PESCAN.IO - Analysis Report Basic

File Structure
Analysis Image
PE Chart Code
Header PE (light blue)
Executable sections (pink)
Non-executable sections (black)
External injected code (red)
File Structure in red = malformed or corrupted header

Chart Code For Other Files
Printable characters (blue)
Non-printable characters (black)
Information
Icon: Icon
Size: 66,00 KB
SHA-256 Hash: E4152620B9C4B5EBB73678D6C8AEDDDD784A41F80412DCD1D89527E3160F756A
SHA-1 Hash: 5EC5F17E237C1D9991C4AAE56F093372421771B0
MD5 Hash: 60F7348C6F666071E3969D16A278711E
Imphash: DC73A9BD8DE0FD640549C85AC4089B87
MajorOSVersion: 5
MinorOSVersion: 0
CheckSum: 0000ECDD
EntryPoint (rva): 102B
SizeOfHeaders: 400
SizeOfImage: 15000
ImageBase: 400000
Architecture: x86
ImportTable: 2050
IAT: 2000
Characteristics: 102
TimeDateStamp: 50D4CDC2
Date: 21/12/2012 20:59:46
File Type: EXE
Number Of Sections: 5
ASLR: Enabled
Section Names: .text, .rdata, .data, .rsrc, .reloc
Number Of Executable Sections: 1
Subsystem: Windows GUI

Sections Info
Section Name Flags ROffset RSize VOffset VSizeEntropyChi2
.text
0x60000020
Code
Executable
Readable
400 200 1000 1F6
5.0641
9409
.rdata
0x40000040
Initialized Data
Readable
600 200 2000 1D8
4.2706
20286
.data
0xC0000040
Initialized Data
Readable
Writeable
800 200 3000 34
0.569
115202
.rsrc
0x40000040
Initialized Data
Readable
A00 FC00 4000 FA38
7.9787
2773.13
.reloc
0x42000040
Initialized Data
GP-Relative
Readable
10600 200 14000 52
0.736
109178
Entry Point
The section number (1) - (.text) have the Entry Point
Information -> EntryPoint (calculated) - 42B
Code -> E8070000006A00E805010000558BEC81C4F4FBFFFF5657536A00E804010000A330304000C745F8000000006A0A6800304000
Assembler
|CALL 0X100C
|PUSH 0
|CALL 0X1111
|PUSH EBP
|MOV EBP, ESP
|ADD ESP, 0XFFFFFBF4
|PUSH ESI
|PUSH EDI
|PUSH EBX
|PUSH 0
|CALL 0X1123
|MOV DWORD PTR [0X403030], EAX
|MOV DWORD PTR [EBP - 8], 0
|PUSH 0XA
|PUSH 0X403000
Signatures
CheckSum Integrity Problem:
Header: 60637
Calculated: 104287
Rich Signature Analyzer:
Code -> 69916DC22DF003912DF003912DF00391D1D011912CF0039142869F912EF003912DF002913CF0039142869D912CF00391428699912CF0039142869E912CF00391526963682DF00391
Footprint md5 Hash -> 57C4CF2498F70CE022452597E1647082
• The Rich header apparently has not been modified
Certificate - Digital Signature Not Found:
• The file is not signed

Packer/Compiler
Detect It Easy (die)
PE: patcher: dUP diablo2oo2's Universal Patcher(2.0)[-]
PE: compiler: Microsoft Visual C/C++(2010)[-]
PE: linker: Microsoft Linker(10.0)[-]
Entropy: 7.89219

Suspicious Functions
Library Function Description
KERNEL32.DLL VirtualAlloc Reserve, commit, or both, a region of memory within the virtual address space of a process.
KERNEL32.DLL GetModuleHandleA Retrieves a handle to the specified module.
KERNEL32.DLL RtlMoveMemory Moves a block of memory to another location.
KERNEL32.DLL WriteFile Writes data to a specified file or input/output (I/O) device.
KERNEL32.DLL LoadLibraryA Loads the specified module into the address space of the calling process.
KERNEL32.DLL GetProcAddress Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).
KERNEL32.DLL CreateFileA Creates or opens a file or I/O device.
KERNEL32.DLL DeleteFileA Deletes an existing file.
File Access
\dup2patcher.dll
kernel32.dll
@.dat
Temp

Interest's Words
PADDINGX
exec

Strings/Hex Code Found With The File Rules
Rule Type Encoding Matched (Word)
Text Ascii File (GetTempPath)
Text Ascii File (CreateFile)
Text Ascii File (WriteFile)
Text Ascii Stealth (CloseHandle)
Text Ascii Stealth (VirtualAlloc)
Entry Point Hex Pattern Borland Delphi 4.0
Entry Point Hex Pattern MASM/TASM - sig1(h)
Entry Point Hex Pattern MASM/TASM - sig4 (h)
Entry Point Hex Pattern Metasploit Shellcode - Reverse TCP x86
Entry Point Hex Pattern PE Diminisher v0.1
Entry Point Hex Pattern TrueVision Targa Graphics format
Resources
Path DataRVA Size FileOffset CodeText
\ICON\1\0 4138 568 B38 2800000010000000200000000100080000000000000100000000000000000000000100000000000000000000000080000080(....... .........................................
\RCDATA\DLL\0 46A0 F000 10A0 A28FF444E00D067FBD59EC90B277A6E7BDAF67C21084B153A33A8EAFDD177F22943E809EAE555A51D213719FA5CB81136BAE...D.....Y...w....g....S.:.....".>...UZQ..q.....k.
\GROUP_ICON\500\0 136A0 14 100A0 0000010001001010000100000000680500000100..............h.....
\24\1\0 136B4 382 100B4 3C3F786D6C2076657273696F6E3D22312E302220656E636F64696E673D225554462D3822207374616E64616C6F6E653D2279<?xml version="1.0" encoding="UTF-8" standalone="y
Intelligent String
• kernel32.dll

Flow Anomalies
Offset RVA Section Description
536 402000 .text JMP [static] | Indirect jump to absolute memory address
53C 402004 .text JMP [static] | Indirect jump to absolute memory address
542 402008 .text JMP [static] | Indirect jump to absolute memory address
548 40200C .text JMP [static] | Indirect jump to absolute memory address
54E 402010 .text JMP [static] | Indirect jump to absolute memory address
554 402014 .text JMP [static] | Indirect jump to absolute memory address
55A 402018 .text JMP [static] | Indirect jump to absolute memory address
560 40201C .text JMP [static] | Indirect jump to absolute memory address
566 402020 .text JMP [static] | Indirect jump to absolute memory address
56C 402024 .text JMP [static] | Indirect jump to absolute memory address
572 402028 .text JMP [static] | Indirect jump to absolute memory address
578 40202C .text JMP [static] | Indirect jump to absolute memory address
57E 402030 .text JMP [static] | Indirect jump to absolute memory address
5DE 402034 .text JMP [static] | Indirect jump to absolute memory address
5E4 402038 .text JMP [static] | Indirect jump to absolute memory address
5EA 40203C .text JMP [static] | Indirect jump to absolute memory address
5F0 402040 .text JMP [static] | Indirect jump to absolute memory address
7BA9 402040 .rsrc CALL [static] | Indirect call to absolute memory address
9245 402040 .rsrc JMP [static] | Indirect jump to absolute memory address
Extra Analysis
Metric Value Percentage
Ascii Code 45297 67,0233%
Null Byte Code 2989 4,4226%
© 2026 All rights reserved.