SlideShare a Scribd company logo
Match Column A with Column B by annotating the letter from Column B in the blank in
Column A. Column A 1. The PE format helps the 2. The two main components that comprise the
PE file includes 3. The Section Header Table and its sections that comprise it 4. Data Directories
are 5. PE Headers contains Column B a. define how the binary is mapped in memory. b. the
internal structure of all Windows executables (e.g., exe, dll, etc). c. technical information about
the file. d. used by applications instead of physical memory. e. Windows OS interpret and
manage the executable (image) file, and an understanding of the PE format is essential to
malware reverse engineering.
f. pointers to exported and imported resources in tables with the relevant exported and imported
resource information. g. Headers (technical information about the exe file) and Sections
(contents of the exe file). h. contents of the executable to include the code that is executed, links
between the PE file and imported Windows resources (e.g. DLL), and data used by the code. i.
based upon Windows PE format that is described in the ECMA-335 standard. j. designates a
location within a file.

More Related Content

PPTX
Reversing malware analysis training part3 windows pefile formatbasics
PDF
Reversing & malware analysis training part 3 windows pe file format basics
PDF
Binary art - Byte-ing the PE that fails you (extended offline version)
PPTX
Reversing & malware analysis training part 3 windows pe file format basics
PPT
PE Packers Used in Malicious Software - Part 1
PPT
Intro reverse engineering
PDF
Exploring the Portable Executable format
Reversing malware analysis training part3 windows pefile formatbasics
Reversing & malware analysis training part 3 windows pe file format basics
Binary art - Byte-ing the PE that fails you (extended offline version)
Reversing & malware analysis training part 3 windows pe file format basics
PE Packers Used in Malicious Software - Part 1
Intro reverse engineering
Exploring the Portable Executable format

Recently uploaded (20)

PDF
VCE English Exam - Section C Student Revision Booklet
PDF
RMMM.pdf make it easy to upload and study
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Presentation on HIE in infants and its manifestations
PDF
Complications of Minimal Access Surgery at WLH
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Institutional Correction lecture only . . .
PDF
Classroom Observation Tools for Teachers
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
VCE English Exam - Section C Student Revision Booklet
RMMM.pdf make it easy to upload and study
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Module 4: Burden of Disease Tutorial Slides S2 2025
Presentation on HIE in infants and its manifestations
Complications of Minimal Access Surgery at WLH
2.FourierTransform-ShortQuestionswithAnswers.pdf
A systematic review of self-coping strategies used by university students to ...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
01-Introduction-to-Information-Management.pdf
Supply Chain Operations Speaking Notes -ICLT Program
FourierSeries-QuestionsWithAnswers(Part-A).pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
O7-L3 Supply Chain Operations - ICLT Program
Institutional Correction lecture only . . .
Classroom Observation Tools for Teachers
Microbial diseases, their pathogenesis and prophylaxis
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Ad
Ad

Match Column A with Column B by annotating the letter from Column B i.pdf

  • 1. Match Column A with Column B by annotating the letter from Column B in the blank in Column A. Column A 1. The PE format helps the 2. The two main components that comprise the PE file includes 3. The Section Header Table and its sections that comprise it 4. Data Directories are 5. PE Headers contains Column B a. define how the binary is mapped in memory. b. the internal structure of all Windows executables (e.g., exe, dll, etc). c. technical information about the file. d. used by applications instead of physical memory. e. Windows OS interpret and manage the executable (image) file, and an understanding of the PE format is essential to malware reverse engineering. f. pointers to exported and imported resources in tables with the relevant exported and imported resource information. g. Headers (technical information about the exe file) and Sections (contents of the exe file). h. contents of the executable to include the code that is executed, links between the PE file and imported Windows resources (e.g. DLL), and data used by the code. i. based upon Windows PE format that is described in the ECMA-335 standard. j. designates a location within a file.