d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb
Overview
overview
9Static
static
70f6906b9eb...49.exe
windows7-x64
90f6906b9eb...49.exe
windows10-1703-x64
90f6906b9eb...49.exe
windows10-2004-x64
90f6906b9eb...49.exe
windows11-21h2-x64
9482c687216...1d.exe
windows7-x64
9482c687216...1d.exe
windows10-1703-x64
9482c687216...1d.exe
windows10-2004-x64
9482c687216...1d.exe
windows11-21h2-x64
9885e8063fe...86.exe
windows7-x64
9885e8063fe...86.exe
windows10-1703-x64
9885e8063fe...86.exe
windows10-2004-x64
9885e8063fe...86.exe
windows11-21h2-x64
9d38ba527e5...65.exe
windows7-x64
8d38ba527e5...65.exe
windows10-1703-x64
8d38ba527e5...65.exe
windows10-2004-x64
8d38ba527e5...65.exe
windows11-21h2-x64
8eae72d803b...44.exe
windows7-x64
7eae72d803b...44.exe
windows10-1703-x64
7eae72d803b...44.exe
windows10-2004-x64
7eae72d803b...44.exe
windows11-21h2-x64
7f45c1a4ed9...0e.exe
windows7-x64
7f45c1a4ed9...0e.exe
windows10-1703-x64
7f45c1a4ed9...0e.exe
windows10-2004-x64
7f45c1a4ed9...0e.exe
windows11-21h2-x64
7Behavioral task
behavioral1
Sample
0f6906b9eb39f30b6ecbc4a9b564636d167357af637ca3c7f7d80d161d396c49.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0f6906b9eb39f30b6ecbc4a9b564636d167357af637ca3c7f7d80d161d396c49.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
0f6906b9eb39f30b6ecbc4a9b564636d167357af637ca3c7f7d80d161d396c49.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
0f6906b9eb39f30b6ecbc4a9b564636d167357af637ca3c7f7d80d161d396c49.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
482c6872164fb3de06264a4bfe492e02b1e645e73c2e58dc9ed03413200c6a1d.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
482c6872164fb3de06264a4bfe492e02b1e645e73c2e58dc9ed03413200c6a1d.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
482c6872164fb3de06264a4bfe492e02b1e645e73c2e58dc9ed03413200c6a1d.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
482c6872164fb3de06264a4bfe492e02b1e645e73c2e58dc9ed03413200c6a1d.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
885e8063fe9689bec0b1dae96d3431a51feb800515bba38a58c8767783117486.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
885e8063fe9689bec0b1dae96d3431a51feb800515bba38a58c8767783117486.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
885e8063fe9689bec0b1dae96d3431a51feb800515bba38a58c8767783117486.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
885e8063fe9689bec0b1dae96d3431a51feb800515bba38a58c8767783117486.exe
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
d38ba527e5b8c99e83f2877288707140b4e71558b41fc87d98ed6c1f3b4fd065.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
d38ba527e5b8c99e83f2877288707140b4e71558b41fc87d98ed6c1f3b4fd065.exe
Resource
win10-20240611-en
Behavioral task
behavioral15
Sample
d38ba527e5b8c99e83f2877288707140b4e71558b41fc87d98ed6c1f3b4fd065.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
d38ba527e5b8c99e83f2877288707140b4e71558b41fc87d98ed6c1f3b4fd065.exe
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
eae72d803bf67df22526f50fc7ab84d838efb2865c27aef1a61592b1c520d144.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
eae72d803bf67df22526f50fc7ab84d838efb2865c27aef1a61592b1c520d144.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
eae72d803bf67df22526f50fc7ab84d838efb2865c27aef1a61592b1c520d144.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
eae72d803bf67df22526f50fc7ab84d838efb2865c27aef1a61592b1c520d144.exe
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
f45c1a4ed9f6ff5d76632771d84e41f3521fae9165bf2241434bf4d40d552a0e.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
f45c1a4ed9f6ff5d76632771d84e41f3521fae9165bf2241434bf4d40d552a0e.exe
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
f45c1a4ed9f6ff5d76632771d84e41f3521fae9165bf2241434bf4d40d552a0e.exe
Resource
win10v2004-20240802-en
General
-
Target
Desktop.rar
-
Size
1.5MB
-
MD5
c7c97a6252fd07e638374a23a6c24e3a
-
SHA1
b614cb3872ed9a67e082cf7994e607fc23d6b977
-
SHA256
037d9e63e90de133bb69f3040b94751cc68b2c431d81bc87c9eaeaf53ec5a025
-
SHA512
df353f99e929045d8223457fa194ed5eed4e10668bef449907ab29fde54e1282f1fbf20014b132819dada4d353f83d2f1161b11ded45a8b64e9c42cf88085f73
-
SSDEEP
24576:R8GPJ3a+Hajh5O51CPs8UZskV4YE6SyNyHfTeSBvJn3aP862F/lyWMf+de3xxcpP:R8G5a+2OfQs8Ck3yNyH7eSBB3d9VMGS2
Malware Config
Signatures
-
resource yara_rule static1/unpack001/482c6872164fb3de06264a4bfe492e02b1e645e73c2e58dc9ed03413200c6a1d upx static1/unpack001/f45c1a4ed9f6ff5d76632771d84e41f3521fae9165bf2241434bf4d40d552a0e upx -
Unsigned PE 7 IoCs
Checks for missing Authenticode signature.
resource unpack001/0f6906b9eb39f30b6ecbc4a9b564636d167357af637ca3c7f7d80d161d396c49 unpack001/482c6872164fb3de06264a4bfe492e02b1e645e73c2e58dc9ed03413200c6a1d unpack001/885e8063fe9689bec0b1dae96d3431a51feb800515bba38a58c8767783117486 unpack001/d38ba527e5b8c99e83f2877288707140b4e71558b41fc87d98ed6c1f3b4fd065 unpack001/eae72d803bf67df22526f50fc7ab84d838efb2865c27aef1a61592b1c520d144 unpack001/f45c1a4ed9f6ff5d76632771d84e41f3521fae9165bf2241434bf4d40d552a0e unpack003/out.upx
Files
-
Desktop.rar.rar
-
0f6906b9eb39f30b6ecbc4a9b564636d167357af637ca3c7f7d80d161d396c49.exe windows:5 windows x86 arch:x86
b8e3efd9ce4dbdcfda0ffa2c21a2daa0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
VirtualProtect
GetCurrentProcess
ExitProcess
SetUnhandledExceptionFilter
GetCurrentThread
GetThreadContext
WaitForDebugEvent
ContinueDebugEvent
GetSystemInfo
VirtualAlloc
LoadLibraryA
GetModuleHandleA
CreateProcessA
GetStartupInfoA
GetCommandLineA
MapViewOfFileEx
GetComputerNameA
IsValidLocale
WriteProcessMemory
lstrcmpiW
lstrcpyA
CreateFileW
HeapSize
WideCharToMultiByte
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
GetLastError
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
InterlockedPushEntrySList
InterlockedFlushSList
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
WriteFile
GetACP
GetDateFormatW
GetTimeFormatW
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
SetConsoleCtrlHandler
GetTimeZoneInformation
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
OutputDebugStringA
OutputDebugStringW
CreateThread
SetStdHandle
ReadConsoleW
WriteConsoleW
GetProcAddress
user32
GetShellWindow
GetWindowThreadProcessId
advapi32
SystemFunction036
Sections
.text Size: 513KB - Virtual size: 513KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
482c6872164fb3de06264a4bfe492e02b1e645e73c2e58dc9ed03413200c6a1d.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 752KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 163KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 207KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
-
885e8063fe9689bec0b1dae96d3431a51feb800515bba38a58c8767783117486.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 399KB - Virtual size: 398KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
d38ba527e5b8c99e83f2877288707140b4e71558b41fc87d98ed6c1f3b4fd065.exe windows:5 windows x86 arch:x86
4cfda23baf1e2e983ddfeca47a5c755a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
shlwapi
SHAutoComplete
kernel32
FindClose
FindNextFileW
FindFirstFileW
GetVersionExW
GetCurrentDirectoryW
GetFullPathNameW
GetModuleFileNameW
FindResourceW
GetModuleHandleW
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcessId
GetLocaleInfoW
GetNumberFormatW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
WaitForSingleObject
GetDateFormatW
GetTimeFormatW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetExitCodeProcess
GetTempPathW
MoveFileExW
UnmapViewOfFile
Sleep
MapViewOfFile
GetCommandLineW
CreateFileMappingW
GetTickCount
OpenFileMappingW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
GetProcessAffinityMask
CreateEventW
CreateSemaphoreW
ReleaseSemaphore
ResetEvent
SetEvent
SetThreadPriority
SystemTimeToFileTime
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
LocalFileTimeToFileTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
SetFileTime
SetFileAttributesW
SetCurrentDirectoryW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleHandleA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetModuleFileNameA
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualAlloc
VirtualFree
HeapCreate
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetCommandLineA
RaiseException
GetFileAttributesW
FlushFileBuffers
ReadFile
GetFileType
SetEndOfFile
SetFilePointer
WriteFile
GetStdHandle
GetLongPathNameW
GetShortPathNameW
GlobalAlloc
MoveFileW
CreateFileW
CreateDirectoryW
DeviceIoControl
RemoveDirectoryW
DeleteFileW
CreateHardLinkW
GetCurrentProcess
CloseHandle
SetLastError
GetLastError
CreateFileA
GetCPInfo
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
HeapFree
RtlUnwind
user32
EnableWindow
GetDlgItem
ShowWindow
SetWindowLongW
GetDC
ReleaseDC
FindWindowExW
GetParent
MapWindowPoints
CreateWindowExW
UpdateWindow
LoadCursorW
RegisterClassExW
DefWindowProcW
DestroyWindow
CopyRect
IsWindow
CharUpperW
OemToCharBuffA
LoadIconW
LoadBitmapW
PostMessageW
GetSysColor
SetForegroundWindow
MessageBoxW
WaitForInputIdle
IsWindowVisible
DialogBoxParamW
DestroyIcon
SetFocus
GetClassNameW
SendDlgItemMessageW
EndDialog
GetDlgItemTextW
SetDlgItemTextW
wvsprintfW
SendMessageW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadStringW
GetWindowRect
GetClientRect
SetWindowPos
GetWindowTextW
SetWindowTextW
GetSystemMetrics
GetWindow
GetWindowLongW
gdi32
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
StretchBlt
DeleteDC
GetObjectW
DeleteObject
CreateDIBSection
comdlg32
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
shell32
SHBrowseForFolderW
ShellExecuteExW
SHGetSpecialFolderLocation
SHFileOperationW
SHGetPathFromIDListW
SHGetMalloc
SHChangeNotify
SHGetFileInfoW
ole32
CLSIDFromString
CoCreateInstance
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
oleaut32
VariantInit
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
eae72d803bf67df22526f50fc7ab84d838efb2865c27aef1a61592b1c520d144.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 394KB - Virtual size: 394KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
f45c1a4ed9f6ff5d76632771d84e41f3521fae9165bf2241434bf4d40d552a0e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 100KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ