Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_fceb3930c2356d17b1e28b8baa64dc77.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_fceb3930c2356d17b1e28b8baa64dc77.dll
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_fceb3930c2356d17b1e28b8baa64dc77
-
Size
223KB
-
MD5
fceb3930c2356d17b1e28b8baa64dc77
-
SHA1
88b26e0450e35a7cf1af7ec7b09127643b1322d5
-
SHA256
b83c9092b6fc0f7c29a715341492187cd85383d34172d80c241042c80c7e1207
-
SHA512
d80cb8c3cd27a9e174b7aa81e89486898fb259d164a3542461a0afaa27cae82ead824cb99487ad86a40b1f94e8a0d49071ce1659585fe455a3d9b3b20aedc051
-
SSDEEP
3072:R8AfgU/efWgvPTEJY3iy2X6iQYDNXq5vOommiuO/ykNgglpOQhMdr57Dufmf0nmh:R8JxvIK392sYdyYykug45u+snLMjB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VirusShare_fceb3930c2356d17b1e28b8baa64dc77
Files
-
VirusShare_fceb3930c2356d17b1e28b8baa64dc77.dll windows:5 windows x86 arch:x86
9751e5b9d05e83e8d84e2733528dbe79
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateHardLinkW
CreateIoCompletionPort
CreateJobObjectW
CreateMailslotA
CreateMailslotW
CreateProcessW
CreateTimerQueue
CreateToolhelp32Snapshot
CreateWaitableTimerW
DebugBreak
DeleteFileA
DeleteFileW
DeleteTimerQueue
DeleteVolumeMountPointA
DeleteVolumeMountPointW
DosDateTimeToFileTime
DuplicateHandle
EndUpdateResourceA
EnumCalendarInfoA
EnumCalendarInfoExA
EnumLanguageGroupLocalesW
EnumResourceNamesA
EnumSystemLanguageGroupsA
EnumSystemLanguageGroupsW
EnumSystemLocalesA
EnumSystemLocalesW
EnumTimeFormatsA
EnumTimeFormatsW
ExitThread
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
FindClose
FindFirstChangeNotificationA
FindFirstVolumeMountPointA
FindNextChangeNotification
FindNextFileW
FindNextVolumeMountPointA
FindResourceExW
FindResourceW
FlushInstructionCache
FoldStringW
FreeEnvironmentStringsW
FreeResource
FreeUserPhysicalPages
GetCPInfo
GetCPInfoExW
GetCalendarInfoA
GetCommMask
GetCommModemStatus
GetCommProperties
GetCommState
GetCommandLineW
GetCompressedFileSizeW
GetComputerNameA
GetComputerNameExA
GetComputerNameExW
GetConsoleAliasExesA
GetConsoleAliasExesLengthA
GetConsoleDisplayMode
GetConsoleFontSize
GetConsoleOutputCP
GetConsoleTitleW
GetDateFormatA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentStrings
GetEnvironmentStringsA
GetEnvironmentStringsW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
GetHandleInformation
GetLargestConsoleWindowSize
GetLastError
GetLogicalDriveStringsA
GetLongPathNameA
GetMailslotInfo
GetNumberFormatW
GetOEMCP
GetPrivateProfileSectionA
GetPrivateProfileSectionW
GetPrivateProfileStructA
GetProcessHeaps
GetProcessShutdownParameters
GetProcessWorkingSetSize
GetProfileIntW
GetProfileStringA
GetProfileStringW
GetStartupInfoA
GetStdHandle
GetStringTypeExW
GetStringTypeW
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetSystemPowerStatus
GetSystemTimeAdjustment
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryA
GetSystemWindowsDirectoryW
GetTempFileNameW
GetTempPathA
GetThreadLocale
GetThreadPriority
GetThreadTimes
GetTimeZoneInformation
GetUserDefaultUILanguage
GetVolumeInformationW
GetVolumeNameForVolumeMountPointA
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWriteWatch
GlobalLock
CreateFileMappingW
GlobalUnWire
GlobalUnlock
Heap32ListNext
HeapAlloc
HeapDestroy
HeapUnlock
HeapWalk
InitializeCriticalSectionAndSpinCount
InterlockedExchange
IsBadCodePtr
IsBadStringPtrW
IsDBCSLeadByte
IsValidCodePage
IsValidLanguageGroup
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFlags
LocalReAlloc
LocalSize
LockFileEx
LockResource
MapViewOfFile
MapViewOfFileEx
MoveFileA
MoveFileExA
MoveFileW
MultiByteToWideChar
OpenProcess
OpenSemaphoreA
OutputDebugStringA
PeekConsoleInputW
Process32Next
PurgeComm
QueryDosDeviceA
ReadConsoleInputW
ReadConsoleOutputA
ReadConsoleOutputCharacterA
ReadConsoleOutputCharacterW
ReadConsoleW
ReadDirectoryChangesW
ReadFileEx
ReadFileScatter
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
ReplaceFile
ReplaceFileA
ReplaceFileW
RequestDeviceWakeup
RequestWakeupLatency
RtlUnwind
RtlZeroMemory
ScrollConsoleScreenBufferW
SearchPathA
SearchPathW
SetComputerNameA
SetComputerNameW
SetConsoleActiveScreenBuffer
SetConsoleMode
SetConsoleScreenBufferSize
SetConsoleTitleA
SetConsoleTitleW
SetConsoleWindowInfo
SetCriticalSectionSpinCount
SetCurrentDirectoryA
SetCurrentDirectoryW
SetFileApisToANSI
SetHandleInformation
SetLastError
SetMailslotInfo
SetNamedPipeHandleState
SetProcessAffinityMask
SetStdHandle
SetThreadAffinityMask
SetVolumeLabelA
SetVolumeMountPointA
SetupComm
SignalObjectAndWait
SleepEx
SwitchToFiber
SystemTimeToFileTime
TerminateProcess
Thread32First
Thread32Next
TlsAlloc
TlsGetValue
TryEnterCriticalSection
UpdateResourceW
VirtualAllocEx
VirtualFreeEx
WaitForDebugEvent
WaitForMultipleObjects
WaitForSingleObject
WriteConsoleInputW
WriteConsoleOutputW
WritePrivateProfileSectionW
WritePrivateProfileStringW
WritePrivateProfileStructW
WriteProfileSectionA
WriteProfileStringW
WriteTapemark
_hread
_lcreat
_llseek
_lread
_lwrite
lstrcat
lstrcpy
lstrcpyn
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
CreateFileMappingA
CreateEventW
CreateDirectoryExW
CreateConsoleScreenBuffer
CopyFileW
CopyFileA
ConnectNamedPipe
CompareStringW
CloseHandle
ClearCommBreak
BeginUpdateResourceA
Beep
BackupSeek
AssignProcessToJobObject
AllocateUserPhysicalPages
AddAtomW
LoadLibraryW
GetProcAddress
GetWindowsDirectoryW
lstrcatW
ExitProcess
CreateFileW
GlobalSize
VirtualAlloc
IsDebuggerPresent
user32
SetWindowWord
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SwitchToThisWindow
TileWindows
ToAscii
ToAsciiEx
TrackPopupMenu
TrackPopupMenuEx
TranslateAccelerator
TranslateAcceleratorA
TranslateAcceleratorW
UnhookWinEvent
UnhookWindowsHook
UpdateLayeredWindow
ValidateRect
VkKeyScanW
WaitMessage
keybd_event
mouse_event
wsprintfA
wvsprintfA
wvsprintfW
SetWindowTextA
ClientToScreen
CheckMenuItem
CharToOemBuffA
CharPrevExA
CharNextA
CharLowerW
CharLowerBuffW
CharLowerBuffA
ChangeDisplaySettingsW
ChangeDisplaySettingsExW
ChangeDisplaySettingsExA
ChangeDisplaySettingsA
ChangeClipboardChain
CascadeChildWindows
CallWindowProcW
CallNextHookEx
CallMsgFilterA
BroadcastSystemMessageA
BringWindowToTop
BlockInput
BeginPaint
AppendMenuW
AnimateWindow
GetDC
ActivateKeyboardLayout
AdjustWindowRectEx
SetWindowRgn
SetWindowPos
SetWindowPlacement
SetWinEventHook
SetTimer
SetThreadDesktop
SetScrollPos
SetPropW
SetProcessDefaultLayout
SetMenuItemBitmaps
SetMenu
SetLastErrorEx
SetForegroundWindow
SetDlgItemInt
SetDebugErrorLevel
SetCursorPos
SetCursor
SetClassWord
SetCaretPos
SetCapture
SendNotifyMessageW
SendNotifyMessageA
CloseDesktop
SendMessageA
SendInput
ScrollWindow
RemoveMenu
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClipboardFormatW
RegisterClassA
RealGetWindowClassW
RealGetWindowClass
RealChildWindowFromPoint
PostThreadMessageA
PostMessageW
PeekMessageW
PeekMessageA
OpenWindowStationW
OpenDesktopW
OpenDesktopA
OemToCharW
OemToCharBuffA
OemToCharA
NotifyWinEvent
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MonitorFromRect
MonitorFromPoint
ModifyMenuA
MessageBoxIndirectW
MessageBoxExA
MessageBoxA
MapVirtualKeyExA
MapVirtualKeyA
LockWorkStation
LockWindowUpdate
LoadStringA
LoadMenuW
LoadMenuIndirectW
LoadKeyboardLayoutW
LoadImageW
LoadCursorW
LoadCursorFromFileA
LoadBitmapW
SendMessageW
LoadBitmapA
KillTimer
IsWindowVisible
IsWindowUnicode
IsMenu
IsDialogMessage
IsChild
IsCharAlphaNumericW
InvertRect
InvalidateRgn
InternalGetWindowText
InsertMenuW
InsertMenuItemA
InsertMenuA
InSendMessageEx
ImpersonateDdeClientWindow
IMPSetIMEW
IMPQueryIMEA
IMPGetIMEW
HiliteMenuItem
GetWindowThreadProcessId
GetWindowModuleFileNameA
GetWindowModuleFileName
GetWindow
GetUserObjectSecurity
GetUserObjectInformationA
GetTopWindow
GetSystemMetrics
GetSysColor
GetShellWindow
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetOpenClipboardWindow
GetNextDlgTabItem
GetMessageTime
GetMessagePos
GetMessageExtraInfo
GetMessageA
GetMenuStringW
GetMenuStringA
GetMenuState
GetMenuItemRect
GetMenuItemID
GetMenuContextHelpId
GetMenuCheckMarkDimensions
GetMenuBarInfo
GetMenu
GetLastInputInfo
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetKBCodePage
GetGuiResources
GetForegroundWindow
GetDCEx
GetCursor
GetClipboardOwner
GetClipboardFormatNameA
GetClipCursor
GetClassNameW
GetClassNameA
GetCaretPos
GetAsyncKeyState
GetAncestor
GetAltTabInfoA
FlashWindow
FindWindowExW
FindWindowExA
EnumWindows
EnumWindowStationsW
EnumWindowStationsA
EnumPropsExA
EnumDisplaySettingsExA
EnumDisplaySettingsA
EnumClipboardFormats
EnumChildWindows
EndTask
EndDialog
EnableScrollBar
DrawTextW
DrawTextA
DrawStateW
DrawStateA
DrawFrameControl
DrawCaption
DrawAnimatedRects
DragDetect
DlgDirSelectExA
DlgDirSelectComboBoxExW
DlgDirListComboBoxW
DispatchMessageW
DialogBoxParamW
DialogBoxParamA
DialogBoxIndirectParamA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCaret
DestroyAcceleratorTable
DefMDIChildProcW
DefMDIChildProcA
DefDlgProcW
DdeUnaccessData
DdeQueryStringW
DdePostAdvise
DdeInitializeW
DdeInitializeA
DdeGetLastError
DdeFreeStringHandle
DdeConnectList
DdeConnect
DdeCmpStringHandles
DdeAbandonTransaction
CreateWindowStationW
CreateWindowExW
CreateMDIWindowW
CreateMDIWindowA
CreateDialogIndirectParamW
CreateDialogIndirectParamA
CreateDesktopW
CreateCaret
CreateAcceleratorTableW
CreateAcceleratorTableA
CountClipboardFormats
CopyRect
CopyImage
CopyIcon
CloseWindowStation
ClipCursor
CloseWindow
gdi32
DPtoLP
comdlg32
GetOpenFileNameW
ChooseColorA
ChooseColorW
ChooseFontA
ChooseFontW
CommDlgExtendedError
FindTextA
FindTextW
GetFileTitleA
GetFileTitleW
GetOpenFileNameA
GetSaveFileNameA
GetSaveFileNameW
PageSetupDlgA
PageSetupDlgW
PrintDlgA
PrintDlgExA
PrintDlgExW
PrintDlgW
ReplaceTextA
ReplaceTextW
ole32
WriteStringStream
WriteOleStg
WriteFmtUserTypeStg
WriteClassStg
WdtpInterfacePointer_UserMarshal
WdtpInterfacePointer_UserFree
UtGetDvtd32Info
UtGetDvtd16Info
UtConvertDvtd32toDvtd16
UtConvertDvtd16toDvtd32
StringFromGUID2
StringFromCLSID
StgOpenStorageOnILockBytes
StgOpenStorageEx
StgOpenStorage
StgOpenPropStg
StgGetIFillLockBytesOnILockBytes
StgCreatePropStg
StgCreateDocfileOnILockBytes
StgCreateDocfile
SetDocumentBitStg
SetConvertStg
STGMEDIUM_UserUnmarshal
STGMEDIUM_UserSize
STGMEDIUM_UserMarshal
STGMEDIUM_UserFree
SNB_UserMarshal
SNB_UserFree
ReadOleStg
ReadClassStm
ReadClassStg
PropVariantClear
PropStgNameToFmtId
OleTranslateAccelerator
OleSetMenuDescriptor
OleSetClipboard
OleSetAutoConvert
OleSave
OleRun
OleRegGetUserType
OleRegEnumVerbs
OleRegEnumFormatEtc
OleQueryLinkFromData
OleLoad
OleIsRunning
OleIsCurrentClipboard
OleInitializeWOW
OleInitialize
OleGetIconOfFile
OleGetIconOfClass
OleGetClipboard
OleGetAutoConvert
OleFlushClipboard
OleDuplicateData
OleDraw
OleDoAutoConvert
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
OleCreateFromFileEx
OleCreateFromData
OleCreateEx
OleConvertIStorageToOLESTREAM
MonikerRelativePathTo
MkParseDisplayName
IsEqualGUID
IsAccelerator
IIDFromString
HkOleRegisterObject
HWND_UserUnmarshal
HWND_UserSize
HWND_UserMarshal
HPALETTE_UserSize
HPALETTE_UserFree
HMETAFILE_UserSize
HMETAFILEPICT_UserSize
HMETAFILEPICT_UserMarshal
HMETAFILEPICT_UserFree
HMENU_UserUnmarshal
HMENU_UserMarshal
HICON_UserUnmarshal
HICON_UserSize
HICON_UserMarshal
HICON_UserFree
HGLOBAL_UserUnmarshal
HGLOBAL_UserSize
HGLOBAL_UserMarshal
HGLOBAL_UserFree
HENHMETAFILE_UserUnmarshal
HENHMETAFILE_UserSize
HENHMETAFILE_UserMarshal
HDC_UserUnmarshal
HDC_UserMarshal
HDC_UserFree
HBRUSH_UserUnmarshal
HBRUSH_UserSize
HBRUSH_UserMarshal
HBRUSH_UserFree
HBITMAP_UserUnmarshal
HBITMAP_UserSize
HBITMAP_UserMarshal
HACCEL_UserSize
HACCEL_UserMarshal
HACCEL_UserFree
GetHGlobalFromStream
GetHGlobalFromILockBytes
GetDocumentBitStg
GetConvertStg
GetClassFile
DllDebugObjectRPCHook
DcomChannelSetHResult
CreateStreamOnHGlobal
CreateStdProgressIndicator
CreateOleAdviseHolder
CreateILockBytesOnHGlobal
CreateFileMoniker
CreateDataCache
CreateClassMoniker
CreateBindCtx
CreateAntiMoniker
CoUnmarshalInterface
CoUnmarshalHresult
CoTreatAsClass
CoTestCancel
CoTaskMemFree
CoTaskMemAlloc
CoSwitchCallContext
CoSetProxyBlanket
CoRevokeMallocSpy
CoRevokeClassObject
CoRevertToSelf
CoReleaseServerProcess
CoReleaseMarshalData
CoRegisterSurrogateEx
CoRegisterSurrogate
CoRegisterPSClsid
CoRegisterMessageFilter
CoRegisterMallocSpy
CoRegisterClassObject
CoRegisterChannelHook
CoQueryProxyBlanket
CoQueryClientBlanket
CoQueryAuthenticationServices
CoMarshalInterface
CoMarshalInterThreadInterfaceInStream
CoLockObjectExternal
CoLoadLibrary
CoInstall
CoInitializeWOW
CoInitializeSecurity
CoInitializeEx
CoImpersonateClient
CoGetTreatAsClass
CoGetStdMarshalEx
CoGetObject
CoGetMarshalSizeMax
CoGetInterfaceAndReleaseStream
CoGetCurrentProcess
CoGetClassVersion
CoGetClassObject
CoGetCancelObject
CoGetCallerTID
CoGetCallContext
CoFreeUnusedLibraries
CoFreeLibrary
CoFreeAllLibraries
CoFileTimeToDosDateTime
CoFileTimeNow
CoDosDateTimeToFileTime
CoDisconnectObject
CoCreateInstanceEx
CoCreateGuid
CoCreateFreeThreadedMarshaler
CoCopyProxy
CoBuildVersion
CoAddRefServerProcess
CLSIDFromString
CLSIDFromProgIDEx
CLIPFORMAT_UserUnmarshal
CLIPFORMAT_UserSize
CLIPFORMAT_UserMarshal
CreatePointerMoniker
oleaut32
OACreateTypeLib2
LPSAFEARRAY_UserSize
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_Size
LHashValOfNameSys
GetRecordInfoFromTypeInfo
DispInvoke
DispGetParam
DispGetIDsOfNames
CreateTypeLib2
CreateStdDispatch
CreateErrorInfo
CreateDispTypeInfo
ClearCustData
BstrFromVector
BSTR_UserUnmarshal
BSTR_UserSize
BSTR_UserMarshal
OleCreatePictureIndirect
OleCreatePropertyFrameIndirect
OleLoadPicture
OleLoadPictureEx
OleLoadPicturePath
OleSavePictureFile
QueryPathOfRegTypeLi
RegisterActiveObject
RegisterTypeLi
RevokeActiveObject
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayCopy
SafeArrayCreateVectorEx
SafeArrayDestroyData
SafeArrayDestroyDescriptor
SafeArrayGetIID
SafeArrayGetUBound
SafeArrayGetVartype
SafeArrayPutElement
SafeArraySetRecordInfo
SafeArrayUnaccessData
SafeArrayUnlock
SetErrorInfo
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
SysReAllocString
SysReAllocStringLen
SysStringByteLen
SystemTimeToVariantTime
VARIANT_UserFree
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VarAbs
VarAdd
VarAnd
VarBoolFromDisp
VarBoolFromI2
VarBoolFromI4
VarBoolFromR8
VarBoolFromUI2
VarBoolFromUI4
VarBstrCat
VarBstrCmp
VarBstrFromBool
VarBstrFromCy
VarBstrFromDate
VarBstrFromI1
VarBstrFromUI2
VarCyAbs
VarCyAdd
VarCyCmpR8
VarCyFix
VarCyFromDate
VarCyFromI1
VarCyFromR8
VarCyFromStr
VarCyFromUI1
VarCyFromUI2
VarCyFromUI4
VarCyInt
VarCyMul
VarCyNeg
VarCyRound
VarCySu
VarDateFromCy
VarDateFromI4
VarDateFromR8
VarDateFromStr
VarDateFromUI1
VarDateFromUI2
VarDateFromUdate
VarDecAbs
VarDecAdd
VarDecCmp
VarDecCmpR8
VarDecFromDate
VarDecFromI2
VarDecFromR4
VarDecFromStr
VarDecFromUI1
VarDecFromUI2
VarDecInt
VarDecNeg
VarDecRound
VarDecSu
VarDiv
VarFix
VarFormatCurrency
VarFormatDateTime
VarFormatFromTokens
VarFormatNumber
VarI1FromBool
VarI1FromCy
VarI1FromDate
VarI1FromDec
VarI1FromI4
VarI1FromR4
VarI1FromStr
VarI1FromUI1
VarI1FromUI2
VarI1FromUI4
VarI2FromBool
VarI2FromCy
VarI2FromI1
VarI2FromI4
VarI2FromR4
VarI2FromR8
VarI2FromStr
VarI2FromUI2
VarI4FromBool
VarI4FromDate
VarI4FromDec
VarI4FromI2
VarI4FromR4
VarI4FromStr
VarI4FromUI1
VarI4FromUI4
VarIdiv
VarImp
VarInt
VarMod
VarMonthName
VarMul
VarPow
VarR4CmpR8
VarR4FromBool
VarR4FromCy
VarR4FromDate
VarR4FromDec
VarR4FromI2
VarR4FromI4
VarR4FromR8
VarR4FromStr
VarR4FromUI1
VarR4FromUI4
VarR8FromDate
VarR8FromDisp
VarR8FromI1
VarR8FromI2
VarR8FromI4
VarR8FromUI1
VarR8FromUI2
VarR8Round
VarRound
VarTokenizeFormatString
VarUI1FromDec
VarUI1FromI1
VarUI1FromR8
VarUI1FromStr
VarUI1FromUI2
VarUI2FromBool
VarUI2FromCy
VarUI2FromI1
VarUI2FromI2
VarUI2FromR8
VarUI2FromStr
VarUI2FromUI1
VarUI2FromUI4
VarUI4FromCy
VarUI4FromDate
VarUI4FromDec
VarUI4FromI1
VarUI4FromI4
VarUI4FromR4
VarUI4FromUI1
VarUI4FromUI2
VarWeekdayName
VariantChangeTypeEx
VariantCopy
VariantCopyInd
VariantInit
VariantTimeToDosDateTime
VariantTimeToSystemTime
VectorFromBstr
LPSAFEARRAY_UserUnmarshal
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ