearchPathA
SetEnvironmentVariableA
GlobalFlags
CreateFileMappingW
CreateWaitableTimerA
RemoveDirectoryA
PulseEvent
GlobalDeleteAtom
SetStdHandle
GetStartupInfoA
SetInformationJobObject
RaiseException
CompareFileTime
GetConsoleOutputCP
IsWow64Process
WaitNamedPipeW
FindFirstFileExW
GetDateFormatW
ReadProcessMemory
OpenEventA
LoadResource
CreateJobObjectW
CreateProcessW
QueueUserAPC
SetConsoleCursorPosition
PeekConsoleInputW
PeekConsoleInputA
GetFileAttributesW
IsValidCodePage
HeapSize
WriteProfileStringA
SetConsoleTitleA
GetVolumeInformationW
SetSystemTime
EnumResourceNamesA
GetStringTypeExW
DeleteTimerQueueEx
ChangeTimerQueueTimer
GetFileTime
AddAtomW
LocalSize
CreateSemaphoreA
TerminateProcess
GetLogicalDriveStringsA
IsBadWritePtr
DeleteFileW
Beep
GetTapeParameters
SetVolumeMountPointW
SetComputerNameA
FindFirstVolumeW
GetThreadLocale
GetShortPathNameA
SizeofResource
GetProfileIntA
GetTempPathW
ConvertDefaultLocale
SetFilePointerEx
GetVolumePathNamesForVolumeNameW
WinExec
OpenThread
EnterCriticalSection
EnumResourceLanguagesW
FileTimeToSystemTime
GetTimeFormatA
FindNextChangeNotification
SetProcessShutdownParameters
GetComputerNameA
GetModuleHandleA
CreateThread
HeapFree
CopyFileA
HeapAlloc
CloseHandle
CreateFileMappingA
InterlockedIncrement
CreateProcessA
LeaveCriticalSection
InterlockedExchange
GetTickCount
VirtualQuery
CreateDirectoryA
InitializeCriticalSection
LocalFree
ExpandEnvironmentStringsA
GlobalAlloc
MapViewOfFile
WriteFile
GetModuleFileNameA
UnmapViewOfFile
LoadLibraryA
DeleteFileA
Sleep
WaitForSingleObject
GetProcAddress
ReadFile
GetCurrentProcessId
GlobalGetAtomNameW
GetMenuStringA
CharNextA
MapVirtualKeyA
GetTopWindow
ChangeDisplaySettingsA
DrawFrameControl
CallWindowProcA
GetClassLongW
SetDlgItemInt
EndDialog
CopyAcceleratorTableA
ReleaseDC
GetWindowTextW
GetGUIThreadInfo
TrackMouseEvent
LoadMenuW
SetProcessDefaultLayout
FindWindowExA
MapWindowPoints
GetMenuState
DispatchMessageW
GetSystemMenu
SetMenuItemInfoW
IsIconic
SetPropA
GetDlgItemTextA
ReplyMessage
SendMessageW
SetProcessWindowStation
MapDialogRect
GetDoubleClickTime
CreateIconIndirect
GetDlgItem
GetWindowWord
GetShellWindow
DestroyCursor
BroadcastSystemMessageW
IsMenu
GetUpdateRgn
SetWindowLongW
GetScrollRange
OpenWindowStationW
RegisterHotKey
InternalGetWindowText
IsRectEmpty
DestroyAcceleratorTable
GetClassLongA
DrawStateA
TranslateAcceleratorA
GetComboBoxInfo
GetWindowRect
EnumDisplaySettingsW
PackDDElParam
UnregisterClassW
ExitWindowsEx
AppendMenuA
CheckMenuItem
SetRectEmpty
WinHelpW
wsprintfW
LookupIconIdFromDirectory
SetSysColors
GetScrollPos
OpenDesktopW
SetClassLongW
IsWindow
GetFocus
CharLowerA
GetScrollInfo
DrawIcon
CopyIcon
BeginPaint
EnableMenuItem
GetWindowPlacement
TranslateAcceleratorW
FillRect
DrawTextExA
SetTimer
CharLowerBuffW
HideCaret
CreateDialogParamA
GetWindowDC
TranslateMDISysAccel
MsgWaitForMultipleObjectsEx
MapVirtualKeyW
DialogBoxParamA
PostThreadMessageA
SendNotifyMessageW
EnableScrollBar
PtInRect
SetScrollInfo
WaitForInputIdle
GetDCEx
GetCursorPos
OpenDesktopA
IsDialogMessageA
LoadIconW
MonitorFromRect
InvalidateRect
FindWindowW
GetDesktopWindow
FreeDDElParam
UnregisterHotKey
DefWindowProcW
GrayStringA
ModifyMenuW
SetCursor
DrawTextW
CharNextExA
DestroyCaret
InSendMessageEx
AttachThreadInput
SetWindowPlacement
DrawIconEx
InsertMenuW
GetKeyNameTextA
PostMessageW
GetCursor
SendNotifyMessageA
GetPropW
FindWindowA
CreateWindowExA
RegisterClassExA
DispatchMessageA
SetWindowLongA
GetClassNameA
UnhookWindowsHookEx
PeekMessageA
DefWindowProcA
GetMessageA
GetClientRect
GetWindowThreadProcessId
GetWindowLongA
SetParent
StrDupW
PathRemoveFileSpecW
SHDeleteKeyA
UrlUnescapeW
PathIsDirectoryW
PathFindExtensionA
StrStrIA
StrCpyW
StrToIntExW
SHSetValueW
AssocCreate
PathFileExistsA
PathGetCharTypeA
PathGetCharTypeW
PathGetArgsW
SHCreateStreamOnFileW
wnsprintfA
PathRemoveFileSpecA
StrStrA
PathFindFileNameW
StrCatBuffW
UrlEscapeW
PathAddExtensionW
PathStripToRootW
PathBuildRootW
PathIsPrefixW
StrChrA
SHRegGetBoolUSValueW
SHRegGetValueW
UrlCreateFromPathW
PathIsUNCServerW
PathSkipRootW
PathIsUNCW
PathIsUNCServerShareW
StrDupA
RegCreateKeyExA
RegOpenKeyExA
GetSecurityDescriptorSacl
RegEnumKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
LookupAccountNameA
RegSetValueExA
SetNamedSecurityInfoA
ConvertSidToStringSidA
ClearEventLogW
CreateServiceW
RegDeleteKeyW
ReportEventA
RegEnumValueA
RegisterEventSourceA
MakeAbsoluteSD
RegOpenKeyA
RegOpenCurrentUser
RegisterServiceCtrlHandlerExA
ImpersonateNamedPipeClient
OpenServiceW
EnumDependentServicesW
SetTokenInformation
RegCreateKeyW
IsTokenRestricted
OpenProcessToken
ChangeServiceConfigW
CloseServiceHandle
StartServiceW
IsTextUnicode
RegFlushKey
QueryServiceStatus
RegEnumKeyA
QueryServiceConfig2W
ControlService
GetOldestEventLogRecord
QueryServiceStatusEx
RegSaveKeyW
RegConnectRegistryA
RegQueryInfoKeyW
NotifyBootConfigStatus
QueryServiceLockStatusA
RegUnLoadKeyA
MapGenericMask
RegOpenKeyExW
QueryServiceConfigW
SHBrowseForFolderW
SHSetLocalizedName
ExtractIconW
ShellAboutW
SHPathPrepareForWriteW
DragAcceptFiles
SHParseDisplayName
ExtractIconA
SHGetSettings
SHGetPathFromIDListW
CommandLineToArgvW
SHFileOperationW
SHGetFolderPathA
SHGetFileInfoA
GetGlyphOutlineA
PolyPolyline
GetTextExtentPointA
CreateBrushIndirect
SetMapperFlags
GetStockObject
EnumFontFamiliesExA
FillPath
ScaleViewportExtEx
CreateHatchBrush
GetTextMetricsW
CreateDCW
GetBitmapDimensionEx
BeginPath
RealizePalette
EnumFontsA
ExtTextOutW
AbortPath
GetCurrentObject
GetDIBits
UpdateColors
GetTextCharacterExtra
GetMetaFileA
GetTextAlign
EndDoc
StretchDIBits
SetBkColor
DeleteMetaFile
Chord
GetBitmapBits
InvertRgn
GetEnhMetaFileBits
CreateDIBPatternBrushPt
GetLayout
PlayEnhMetaFileRecord
GetDCOrgEx
GetTextExtentExPointA
SetPolyFillMode
GetClipRgn
SetBitmapDimensionEx
CreatePen
GetRegionData
GetObjectA
RemoveFontResourceW
CreateScalableFontResourceA
GetViewportExtEx
Polygon
TranslateCharsetInfo
ExtFloodFill
SetMiterLimit
ResizePalette
CreateBitmapIndirect
GetObjectW
CreateICW
GetEnhMetaFileA
ExtCreateRegion
DescribePixelFormat
GetBkColor
ExtEscape
EnumFontFamiliesExW
CreateICA
EqualRgn
DeleteObject
CreateMetaFileA
CloseMetaFile
EnumFontFamiliesA
GetMapMode
ExtTextOutA
Ellipse
SetBrushOrgEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ