--- layout: default permalink: /RE101/section1.2/ title: Fundamentals --- [Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/) # Section 1.2: Fundamentals # ## Anatomy of a Windows PE C program ## Typical windows programs are in the Portable Executable (PE) Format. It’s portable because it contains information, resources, and references to dynamic-linked libraries (DLL) that allows windows to load and execute the machine code. ![alt text](https://securedorg.github.io/images/Cprogram.gif "C Program") ## PE Header ## ## Memory Layout ## ## The Stack ## [Environment Setup <- Back](https://securedorg.github.io/RE101/section1) | [Next -> x86 Assembly](https://securedorg.github.io/RE101/section1.3)