Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Overview
overview
7Static
static
33a625b4034...18.exe
windows7-x64
73a625b4034...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/bdtm...ll.dll
windows7-x64
1$TEMP/bdtm...ll.dll
windows10-2004-x64
3baidubar.dll
windows7-x64
7baidubar.dll
windows10-2004-x64
7Static task
static1
Behavioral task
behavioral1
Sample
3a625b403453efd630bec54b1c0938e7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a625b403453efd630bec54b1c0938e7_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$TEMP/bdtmp/InstDll.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$TEMP/bdtmp/InstDll.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
baidubar.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
baidubar.dll
Resource
win10v2004-20240709-en
Target
3a625b403453efd630bec54b1c0938e7_JaffaCakes118
Size
593KB
MD5
3a625b403453efd630bec54b1c0938e7
SHA1
f287035aaecfdafe72f310178d5f2e26e73a37d2
SHA256
59eb89f1ba93209eddbb1c102cc273cce5efe6cd58b0adf43c4fd23ac556b933
SHA512
5ad2f2be94c7b8e33d60aee10b7a325d38d78fed2c7a54a9f6cdad0c77684102ab968da1f839bf0cea5c3730724d36022f1653c23facd211ee4fa4e08866687f
SSDEEP
12288:iUw01kNk1U6yQUe/B1LExlXmbKpjU3fYJy6qouBLmY8c2IqH:iUw5kq6yu6VjpjUPn4d3
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$TEMP/bdtmp/InstDll.dll |
unpack001/baidubar.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
lstrcpynA
SetFileTime
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
CloseHandle
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
MulDiv
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetCommandLineA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
CreateWindowExA
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
wvsprintfA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
GetDlgItem
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
CreateDialogParamA
SetClipboardData
DestroyWindow
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
IsWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GetModuleHandleA
GetPrivateProfileIntA
GlobalAlloc
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
lstrcmpiA
GetDlgCtrlID
GetClientRect
SetWindowRgn
LoadIconA
MapWindowPoints
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadImageA
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
CloseHandle
DeviceIoControl
GetWindowsDirectoryA
CreateFileA
_snprintf
__CxxFrameHandler
free
_initterm
malloc
_adjust_fdiv
__dllonexit
_onexit
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
DelKey
DelValue
SetRegValue
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFileAttributesA
GlobalFree
GlobalAlloc
GetACP
GetCurrentProcessId
lstrcmpA
LockResource
CompareStringA
GetFileAttributesA
SetFilePointer
WritePrivateProfileSectionA
GetPrivateProfileSectionA
SetErrorMode
GetEnvironmentVariableA
ReadProcessMemory
VirtualProtect
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
LocalFree
FormatMessageA
GetVolumeInformationA
TerminateThread
DeviceIoControl
CopyFileA
IsBadStringPtrW
FreeResource
TerminateProcess
GetExitCodeProcess
HeapFree
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
SetFileTime
SwitchToThread
SetEvent
ResumeThread
FileTimeToSystemTime
GetFileInformationByHandle
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetLocalTime
VirtualQuery
GetExitCodeThread
MoveFileExA
RemoveDirectoryA
CreateDirectoryA
WritePrivateProfileStringA
GetVersionExA
FindFirstFileA
FindNextFileA
FindClose
DeleteFileA
GetTickCount
CreateFileA
CreateProcessA
WaitForSingleObject
CreateMutexA
GetTempFileNameA
ReleaseMutex
GlobalLock
GlobalUnlock
lstrcatA
lstrcpyA
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
DisableThreadLibraryCalls
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
GetModuleFileNameA
GetShortPathNameA
FlushInstructionCache
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
Sleep
lstrlenW
GetCurrentProcess
WriteProcessMemory
IsBadStringPtrA
CreateThread
WideCharToMultiByte
GetFileSize
GetProcessHeap
HeapAlloc
ReadFile
CloseHandle
MultiByteToWideChar
WriteFile
LoadLibraryA
InterlockedDecrement
GetModuleFileNameW
LoadLibraryW
OutputDebugStringA
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetLastError
SetLastError
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedIncrement
lstrlenA
OpenMutexA
AdjustWindowRectEx
LoadBitmapA
SetTimer
GetGUIThreadInfo
GetWindowThreadProcessId
IsRectEmpty
EndDialog
SetWindowTextA
IsWindow
ClientToScreen
InsertMenuA
GetDlgItem
CheckMenuItem
RedrawWindow
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetAsyncKeyState
GetSubMenu
GetClassNameA
EnumChildWindows
IsChild
UnhookWindowsHookEx
DefWindowProcA
DestroyWindow
GetFocus
SetFocus
PostMessageA
SetWindowsHookExA
wsprintfA
LoadCursorA
RegisterClassExA
GetClassInfoExA
CallWindowProcA
CreateWindowExA
GetActiveWindow
DialogBoxParamA
BeginPaint
SetWindowLongA
GetWindowLongA
SendMessageA
EndPaint
CharNextA
LoadStringA
DestroyIcon
CharLowerA
SetWindowPos
MapWindowPoints
GetClientRect
SystemParametersInfoA
GetWindowRect
GetWindow
DeleteMenu
GetParent
IsWindowVisible
IsMenu
GetMenuItemID
EnableMenuItem
ShowWindow
LoadImageA
AdjustWindowRect
SetRect
UpdateWindow
LoadMenuA
DestroyMenu
GetKeyState
MessageBoxA
CreatePopupMenu
AppendMenuA
GetMenuItemCount
EnableWindow
SetCursor
GetWindowTextA
GetWindowTextLengthA
SetRectEmpty
ScreenToClient
GetCursorPos
ReleaseCapture
GetCapture
SetCapture
PtInRect
InvalidateRect
FillRect
OffsetRect
DrawTextA
GetDC
DrawFocusRect
ReleaseDC
DispatchMessageA
TranslateMessage
KillTimer
GetDesktopWindow
GetScrollInfo
SetScrollInfo
ScrollWindow
CharLowerBuffA
CallWindowProcW
IsWindowUnicode
SetWindowLongW
CharNextW
GetMenuItemRect
GetMessageA
PostThreadMessageA
CreateIconFromResourceEx
GetPropA
SetPropA
RemovePropA
FindWindowExA
InflateRect
CreateDialogParamA
SetDlgItemTextA
GetDlgItemTextA
EnumWindows
IsDialogMessageA
CharUpperA
InsertMenuItemA
GetMenuState
SetForegroundWindow
GetForegroundWindow
AttachThreadInput
CopyImage
PeekMessageA
CallNextHookEx
DrawStateA
GetSystemMetrics
RegisterWindowMessageA
TrackPopupMenuEx
GetMessagePos
GetSysColorBrush
FrameRect
GetMenuItemInfoA
SetMenuItemInfoA
IsWindowEnabled
MessageBeep
GetTopWindow
MenuItemFromPoint
GetClassInfoA
GetWindowPlacement
GetDlgCtrlID
GetWindowDC
GetMenuStringA
ModifyMenuA
WindowFromPoint
FindWindowA
LoadIconA
CopyRect
DrawIconEx
GetSysColor
MoveWindow
ExcludeClipRect
GetClipBox
SetViewportOrgEx
GetDeviceCaps
DPtoLP
SaveDC
RestoreDC
CreateBitmap
GetTextColor
GetCurrentObject
ExtTextOutA
Rectangle
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
GetPixel
TextOutA
CreateFontA
DeleteDC
SetTextColor
GetObjectA
CreateFontIndirectA
SetBkMode
SetBkColor
GetStockObject
CreatePen
SelectObject
MoveToEx
LineTo
GetTextExtentPoint32A
DeleteObject
RegDeleteKeyA
GetUserNameA
RegSetKeySecurity
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
EnumDependentServicesA
ControlService
OpenSCManagerA
OpenServiceA
StartServiceA
QueryServiceStatus
ChangeServiceConfigA
CloseServiceHandle
RegCreateKeyA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
DragQueryFileA
SHGetFileInfoA
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ExtractIconA
ShellExecuteA
SHGetSpecialFolderPathA
SHGetDesktopFolder
SHBrowseForFolderA
ReleaseStgMedium
GetHGlobalFromStream
CoInitialize
OleInitialize
RevokeDragDrop
CoGetClassObject
CreateStreamOnHGlobal
OleUninitialize
RegisterDragDrop
CoCreateGuid
StringFromGUID2
OleRun
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateErrorInfo
SetErrorInfo
GetErrorInfo
SysStringByteLen
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
OleLoadPicture
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
VariantChangeType
VariantInit
VariantCopy
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
PathIsDirectoryA
PathRemoveFileSpecA
UrlCanonicalizeA
SHDeleteKeyA
PathFileExistsA
PathFindFileNameA
PathRemoveExtensionA
SHSetValueA
SHDeleteValueA
UrlUnescapeA
UrlEscapeA
StrRetToStrW
StrRetToStrA
StrStrIA
SHCopyKeyA
SHGetValueA
AccessibleObjectFromPoint
UuidCreate
ImmGetDefaultIMEWnd
CoInternetGetSession
URLDownloadToFileA
TransparentBlt
AlphaBlend
_strcmpi
_stricmp
_wcsnicmp
_wcsupr
_adjust_fdiv
_initterm
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_onexit
__dllonexit
_endthreadex
strncmp
_memicmp
strtol
_beginthread
_endthread
_local_unwind2
_mbspbrk
tolower
strncat
bsearch
qsort
_fullpath
printf
_vsnprintf
_CxxThrowException
_strnicmp
toupper
strstr
isxdigit
isalnum
_wstat
fputs
fseek
ftell
_mbsnbcmp
__RTDynamicCast
strtod
atol
abs
fwrite
fread
_ftol
_mbsnbcpy
_mbsicoll
sscanf
fopen
fprintf
fclose
_beginthreadex
calloc
localtime
atof
_snwprintf
wcsncpy
wcsstr
wcschr
_wcsicmp
iswdigit
swscanf
iswalpha
_mbstok
_mbsrchr
strcat
malloc
memmove
strcmp
wcscmp
memset
strncpy
strrchr
_stat
_snprintf
srand
rand
memcmp
strcpy
strchr
_mbschr
_ismbcspace
_mbsnbicmp
_except_handler3
free
realloc
_mbsicmp
_mbscmp
_purecall
time
atoi
_ismbcdigit
wcslen
sprintf
strlen
vsprintf
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
_mbsstr
InternetSetStatusCallback
FtpOpenFileA
InternetAttemptConnect
FindFirstUrlCacheGroup
DeleteUrlCacheGroup
FindNextUrlCacheGroup
DeleteUrlCacheEntry
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetConnectA
InternetConnectW
HttpOpenRequestA
HttpOpenRequestW
HttpSendRequestA
HttpQueryInfoA
HttpSendRequestW
HttpQueryInfoW
InternetCloseHandle
InternetSetStatusCallbackA
InternetSetStatusCallbackW
InternetReadFile
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
GetUrlCacheEntryInfoA
InternetQueryDataAvailable
InternetSetFilePointer
InternetSetCookieA
InternetGetCookieA
HttpAddRequestHeadersA
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
InternetQueryOptionA
InternetGetConnectedState
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
FindCloseUrlCache
SetupIterateCabinetA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetAdaptersInfo
GetNetworkParams
gethostname
gethostbyname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Install
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ