C:\Users\Administrator\Desktop\Secured\xH71z4QdoiFa8yM.pdb
Overview
overview
10Static
static
31f8769fd48...14.exe
windows7-x64
101f8769fd48...14.exe
windows10-2004-x64
105f6164d2ea...62.exe
windows7-x64
35f6164d2ea...62.exe
windows10-2004-x64
1083b22007de...df.exe
windows7-x64
1083b22007de...df.exe
windows10-2004-x64
109df1f53fbc...04.exe
windows7-x64
109df1f53fbc...04.exe
windows10-2004-x64
10c3ba328200...2b.exe
windows7-x64
10c3ba328200...2b.exe
windows10-2004-x64
10cdf2e2bb7a...0d.exe
windows7-x64
10cdf2e2bb7a...0d.exe
windows10-2004-x64
10Static task
static1
Behavioral task
behavioral1
Sample
1f8769fd48d48e2fb28dbf6bcdb375445b863ef062e79ca9fab86a1758b39214.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1f8769fd48d48e2fb28dbf6bcdb375445b863ef062e79ca9fab86a1758b39214.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
5f6164d2eabe8a95ee274c00c87dbae668d0a53a927fc8a176fdaeef21963862.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
5f6164d2eabe8a95ee274c00c87dbae668d0a53a927fc8a176fdaeef21963862.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
83b22007defc15dd65e5de5ca50e65a0506d26906e20247dac15086ba5e421df.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
83b22007defc15dd65e5de5ca50e65a0506d26906e20247dac15086ba5e421df.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
9df1f53fbcc609be62be35ed21a326dd96f482de617958b9642c64559d318d04.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
9df1f53fbcc609be62be35ed21a326dd96f482de617958b9642c64559d318d04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
c3ba328200ff6fa492d87e30674eba49236a4ea3c72db48943f086f8a618102b.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
c3ba328200ff6fa492d87e30674eba49236a4ea3c72db48943f086f8a618102b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cdf2e2bb7acf49bf5c44e60adf26fafa901e6fe7f7421dcdd8153d70fb457d0d.exe
Resource
win7-20240708-en
General
-
Target
c44ea66b027e56fb46c20a89deae3868152ea3c5
-
Size
4.7MB
-
MD5
0c67cdf75a11afe7a59cd9b7b7ce17af
-
SHA1
c44ea66b027e56fb46c20a89deae3868152ea3c5
-
SHA256
a1dc211e8d06ae69e12064fc0864bde685922fcd92d4ac0caef224dd97d65769
-
SHA512
cf809511495b6f3cf1654371e576682927cb5bad9600aa5387e7fd1db409f03d2a9cfc7dce5da62643bed4ec490ee85f16eea01337eb0199a7d89eeb360c1fd7
-
SSDEEP
98304:xaBdy/IFf8Z7XiTfASzot+4F9HCJqhNKxpcUIycF9gt:xaBJUZ7XiTfjMt+4F16qhNKLIp9gt
Malware Config
Signatures
-
Unsigned PE 6 IoCs
Checks for missing Authenticode signature.
resource unpack001/1f8769fd48d48e2fb28dbf6bcdb375445b863ef062e79ca9fab86a1758b39214 unpack001/5f6164d2eabe8a95ee274c00c87dbae668d0a53a927fc8a176fdaeef21963862 unpack001/83b22007defc15dd65e5de5ca50e65a0506d26906e20247dac15086ba5e421df unpack001/9df1f53fbcc609be62be35ed21a326dd96f482de617958b9642c64559d318d04 unpack001/c3ba328200ff6fa492d87e30674eba49236a4ea3c72db48943f086f8a618102b unpack001/cdf2e2bb7acf49bf5c44e60adf26fafa901e6fe7f7421dcdd8153d70fb457d0d
Files
-
c44ea66b027e56fb46c20a89deae3868152ea3c5.zip
Password: infected
-
1f8769fd48d48e2fb28dbf6bcdb375445b863ef062e79ca9fab86a1758b39214.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 4.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
5f6164d2eabe8a95ee274c00c87dbae668d0a53a927fc8a176fdaeef21963862.exe windows:6 windows x86 arch:x86
ebb8782e344759761855dfb1183a909e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetCommandLineW
GetCommandLineA
GetModuleHandleExW
WriteFile
RaiseException
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
RtlUnwind
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
HeapSize
HeapReAlloc
CloseHandle
CreateFileW
WriteConsoleW
lstrcmpiW
GetModuleFileNameW
GetTickCount
GetProcessHeap
GetModuleHandleW
ExitProcess
Sleep
GetStdHandle
DecodePointer
user32
DispatchMessageA
GetWindowRect
GetMenu
LoadCursorA
CheckMenuRadioItem
GetMessageA
GetSystemMenu
DestroyWindow
SetWindowPos
CheckRadioButton
SetActiveWindow
PostMessageA
EndDialog
GetSystemMetrics
CreatePopupMenu
DialogBoxParamA
GetWindowPlacement
DestroyCursor
TrackPopupMenu
wsprintfA
GetSubMenu
GetActiveWindow
IsWindow
OpenClipboard
TranslateAcceleratorA
GetDlgItemTextA
SetTimer
RedrawWindow
DestroyIcon
IsDialogMessageA
SetMenuItemInfoA
IsMenu
SetWindowLongA
ClientToScreen
CloseClipboard
CallWindowProcA
DestroyAcceleratorTable
EmptyClipboard
GetWindowTextA
CharLowerBuffA
GetWindowLongA
SetWindowPlacement
wvsprintfA
SetWindowTextA
MessageBoxA
GetSysColor
MoveWindow
EnumClipboardFormats
IsDlgButtonChecked
RegisterClassA
DestroyMenu
SetFocus
TranslateMessage
GetClipboardData
SendDlgItemMessageA
GetClassInfoA
SetDlgItemTextA
SendMessageA
SetClipboardData
SetCursor
CreateDialogParamA
LoadIconA
CharUpperA
AppendMenuA
RemoveMenu
CheckMenuItem
GetClientRect
GetDlgItem
UnregisterClassA
KillTimer
CheckDlgButton
PostQuitMessage
GetSysColorBrush
EnableMenuItem
SetDlgItemInt
FindWindowA
InsertMenuItemA
InvalidateRect
DefDlgProcA
ChildWindowFromPoint
GetCursorPos
EnableWindow
LoadAcceleratorsA
gdi32
SelectObject
GetStockObject
SetBkMode
CreateFontIndirectA
DeleteObject
GetObjectA
SetTextColor
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
OpenProcessToken
RegOpenKeyExA
RegCreateKeyA
AdjustTokenPrivileges
RegCloseKey
RegSetValueA
RegDeleteKeyA
RegQueryValueExA
LookupPrivilegeValueA
GetUserNameA
shell32
ShellExecuteW
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 284KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
83b22007defc15dd65e5de5ca50e65a0506d26906e20247dac15086ba5e421df.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\Administrator\Desktop\import.java.util.regex.Matcher.module7 - Copy.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
9df1f53fbcc609be62be35ed21a326dd96f482de617958b9642c64559d318d04.exe windows:5 windows x86 arch:x86
b5cb56872f2603365a837da07dc2a268
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\yuyu-35_laxotekih\62\doguk\nama\lukebejidaxag36 heweludig_l.pdb
Imports
kernel32
GetVolumeInformationA
GetComputerNameA
LocalSize
InterlockedExchange
SetSystemTimeAdjustment
GetNumaProcessorNode
GetConsoleAliasExesLengthW
EnumSystemCodePagesW
TlsGetValue
CopyFileExW
MoveFileWithProgressW
VerifyVersionInfoW
LocalLock
DebugBreak
GlobalGetAtomNameA
MapViewOfFileEx
GetWindowsDirectoryW
GetModuleHandleA
lstrlenW
GlobalDeleteAtom
SizeofResource
WriteConsoleInputA
CopyFileW
SetWaitableTimer
GetVersionExA
FindResourceA
GetComputerNameExW
WriteConsoleW
SearchPathA
GetThreadPriority
CallNamedPipeA
GetProcAddress
LoadLibraryA
GlobalAlloc
FoldStringA
GetFileTime
GetConsoleAliasesLengthA
GetOEMCP
SetProcessAffinityMask
GlobalFindAtomW
VerifyVersionInfoA
CreateActCtxA
FindNextVolumeA
CancelDeviceWakeupRequest
LocalUnlock
GetConsoleFontSize
InterlockedCompareExchange
GetPrivateProfileStructW
EnumCalendarInfoA
EnterCriticalSection
InterlockedDecrement
GetNamedPipeHandleStateW
AreFileApisANSI
GetTickCount
SetLastError
OpenEventA
LoadLibraryW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
DeleteFileA
gdi32
GetCharWidthA
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 180KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
c3ba328200ff6fa492d87e30674eba49236a4ea3c72db48943f086f8a618102b.exe windows:5 windows x86 arch:x86
92fd52968f8d7a0a9591a0e6eb7642f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\pegohad_b.pdb
Imports
kernel32
LocalSize
InterlockedExchange
SetSystemTimeAdjustment
GetNumaProcessorNode
GetConsoleAliasExesLengthW
EnumSystemCodePagesW
TlsGetValue
CopyFileExW
MoveFileWithProgressA
VerifyVersionInfoW
LocalLock
DebugBreak
GlobalGetAtomNameA
MapViewOfFileEx
GetWindowsDirectoryA
GetModuleHandleA
lstrlenW
GlobalDeleteAtom
SizeofResource
WriteConsoleInputA
CopyFileW
SetWaitableTimer
GetVersionExA
FindResourceA
GetComputerNameExW
OpenEventA
SearchPathA
GetComputerNameA
CallNamedPipeA
GetProcAddress
LoadLibraryA
GlobalAlloc
FoldStringA
GetFileTime
GetConsoleAliasesLengthA
GetSystemWindowsDirectoryW
GetACP
SetProcessAffinityMask
GlobalFindAtomW
VerifyVersionInfoA
CreateActCtxA
FindNextVolumeA
MoveFileWithProgressW
CancelDeviceWakeupRequest
LocalUnlock
GetConsoleFontSize
InterlockedCompareExchange
GetPrivateProfileStructW
EnumCalendarInfoA
EnterCriticalSection
InterlockedDecrement
GetNamedPipeHandleStateW
AreFileApisANSI
GetTickCount
SetLastError
WriteConsoleW
GetVolumeInformationA
GetThreadPriority
LoadLibraryW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
HeapAlloc
DeleteFileA
GetStartupInfoW
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
gdi32
GetCharWidthA
advapi32
SetThreadToken
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 184KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
cdf2e2bb7acf49bf5c44e60adf26fafa901e6fe7f7421dcdd8153d70fb457d0d.exe windows:4 windows x86 arch:x86
4b1d296ddacb242a7b3463de1e9b11cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateSemaphoreW
CreateThread
DeleteCriticalSection
EnterCriticalSection
FreeConsole
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
IsDBCSLeadByteEx
IsProcessorFeaturePresent
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
QueryPerformanceCounter
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
___mb_cur_max_func
__doserrno
__getmainargs
__initenv
__lconv_init
__p__acmdln
__p__fmode
__pioinfo
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_errno
_fdopen
_filelengthi64
_fileno
_fileno
_fstat64
_initterm
_iob
_lseeki64
_onexit
_read
_strnicmp
_write
_write
abort
atoi
calloc
exit
fclose
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwrite
getc
getwc
isspace
iswctype
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
putc
putwc
realloc
setlocale
setvbuf
signal
sprintf
strchr
strcmp
strcoll
strerror
strftime
strlen
strncmp
strtoul
strxfrm
towlower
towupper
ungetc
ungetwc
vfprintf
wcscoll
wcsftime
wcslen
wcsxfrm
Sections
.text Size: 817KB - Virtual size: 817KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 293KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.4vS Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ