C:\Users\C5\source\repos\PinkEye\PinkEye\bin\x64\Release\PinkEye.pdb
Overview
overview
8Static
static
3PinkEye V3...ye.exe
windows11-21h2-x64
7PinkEye V3...ye.dll
windows11-21h2-x64
1PinkEye V3...ye.sys
windows11-21h2-x64
1PinkEye V3...or.dll
windows11-21h2-x64
1PinkEye V3...64.dll
windows11-21h2-x64
1PinkEye V3...64.dll
windows11-21h2-x64
1PinkEye V3...du.exe
windows11-21h2-x64
8Static task
static1
Behavioral task
behavioral1
Sample
PinkEye V3/PinkEye.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
PinkEye V3/bin/PinkEye.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
PinkEye V3/bin/PinkEye.sys
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
PinkEye V3/bin/PinkEyeInjector.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
PinkEye V3/bin/Taigei64.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
PinkEye V3/bin/drv64.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
PinkEye V3/bin/kdu.exe
Resource
win11-20240802-en
General
-
Target
PinkEye V3.zip
-
Size
8.8MB
-
MD5
e3686de4494350b8bc453c60809ad09d
-
SHA1
1d251d75ca2ff124229bbe140c0c9f096c5ae876
-
SHA256
905a9d553659f7b5ce4e67bda5b53caf38d334e3ca025758e2070599ff7b22a1
-
SHA512
bef408efc9eead56b138793b2f588941307f935fcb9784f9b0df4a72eaa0922edf9cea7a408ee2063d250ad62355a922e3af71c4ec30a1bc451e865bac2f6004
-
SSDEEP
196608:WeLDWDRMqCL05oT1+nUjPW3Rpd0wk6WdSDIR7n9FdDp+3:fLDRR2Qe3WwT8R79g
Malware Config
Signatures
-
Unsigned PE 7 IoCs
Checks for missing Authenticode signature.
resource unpack001/PinkEye V3/PinkEye.exe unpack001/PinkEye V3/bin/PinkEye.dll unpack001/PinkEye V3/bin/PinkEye.sys unpack001/PinkEye V3/bin/PinkEyeInjector.dll unpack001/PinkEye V3/bin/Taigei64.dll unpack001/PinkEye V3/bin/drv64.dll unpack001/PinkEye V3/bin/kdu.exe
Files
-
PinkEye V3.zip.zip
-
PinkEye V3/PinkEye.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
PinkEye V3/bin/PinkEye.dll.dll windows:6 windows x64 arch:x64
f6f9f177b1c9952ba6b770bc52116a5f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
ntdll
ZwQueueApcThread
kernel32
lstrcatA
LoadLibraryA
lstrcpynA
shell32
SHGetFolderPathA
Exports
Exports
?f1@@YAXPEBX@Z
Sections
.text Size: 1024B - Virtual size: 593B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.-Mc Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
PinkEye V3/bin/PinkEye.sys.sys windows:10 windows x64 arch:x64
d832302ba032273720bd9a94d834b1b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
ObfDereferenceObject
wcsnlen
_wcsicmp
RtlEqualUnicodeString
ProbeForRead
ZwClose
PsGetCurrentThreadTeb
PsLookupProcessByProcessId
ObOpenObjectByPointer
PsIsProcessBeingDebugged
ZwQueryInformationProcess
__C_specific_handler
PsProcessType
ExAllocatePoolWithTag
ExFreePoolWithTag
PsWrapApcWow64Thread
IoGetCurrentProcess
ObReferenceObjectByHandleWithTag
ObfReferenceObject
ObfDereferenceObjectWithTag
ZwOpenFile
ZwMakeTemporaryObject
ZwCreateSection
ZwOpenSection
ZwMapViewOfSection
ZwUnmapViewOfSection
RtlRunOnceInitialize
RtlRunOnceBeginInitialize
RtlRunOnceComplete
KeStackAttachProcess
KeUnstackDetachProcess
ObMakeTemporaryObject
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
ZwQuerySecurityObject
RtlImageNtHeader
RtlImageDirectoryEntryToData
KeInitializeApc
KeInsertQueueApc
ZwQuerySection
MmMapViewOfSection
MmUnmapViewOfSection
KeTestAlertThread
PsInitialSystemProcess
KeDelayExecutionThread
PsCreateSystemThread
PsTerminateSystemThread
IoIs32bitProcess
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
PsGetCurrentProcessId
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.u|4 Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PinkEye V3/bin/PinkEyeInjector.dll.dll windows:6 windows x64 arch:x64
285d8681cda01de0824b63fad16912b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\C5\source\repos\PinkEyeInjector\x64\Release\PinkEyeInjector.pdb
Imports
user32
GetWindowThreadProcessId
UnhookWindowsHookEx
SetWindowsHookExW
PostThreadMessageW
FindWindowA
kernel32
HeapFree
WriteConsoleW
CloseHandle
CreateFileW
LoadLibraryExA
Sleep
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
Exports
Exports
InjectDll
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PinkEye V3/bin/Taigei64.dll.dll windows:6 windows x64 arch:x64
5fdb5e4b32ad7ee52dcb35ca36fae4bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
Sleep
GetCommandLineW
LocalFree
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RaiseException
EncodePointer
InterlockedFlushSList
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
FreeLibrary
GetModuleHandleExW
GetProcAddress
GetModuleFileNameW
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
shell32
CommandLineToArgvW
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
NtConnectPort
NtRequestWaitReplyPort
RtlVirtualUnwind
NtCreateFile
NtDeviceIoControlFile
NtDelayExecution
RtlInitUnicodeString
NtQueryInformationProcess
RtlPcToFileHeader
RtlUnwindEx
NtClose
Exports
Exports
RegisterForProvider
RegisterForProvider2
SB_SMS_GetCtrlCountEx
SB_SMS_QuickCommandEx
SB_SMS_ReadBlockEx
SB_SMS_ReadByteEx
SB_SMS_ReadWordEx
SB_SMS_WriteBlockEx
SB_SMS_WriteByteEx
SB_SMS_WriteWordEx
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PinkEye V3/bin/drv64.dll.dll windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Exports
Exports
gProvTable
gVersion
Sections
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PinkEye V3/bin/kdu.exe.exe windows:6 windows x64 arch:x64
2aedd7c6c9531a89b2f15f15eded56f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\C5\Downloads\KDU-master\KDU-master\Source\Hamakaze\output\x64\Release-Silent\kdu.pdb
Imports
kernel32
GetProcAddress
FreeLibrary
LoadLibraryExW
HeapCreate
HeapAlloc
HeapDestroy
GetStartupInfoW
WriteProcessMemory
ResumeThread
UnmapViewOfFile
DeleteFileW
CreateProcessW
GetModuleHandleW
GetCurrentProcessId
ReadFile
WriteFile
SetFilePointer
TerminateProcess
Sleep
VirtualUnlock
VirtualLock
TerminateThread
CreateThread
HeapSetInformation
GetSystemDirectoryW
CreateFileW
VirtualFree
CreateEventW
GetProcessHeap
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetCommandLineW
GetStdHandle
GetModuleFileNameW
FormatMessageW
GetSystemInfo
VirtualAllocEx
ReadProcessMemory
GetSystemTimeAsFileTime
VirtualFreeEx
CreateFileMappingW
MapViewOfFile
GetFirmwareEnvironmentVariableW
GetConsoleMode
ExpandEnvironmentStringsW
LoadLibraryW
GetCurrentDirectoryW
WriteConsoleW
RtlCompareMemory
CloseHandle
WaitForSingleObject
GetLastError
GetCurrentProcess
VirtualAlloc
SetDllDirectoryW
SetLastError
HeapReAlloc
HeapSize
GetFileSizeEx
SetFilePointerEx
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetConsoleOutputCP
FlushFileBuffers
GetFileType
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
GetModuleHandleExW
ExitProcess
RtlPcToFileHeader
RaiseException
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
advapi32
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ntdll
NtSetInformationProcess
LdrLockLoaderLock
RtlTimeToSecondsSince1970
NtLoadDriver
NtTerminateProcess
LdrUnlockLoaderLock
NtSetValueKey
NtOpenSection
NtQueryObject
LdrFindEntryForAddress
NtOpenFile
NtWaitForSingleObject
NtFsControlFile
RtlLengthRequiredSid
NtUnloadDriver
RtlEqualUnicodeString
LdrGetProcedureAddress
RtlNtdllName
NtDuplicateObject
NtSetSecurityObject
RtlDoesFileExists_U
NtCreateMutant
RtlGetVersion
LdrUnloadDll
NtAlpcDisconnectPort
RtlCreateSecurityDescriptor
NtAlpcCreatePort
RtlCreateAcl
NtAlpcAcceptConnectPort
RtlLengthSid
NtReplyWaitReceivePort
RtlSetDaclSecurityDescriptor
RtlSubAuthoritySid
RtlInitializeSid
NtDeviceIoControlFile
NtOpenKey
NtMapViewOfSection
NtUnmapViewOfSection
LdrLoadDll
NtCreateSection
LdrAccessResource
RtlSetLastWin32Error
NtCreateFile
RtlNtStatusToDosError
RtlEqualSid
RtlInitString
RtlFreeHeap
NtQueryDirectoryObject
RtlFreeSid
RtlExpandEnvironmentStrings
NtOpenDirectoryObject
NtFlushBuffersFile
RtlUnicodeStringToAnsiString
NtClose
NtQueryInformationToken
RtlAllocateAndInitializeSid
LdrFindResource_U
RtlDosPathNameToNtPathName_U
RtlInitUnicodeString
NtOpenProcess
RtlFreeUnicodeString
NtQueryInformationProcess
NtWriteFile
NtQuerySystemInformation
RtlAllocateHeap
NtOpenThread
NtFreeVirtualMemory
NtOpenProcessToken
RtlAnsiStringToUnicodeString
RtlFreeAnsiString
NtAdjustPrivilegesToken
RtlImageNtHeader
RtlAddAccessAllowedAce
rpcrt4
UuidCreate
setupapi
SetupDiDestroyDeviceInfoList
SetupDiCreateDeviceInfoW
SetupDiSetDeviceRegistryPropertyW
SetupDiCallClassInstaller
SetupDiGetINFClassW
SetupDiCreateDeviceInfoList
SetupDiRemoveDevice
newdev
UpdateDriverForPlugAndPlayDevicesW
bcrypt
BCryptEncrypt
BCryptDestroyKey
BCryptOpenAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
msdelta
DeltaFree
ApplyDeltaB
Sections
.text Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ