International Burmese democratic forces and friends of Burma who

446 views

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
446
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

International Burmese democratic forces and friends of Burma who

  1. 1. WINDOWS EXECUTABLE32bit for Windows 95 and Windows NTTechnical File Information:Image File HeaderSignature: 00004550Machine: Intel 386Number of Sections: 0008Time Date Stamp: 2a425e19Symbols Pointer: 00000000Number of Symbols: 00000000Size of Optional Header 00e0Characteristics: File is executable (i.e. no unresolved external references).Line numbers stripped from file.Local symbols stripped from file.Low bytes of machine word are reversed.32 bit word machine.High bytes of machine word are reversed.Image Optional HeaderMagic: 010bLinker Version: 2.25Size of Code: 00017000Size of Initialized Data: 00004c00Size of Uninitialized Data: 00000000Address of Entry Point: 00017de0Base of Code: 00001000
  2. 2. Base of Data: 00018000Image Base: 00400000Section Alignment: 00001000File Alignment: 00000200Operating System Version: 4.00Image Version: 0.00Subsystem Version: 4.00Reserved1: 00000000Size of Image: 00022000Size of Headers: 00000400Checksum: 00026338Subsystem: Image runs in the Windows GUI subsystem.DLL Characteristics: 0000Size of Stack Reserve: 00100000Size of Stack Commit: 00004000Size of Heap Reserve: 00100000Size of Heap Commit: 00001000Loader Flags: 00000000Size of Data Directory: 00000010Import Directory Virtual Address: 0001a000Import Directory Size: 000014d0Resource DirectoryVirtual Address: 00020000Resource Directory Size: 000018c8Base Relocation TableVirtual Address: 0001e000Base Relocation Table Size: 000011c4
  3. 3. TLS Directory Virtual Address: 0001d000 TLS Directory Size: 00000018Import Table kernel32.dll Ordinal Function Name 0000 GetCurrentThreadId 0000 WideCharToMultiByte 0000 ExitProcess 0000 UnhandledExceptionFilter 0000 RtlUnwind 0000 RaiseException 0000 TlsSetValue 0000 TlsGetValue 0000 LocalAlloc 0000 GetModuleHandleA 0000 FreeLibrary 0000 HeapFree 0000 HeapReAlloc 0000 HeapAlloc 0000 GetProcessHeap
  4. 4. oleaut32.dllOrdinal Function Name0000 SysFreeString0000 SysReAllocStringLenadvapi32.dllOrdinal Function Name0000 RegSetValueExA0000 RegQueryValueExA0000 RegQueryInfoKeyA0000 RegOpenKeyExA0000 RegEnumKeyExA0000 RegCreateKeyExA0000 RegCloseKey0000 OpenThreadToken0000 OpenProcessToken0000 LookupPrivilegeValueA0000 GetUserNameA0000 GetTokenInformation0000 FreeSid0000 EqualSid0000 AllocateAndInitializeSid
  5. 5. 0000 AdjustTokenPrivilegeskernel32.dllOrdinal Function Name0000 WritePrivateProfileStringA0000 WriteFile0000 WinExec0000 WaitForSingleObject0000 TerminateProcess0000 Sleep0000 SetFileTime0000 SetFilePointer0000 SetFileAttributesA0000 SetErrorMode0000 SetEndOfFile0000 SetCurrentDirectoryA0000 RemoveDirectoryA0000 ReadFile0000 OpenProcess0000 MultiByteToWideChar0000 LocalFileTimeToFileTime0000 LoadLibraryA0000 GlobalFree0000 GlobalAlloc
  6. 6. 0000 GetWindowsDirectoryA0000 GetVersionExA0000 GetVersion0000 GetUserDefaultLangID0000 GetTimeFormatA0000 GetTempPathA0000 GetSystemDirectoryA0000 GetShortPathNameA0000 GetProcAddress0000 GetPrivateProfileStringA0000 GetModuleHandleA0000 GetModuleFileNameA0000 GetLastError0000 GetFullPathNameA0000 GetFileTime0000 GetFileSize0000 GetFileAttributesA0000 GetExitCodeProcess0000 GetDiskFreeSpaceA0000 GetDateFormatA0000 GetCurrentThread0000 GetCurrentProcess0000 GetComputerNameA0000 GetCommandLineA0000 FreeLibrary0000 FormatMessageA0000 FindNextFileA
  7. 7. 0000 FindFirstFileA0000 FindClose0000 FileTimeToSystemTime0000 FileTimeToLocalFileTime0000 ExpandEnvironmentStringsA0000 DosDateTimeToFileTime0000 DeleteFileA0000 CreateFileA0000 CreateDirectoryA0000 CompareStringA0000 CloseHandlegdi32.dllOrdinal Function Name0000 StretchDIBits0000 StretchBlt0000 SetWindowOrgEx0000 SetTextColor0000 SetStretchBltMode0000 SetRectRgn0000 SetROP20000 SetPixel0000 SetDIBits0000 SetBrushOrgEx
  8. 8. 0000 SetBkMode0000 SetBkColor0000 SelectObject0000 SaveDC0000 RestoreDC0000 OffsetRgn0000 MoveToEx0000 IntersectClipRect0000 GetTextExtentPoint32A0000 GetStockObject0000 GetPixel0000 GetObjectA0000 GetDIBits0000 ExtSelectClipRgn0000 ExcludeClipRect0000 DeleteObject0000 DeleteDC0000 CreateSolidBrush0000 CreateRectRgn0000 CreateFontIndirectA0000 CreateDIBSection0000 CreateCompatibleDC0000 CreateCompatibleBitmap0000 CreateBrushIndirect0000 CombineRgn0000 BitBlt0000 AddFontResourceA
  9. 9. user32.dllOrdinal Function Name0000 wvsprintfA0000 WaitMessage0000 ValidateRect0000 TranslateMessage0000 ShowWindow0000 SetWindowPos0000 SetWindowLongA0000 SetTimer0000 SetPropA0000 SetParent0000 SetForegroundWindow0000 SetFocus0000 SetCursor0000 SendMessageA0000 ScreenToClient0000 RemovePropA0000 ReleaseDC0000 RegisterClassA0000 PostQuitMessage0000 PostMessageA0000 PeekMessageA
  10. 10. 0000 OffsetRect0000 MessageBoxA0000 LoadIconA0000 LoadCursorA0000 KillTimer0000 IsZoomed0000 IsWindowVisible0000 IsWindowEnabled0000 IsWindow0000 IsIconic0000 InvalidateRect0000 GetWindowTextLengthA0000 GetWindowTextA0000 GetWindowRgn0000 GetWindowRect0000 GetWindowLongA0000 GetWindowDC0000 GetUpdateRgn0000 GetSystemMetrics0000 GetSystemMenu0000 GetSysColor0000 GetPropA0000 GetParent0000 GetWindow0000 GetKeyState0000 GetFocus0000 GetDCEx
  11. 11. 0000 GetDC0000 GetCursorPos0000 GetClientRect0000 GetClassLongA0000 GetClassInfoA0000 GetCapture0000 FindWindowA0000 FillRect0000 ExitWindowsEx0000 EnumWindows0000 EndPaint0000 EnableWindow0000 EnableMenuItem0000 DrawTextA0000 DrawIcon0000 DispatchMessageA0000 DestroyWindow0000 DestroyIcon0000 DeleteMenu0000 DefWindowProcA0000 CopyImage0000 ClientToScreen0000 CheckRadioButton0000 CallWindowProcA0000 BeginPaint0000 CharLowerBuffA
  12. 12. winmm.dllOrdinal Function Name0000 timeKillEvent0000 timeSetEventuser32.dllOrdinal Function Name0000 CreateWindowExAoleaut32.dllOrdinal Function Name0000 SysAllocStringLenole32.dllOrdinal Function Name0000 OleInitialize
  13. 13. comctl32.dllOrdinal Function Name0000 ImageList_Draw0000 ImageList_SetBkColor0000 ImageList_Create0000 InitCommonControlsshell32.dllOrdinal Function Name0000 SHGetFileInfoAshell32.dllOrdinal Function Name0000 ShellExecuteExA0000 ShellExecuteAcabinet.dllOrdinal Function Name
  14. 14. 0000 FDIDestroy0000 FDICopy0000 FDICreateole32.dllOrdinal Function Name0000 OleInitialize0000 CoTaskMemFree0000 CoCreateInstance0000 CoUninitialize0000 CoInitializeshell32.dllOrdinal Function Name0000 SHGetSpecialFolderLocation0000 SHGetPathFromIDListA0000 SHGetMalloc0000 SHChangeNotify0000 SHBrowseForFolderA Section Table
  15. 15. Section name: CODEVirtual Size: 00016e44Virtual Address: 00001000Size of raw data: 00017000Pointer to Raw Data: 00000400Pointer to Relocations: 00000000Pointer to Line Numbers: 00000000Number of Relocations: 0000Number of Line Numbers: 0000Characteristics: Section contains codeSection is executableSection is readableSection name: DATAVirtual Size: 00000700Virtual Address: 00018000Size of raw data: 00000800Pointer to Raw Data: 00017400Pointer to Relocations: 00000000Pointer to Line Numbers: 00000000Number of Relocations: 0000Number of Line Numbers: 0000Characteristics: Section contains initialized dataSection is readableSection is writeableSection name: BSS
  16. 16. Virtual Size: 000008adVirtual Address: 00019000Size of raw data: 00000000Pointer to Raw Data: 00017c00Pointer to Relocations: 00000000Pointer to Line Numbers: 00000000Number of Relocations: 0000Number of Line Numbers: 0000Characteristics: Section is readableSection is writeableSection name: .idataVirtual Size: 000014d0Virtual Address: 0001a000Size of raw data: 00001600Pointer to Raw Data: 00017c00Pointer to Relocations: 00000000Pointer to Line Numbers: 00000000Number of Relocations: 0000Number of Line Numbers: 0000Characteristics: Section contains initialized dataSection is readableSection is writeableSection name: .tlsVirtual Size: 00000008
  17. 17. Virtual Address: 0001c000Size of raw data: 00000000Pointer to Raw Data: 00019200Pointer to Relocations: 00000000Pointer to Line Numbers: 00000000Number of Relocations: 0000Number of Line Numbers: 0000Characteristics: Section is readableSection is writeableSection name: .rdataVirtual Size: 00000018Virtual Address: 0001d000Size of raw data: 00000200Pointer to Raw Data: 00019200Pointer to Relocations: 00000000Pointer to Line Numbers: 00000000Number of Relocations: 0000Number of Line Numbers: 0000Characteristics: Section contains initialized dataSection is shareableSection is readableSection name: .relocVirtual Size: 000011c4Virtual Address: 0001e000
  18. 18. Size of raw data: 00001200Pointer to Raw Data: 00019400Pointer to Relocations: 00000000Pointer to Line Numbers: 00000000Number of Relocations: 0000Number of Line Numbers: 0000Characteristics: Section contains initialized dataSection is shareableSection is readableSection name: .rsrcVirtual Size: 000018c8Virtual Address: 00020000Size of raw data: 00001a00Pointer to Raw Data: 0001a600Pointer to Relocations: 00000000Pointer to Line Numbers: 00000000Number of Relocations: 0000Number of Line Numbers: 0000Characteristics: Section contains initialized dataSection is shareableSection is readableHeader InformationSignature: 5a4dLast Page Size: 0050Total Pages in File: 0002Relocation Items: 0000
  19. 19. Paragraphs in Header: 0004Minimum Extra Paragraphs: 000fMaximum Extra Paragraphs: ffffInitial Stack Segment: 0000Initial Stack Pointer: 00b8Complemented Checksum: 0000Initial Instruction Pointer: 0000Initial Code Segment: 0000Relocation Table Offset: 0040Overlay Number: 001aReserved: 0000 0000 0000 00000000 0000 0000 00000000 0000 0000 00000000 0000 0000 0000Offset to New Header: 00000100Memory Needed: 1K

×