PESCAN.IO - Analysis Report Basic

File Structure
Analysis Image
PE Chart Code
Executable header (light blue)
Executable sections (pink)
Non-executable sections (black)
External injected code (red)
File Structure in red = malformed or corrupted header

Chart Code For Other Files
Printable characters (blue)
Non-printable characters (black)
Information
Icon: Icon
Size: 3,03 MB
SHA-256 Hash: 1E84628BD5EF44EB6A00954A7DE5445375C953879F889EF82CB73DB0358CEEAF
SHA-1 Hash: 8AF722C631332397C3EC8E22797C1958F904E256
MD5 Hash: 889E40B47BC96671D1803A3FC7B994A0
Imphash: 14C06894A37B2888D36FCA7A856B1A8E
MajorOSVersion: 5
MinorOSVersion: 1
CheckSum: 0030CA8C
EntryPoint (rva): 1AB169
SizeOfHeaders: 400
SizeOfImage: 363000
ImageBase: 400000
Architecture: x86
ExportTable: 25A630
ImportTable: 25AB40
IAT: 1EF000
Characteristics: 102
TimeDateStamp: 59E6D266
Date: 18/10/2017 4:02:46
File Type: EXE
Number Of Sections: 8
ASLR: Enabled
Section Names: .text, .rdata, .data, .gfids, .giats, .tls, .rsrc, .reloc
Number Of Executable Sections: 1
Subsystem: Windows GUI
UAC Execution Level Manifest: asInvoker

Sections Info
Section Name Flags ROffset RSize VOffset VSizeEntropyChi2
.text 60000020 (Code, Executable, Readable) 400 1EDE00 1000 1EDC0C6,562112427749,03
.rdata 40000040 (Initialized Data, Readable) 1EE200 6F200 1EF000 6F1DA5,195421619944,73
.data C0000040 (Initialized Data, Readable, Writeable) 25D400 9000 25F000 60AB04,8912836449,17
.gfids 40000040 (Initialized Data, Readable) 266400 1AE00 2C0000 1ACD84,22827398729,30
.giats 40000040 (Initialized Data, Readable) 281200 200 2DB000 100,1552126502,00
.tls C0000040 (Initialized Data, Readable, Writeable) 281400 200 2DC000 90,0204130049,00
.rsrc 40000040 (Initialized Data, Readable) 281600 61400 2DD000 612D06,19553544746,22
.reloc 42000040 (Initialized Data, GP-Relative, Readable) 2E2A00 24000 33F000 23E406,4965583753,35
Description
OriginalFilename: Odin.exe
CompanyName: Samsung Electronics Co., Ltd.
LegalCopyright: (c) Samsung Electronics. All rights reserved.
ProductName: Odin Downloader
FileVersion: 2017.10.18.1
FileDescription: Odin Downloader
ProductVersion: 3.13.1.3B
Language: Korean (Korea) (ID=0x412)
CodePage: Unknown (0x3B5) (0x3B5)

Entry Point
The section number (1) - (.text) have the Entry Point
Information -> EntryPoint (calculated) - 1AA569
Code -> E8660C0000E98EFEFFFF3B0DF4FF6500F27502F2C3F2E94B000000558BECF6450801568BF1C706F4C76100740A6A0C56E808
CALL 0X1C6B
JMP 0XE98
CMP ECX, DWORD PTR [0X65FFF4]
• BND JNE 0X1015
• BND RET
• BND JMP 0X1066
PUSH EBP
MOV EBP, ESP
TEST BYTE PTR [EBP + 8], 1
PUSH ESI
MOV ESI, ECX
MOV DWORD PTR [ESI], 0X61C7F4
JE 0X1037
PUSH 0XC
PUSH ESI

Signatures
Rich Signature Analyzer:
Code -> 11DD738255BC1DD155BC1DD155BC1DD1E120ECD14FBC1DD1E120EED191BC1DD1E120EFD174BC1DD1CB1CDAD153BC1DD1B0E518D057BC1DD15CC499D154BC1DD15CC49ED15ABC1DD15CC48ED176BC1DD155BC1CD149BF1DD16EE21ED04FBC1DD16EE219D071BC1DD16EE218D02FBD1DD1C2E214D06ABC1DD1C2E21DD054BC1DD1C7E2E2D154BC1DD155BC8AD154BC1DD1C2E21FD054BC1DD15269636855BC1DD1
Footprint md5 Hash -> 4A89007C8DDE8AA209CC74FFA663FBA0
• The Rich header apparently has not been modified
Certificate - Digital Signature Not Found:
• The file is not signed

Packer/Compiler
Compiler: Microsoft Visual C ++ 6 DLL
Detect It Easy (die)
PE: compiler: EP:Microsoft Visual C/C++(2013-2017)[EXE32]
PE: compiler: Microsoft Visual C/C++(2015 v.14.0)[-]
PE: linker: Microsoft Linker(14.0, Visual Studio 2015 14.0*)[-]
Entropy: 6.65424

Suspicious Functions
Library Function Description
KERNEL32.DLL VirtualAlloc Reserve, commit, or both, a region of memory within the virtual address space of a process.
KERNEL32.DLL GetModuleHandleA Retrieves a handle to the specified module.
KERNEL32.DLL CopyFileW Copies an existing file to a new file.
KERNEL32.DLL WriteFile Writes data to a specified file or input/output (I/O) device.
KERNEL32.DLL LoadLibraryA Loads the specified module into the address space of the calling process.
KERNEL32.DLL LoadLibraryW Loads the specified module into the address space of the calling process.
KERNEL32.DLL GetProcAddress Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).
KERNEL32.DLL IsDebuggerPresent Determines if the calling process is being debugged by a user-mode debugger.
USER32.DLL GetAsyncKeyState Retrieves the status of a virtual key asynchronously.
SHELL32.DLL ShellExecuteW Performs a run operation on a specific file.
Windows REG (UNICODE)
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Software\Microsoft\Windows\CurrentVersion\Policies\Network
Software\Microsoft\Windows\CurrentVersion\Policies\Comdlg32
Software\Classes\
Rebuilt string - SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer - NoRun

File Access
Odin3 v3.07.exe
WINMM.dll
IMM32.dll
gdiplus.dll
OLEACC.dll
oledlg.dll
OLEAUT32.dll
ole32.dll
UxTheme.dll
SHLWAPI.dll
COMCTL32.dll
SHELL32.dll
ADVAPI32.dll
MSIMG32.dll
GDI32.dll
USER32.dll
KERNEL32.dll
Comdlg32.dll
.dat
@.dat
Temp

File Access (UNICODE)
\Odin3.ini
download-list.txt
Odin.exe
Odin3_v310.exe
mscoree.dll
ole32.dll
dwmapi.dll
uxtheme.dll
shell32.dll
DWrite.dll
HD2D1.dll
Hmfcm140u.dll
comctl32.dll
F4_Comdlg32.dll
Advapi32.dll
MSFTEDIT.DLL
RICHED20.DLL
cqgGtoGTc9tGRICHED32.DLL
%Ts%Ts.dll
user32.dll
kernel32.dll
Kernel32.dll
GetModuleHandleExWComctl32.dll
Odin3.ini
Temp

Interest's Words
lockbit
outlook
ToolBar
Encrypt
Decrypt
Encryption
exec
attrib
start
cipher
shutdown
systeminfo
replace

Interest's Words (UNICODE)
outlook
ToolBar
exec
start
pause
ping
replace
route

URLs
http://schemas.microsoft.com/SMI/2005/WindowsSettings

URLs (UNICODE)
https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=FGRATK56NKW7W"> DONATE TO 3B EFFORT</a>

Strings/Hex Code Found With The File Rules
Rule Type Encoding Matched (Word)
Text Ascii WinAPI Sockets (connect)
Text Unicode WinAPI Sockets (connect)
Text Unicode WinAPI Sockets (send)
Text Ascii Registry (RegCreateKeyEx)
Text Ascii Registry (RegOpenKeyEx)
Text Ascii Registry (RegSetValueEx)
Text Ascii Registry (RegDeleteKeyEx)
Text Ascii File (GetTempPath)
Text Ascii File (CopyFile)
Text Ascii File (CreateFile)
Text Ascii File (WriteFile)
Text Ascii File (ReadFile)
Text Ascii Encryption (Base64Decode)
Text Ascii Encryption (CipherMode)
Text Ascii Encryption (Rijndael)
Text Ascii Anti-Analysis VM (IsDebuggerPresent)
Text Ascii Anti-Analysis VM (GetSystemInfo)
Text Ascii Anti-Analysis VM (GetVersion)
Text Ascii Reconnaissance (FindFirstFileW)
Text Ascii Reconnaissance (FindNextFileW)
Text Ascii Reconnaissance (FindClose)
Text Ascii Stealth (ExitThread)
Text Ascii Stealth (CloseHandle)
Text Ascii Stealth (VirtualAlloc)
Text Ascii Stealth (VirtualProtect)
Text Ascii Execution (ShellExecute)
Text Ascii Execution (ResumeThread)
Text Ascii Execution (CreateSemaphoreW)
Text Ascii Execution (CreateEventW)
Text Unicode Antivirus Software (rising)
Text Ascii Keyboard Key (Scroll)
Text Unicode Keyboard Key (Scroll)
Text Unicode Keyboard Key (RightArrow)
Entry Point Hex Pattern Microsoft Visual C++ 8
Entry Point Hex Pattern Microsoft Visual C++ 8
Entry Point Hex Pattern VC8 - Microsoft Corporation
Resources
Path DataRVA Size FileOffset CodeText
\AFX_DIALOG_LAYOUT\100\1042 2DDFC4 2 2825C4 0000..
\AFX_DIALOG_LAYOUT\102\1042 2DDFC8 2 2825C8 0000..
\CURSOR\8\1042 2DDFCC 134 2825CC 020002002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\9\1042 2DE100 B4 282700 010001002800000010000000200000000100010000000000800000000000000000000000000000000000000000000000FFFF....(....... .....................................
\CURSOR\10\1042 2DE1B4 134 2827B4 0F0014002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\11\1042 2DE2E8 134 2828E8 100008002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\12\1042 2DE41C 134 282A1C 0A000E002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\13\1042 2DE550 134 282B50 15000E002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\14\1042 2DE684 134 282C84 0C0012002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\15\1042 2DE7B8 134 282DB8 140012002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\16\1042 2DE8EC 134 282EEC 0C000B002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\17\1042 2DEA20 134 283020 13000A002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\18\1042 2DEB54 134 283154 10000F002800000020000000400000000100010000000000800000000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\19\1042 2DEC88 134 283288 10000F002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\20\1042 2DEDBC 134 2833BC 0F000F002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\21\1042 2DEEF0 134 2834F0 10000F002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\22\1042 2DF024 134 283624 10000F002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\CURSOR\23\1042 2DF158 134 283758 10000F002800000020000000400000000100010000000000000100000000000000000000000000000000000000000000FFFF....(... ...@.....................................
\BITMAP\130\1042 2DF28C 1C32 28388C 28000000670000001700000001001800000000000A1C0000120B0000120B00000000000000000000FFFFFFFFFFFFFFFFFFFF(...g.............................................
\BITMAP\131\1042 2E0EC0 1C30 2854C0 2800000067000000170000000100180000000000081C000000000000000000000000000000000000FFFFFFFFFFFFFFFFFFFF(...g.............................................
\BITMAP\132\1042 2E2AF0 1C32 2870F0 28000000670000001700000001001800000000000A1C0000120B0000120B00000000000000000000FFFFFFFFFFFFFFFFFFFF(...g.............................................
\BITMAP\133\1042 2E4724 4F60 288D24 2800000067000000410000000100180000000000384F000000000000000000000000000000000000FFFFFFFFFFFFFFFFFFFF(...g...A...........8O............................
\BITMAP\134\1042 2E9684 4F62 28DC84 28000000670000004100000001001800000000003A4F0000120B0000120B00000000000000000000FFFFFFFFFFFFFFFFFFFF(...g...A...........:O............................
\BITMAP\135\1042 2EE5E8 4F62 292BE8 28000000670000004100000001001800000000003A4F0000120B0000120B00000000000000000000FFFFFFFFFFFFFFFFFFFF(...g...A...........:O............................
\BITMAP\136\1042 2F354C 4F62 297B4C 28000000670000004100000001001800000000003A4F0000120B0000120B00000000000000000000FFFFFFFFFFFFFFFFFFFF(...g...A...........:O............................
\BITMAP\137\1042 2F84B0 2D26A 29CAB0 280000005803000048000000010018000000000042D20200120B0000120B00000000000000000000AE2A4DAE204BAE204BAE(...X...H...........B....................*M. K. K.
\BITMAP\138\1042 32571C 1C30 2C9D1C 2800000067000000170000000100180000000000081C000000000000000000000000000000000000FFFFFFFFFFFFFFFFFFFF(...g.............................................
\BITMAP\139\1042 32734C 4F60 2CB94C 2800000067000000410000000100180000000000384F000000000000000000000000000000000000FFFFFFFFFFFFFFFFFFFF(...g...A...........8O............................
\BITMAP\30994\1042 32C2AC B8 2D08AC 280000000C0000000A0000000100040000000000500000000000000000000000000000000000000000000000000080000080(...................P.............................
\BITMAP\30996\1042 32C364 144 2D0964 28000000210000000B0000000100040000000000DC0000000000000000000000000000000000000000000000000080000080(...!.............................................
\ICON\1\1042 32C4A8 EA8 2D0AA8 28000000300000006000000001000800000000000009000000000000000000000001000000010000000000008E390100933C(...0.......................................9...<
\ICON\2\1042 32D350 8A8 2D1950 28000000200000004000000001000800000000000004000000000000000000000001000000010000000000008E390100903A(... ...@....................................9...:
\ICON\3\1042 32DBF8 568 2D21F8 280000001000000020000000010008000000000000010000000000000000000000010000000100000000000066290000662D(....... ...................................f)..f-
\ICON\4\1042 32E160 7CA0 2D2760 89504E470D0A1A0A0000000D49484452000001000000010008060000005C72A866000000097048597300000EC300000EC301.PNG........IHDR.............\r.f....pHYs.........
\ICON\5\1042 335E00 25A8 2DA400 2800000030000000600000000100200000000000802500000000000000000000000000000000000000000000000000000000(...0........ ......%............................
\ICON\6\1042 3383A8 10A8 2DC9A8 2800000020000000400000000100200000000000801000000000000000000000000000000000000000000000000000000000(... ...@..... ...................................
\ICON\7\1042 339450 468 2DDA50 2800000010000000200000000100200000000000400400000000000000000000000000000000000000000000000000000000(....... ..... .....@.............................
\DIALOG\100\1042 3398B8 1E4 2DDEB8 0100FFFF0000000000000000C800C8800700000000005201B900000000004F00640069006E003300200015C8F4BC00000900......................R.......O.d.i.n.3. .........
\DIALOG\102\1042 339A9C 29D6 2DE09C 0100FFFF0000000010000400C800CA90D800000000000F047F01000000004F00640069006E00330000000800900100004D00..............................O.d.i.n.3.........M.
\DIALOG\141\1042 33C474 D8 2E0A74 0100FFFF00000000000000004800808003000000000086012E000000000000000800900100014D0053002000530068006500............H.........................M.S. .S.h.e.
\DIALOG\30721\1042 33C54C F4 2E0B4C C400C88000000000050009001A00B700460000000000C8C05CB82000CCB9E4B430AE000009004D0053002000530068006500................F.......\. .....0.....M.S. .S.h.e.
\DIALOG\30734\1042 33C640 34 2E0C40 C800C88000000000000009001A00B700460000000000000009004D00530020005300680065006C006C00200044006C0067000000................F.........M.S. .S.h.e.l.l. .D.l.g...
\STRING\7\1042 33C674 238 2E0C74 000000000000000000000F004F00640069006E003300200015C8F4BC28002600410029002E002E002E002000430061006E00............O.d.i.n.3. .....(.&.A.)....... .C.a.n.
\STRING\8\1042 33C8AC D4 2E0EAC 12004600410049004C0021002000280044006500760069006300650049006E0066006F0029000C004600410049004C002100..F.A.I.L.!. .(.D.e.v.i.c.e.I.n.f.o.)...F.A.I.L.!.
\STRING\3841\1042 33C980 68 2E0F80 0200F4C530AE0A00E4B278B9200074C784B93CC75CB8200000C8A5C70B00A8BAE0B420000CD37CC7200028002A002E002A00....0.....x. .t...<.\. ........... ...|. .(.*...*.
\STRING\3842\1042 33C9E8 2E 2E0FE8 0000070028C230AE30AE280026004800290000000000000000000000000000000000000000000000000000000000....(.0.0.(.&.H.).............................
\STRING\3843\1042 33CA18 E8 2E1018 100074D5F9B2200024C658B9200054BADCC2C0C900AC2000C6C5B5C2C8B2E4B22E001300C0C9D0C618B4C0C920004AC594B2..t... .$.X. .T....... ..................... .J...
\STRING\3857\1042 33CB00 312 2E1100 0D0098C7BBBA1CB420000CD37CC7200074C784B985C7C8B2E4B22E000D0038BB1CC17CB92000F4C5C0C92000BBBA88D5B5C2........ ...|. .t.............8...|. ..... .......
\STRING\3858\1042 33CE14 1A8 2E1414 0B0015C818C27CB9200085C725B858D5EDC2DCC224C62E000B002BC290C77CB9200085C725B858D5EDC2DCC224C62E001700......|. ...%.X.....$.....+...|. ...%.X.....$.....
\STRING\3859\1042 33CFBC 1D2 2E15BC 100008C630AE58CE20004AC540C720000CD37CC7200015D6DDC285C7C8B2E4B22E003200250031000A0074C720000CD37CC7....0.X. .J.@. ...|. .............2.%.1...t. ...|.
\STRING\3860\1042 33D190 68 2E1790 1900250031003A002000250032000A00A4C26CD0BDB9B8D27CB92000C4AC8DC12000E4C289D558D5DCC2A0ACB5C2C8B24CAE..%.1.:. .%.2.....l.....|. ..... .....X.........L.
\STRING\3865\1042 33D1F8 6E 2E17F8 0000000000000000000000000000000000000000000000001400F0C430AE200004C8A9C620008DC131C144C720007DC744C7............................0. ..... ...1.D. .}.D.
\STRING\3866\1042 33D268 B0 2E1868 1B0054BA7CC72000DCC2A4C25CD12000C0C9D0C6200004D55CB8F8ADA8B744C720005CB8DCB460D5200018C22000C6C5B5C2..T.|. .....\. ..... ...\.....D. .\.... ... .....
\STRING\3867\1042 33D318 302 2E1918 0F0024C658B900AC20001CBCDDC058D5C0C920004AC558C5B5C2C8B2E4B22E001F0025003100D0C5200061C538C1A4C258D5..$.X... .....X... .J.X...........%.1... .a.8...X.
\STRING\3868\1042 33D61C 174 2E1C1C 0F0024C658B900AC20001CBCDDC058D5C0C920004AC558C5B5C2C8B2E4B22E001F0025003100D0C5200061C538C1A4C258D5..$.X... .....X... .J.X...........%.1... .a.8...X.
\STRING\3869\1042 33D790 24 2E1D90 02003DD540C1000000000000000000000000000000000000000000000000000000000000..=.@...............................
\STRING\3887\1042 33D7B4 294 2E1DB4 0000090055D678C720005CD4DCC2200048C5200068D5050055D678C720005CD4DCC202003CD669D5160058D598B0200074C7....U.x. .\... .H. .h...U.x. .\.....<.i...X... .t.
\ACCELERATOR\140\1042 33DA48 38 2E2048 130053000F040000130043000E040000130050000C04000013004D000D0400000B005300040400000B005200050400008B00450006040000..S.......C.......P.......M.......S.......R.......E.....
\GROUP_CURSOR\30977\1042 33DA80 22 2E2080 00000200020020004000010001003401000008001000200001000100B40000000900...... .@.....4....... ...........
\GROUP_CURSOR\30998\1042 33DAA4 14 2E20A4 0000020001002000400001000100340100000F00...... .@.....4.....
\GROUP_CURSOR\30999\1042 33DAB8 14 2E20B8 0000020001002000400001000100340100000A00...... .@.....4.....
\GROUP_CURSOR\31000\1042 33DACC 14 2E20CC 0000020001002000400001000100340100000E00...... .@.....4.....
\GROUP_CURSOR\31001\1042 33DAE0 14 2E20E0 0000020001002000400001000100340100000D00...... .@.....4.....
\GROUP_CURSOR\31002\1042 33DAF4 14 2E20F4 0000020001002000400001000100340100001400...... .@.....4.....
\GROUP_CURSOR\31003\1042 33DB08 14 2E2108 0000020001002000400001000100340100000C00...... .@.....4.....
\GROUP_CURSOR\31004\1042 33DB1C 14 2E211C 0000020001002000400001000100340100001100...... .@.....4.....
\GROUP_CURSOR\31005\1042 33DB30 14 2E2130 0000020001002000400001000100340100000B00...... .@.....4.....
\GROUP_CURSOR\31006\1042 33DB44 14 2E2144 0000020001002000400001000100340100001000...... .@.....4.....
\GROUP_CURSOR\31007\1042 33DB58 14 2E2158 0000020001002000400001000100340100001200...... .@.....4.....
\GROUP_CURSOR\31008\1042 33DB6C 14 2E216C 0000020001002000400001000100340100001300...... .@.....4.....
\GROUP_CURSOR\31009\1042 33DB80 14 2E2180 0000020001002000400001000100340100001500...... .@.....4.....
\GROUP_CURSOR\31010\1042 33DB94 14 2E2194 0000020001002000400001000100340100001600...... .@.....4.....
\GROUP_CURSOR\31011\1042 33DBA8 14 2E21A8 0000020001002000400001000100340100001700...... .@.....4.....
\GROUP_ICON\128\1042 33DBBC 68 2E21BC 0000010007003030000001000800A80E000001002020000001000800A8080000020010100000010008006805000003000000......00............ ....................h.......
\VERSION\1\1042 33DC24 334 2E2224 340334000000560053005F00560045005200530049004F004E005F0049004E0046004F0000000000BD04EFFE000001000A004.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...............
\24\1\1033 33DF58 31C 2E2558 EFBBBF3C3F786D6C2076657273696F6E3D22312E302220656E636F64696E673D225554462D3822207374616E64616C6F6E65...<?xml version="1.0" encoding="UTF-8" standalone
\240\102\1042 33E274 5C 2E2874 31040304020000002D00310403040200000031003104030402000000320031040304020000003300310403040200000034003104030402000000350031040304020000003600310403040200000037003104030402000000380000001.......-.1.......1.1.......2.1.......3.1.......4.1.......5.1.......6.1.......7.1.......8...
Intelligent String
• download-list.txt
• Ignore UFS_Header.bin
• UFS_Header.bin
• .\Odin3.ini
• Kernel32.dll
• Comctl32.dll
• @.tls
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winctrl2.cpp
• kernel32.dll
• f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
• user32.dll
• hhctrl.ocx
• %Ts%Ts.dll
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\appcore.cpp
• RICHED20.DLL
• MSFTEDIT.DLL
• Advapi32.dll
• F4_Comdlg32.dll
• Comdlg32.dll
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\filecore.cpp
• comctl32.dll
• Hmfcm140u.dll
• HD2D1.dll
• DWrite.dll
• z?TaskDialogIndirect
• shell32.dll
• uxtheme.dll
• dwmapi.dll
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\auxdata.cpp
• .CHM
• .HLP
• .INI
• ole32.dll
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\viewcore.cpp
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winfrm.cpp
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\oledrop2.cpp
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\array_s.cpp
• f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olestrm.cpp
• .exe
• .cmd
• .bat
• .com
• mscoree.dll
• jloup@gzip.orgmadler@alumni.caltech.edu
• .tgz
• .tar
• C:\Program Files (x86)\Microsoft Visual Studio 14.0\VC\atlmfc\include\afxwin1.inl
• D:\tool\odin\Odin3\Odin3Downloader\Release\Odin3 v3.07.pdb
• .data$r~&0|.bss
• .tls
• DestroyWindowaCreateDialogIndirectParamW
• GDI32.dll
• WINSPOOL.DRV
• COMCTL32.dll
• oledlg.dll
• .PAX
• .PBH
• .PBE
• Odin 3B Patched<a href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=FGRATK56NKW7W"> DONATE TO 3B EFFORT</a>
• Odin3_v310.exe
• Odin.exe

Flow Anomalies
Offset RVA Section Description
510 5EF7EC .text CALL [static] | Indirect call to absolute memory address
581 5EF7EC .text CALL [static] | Indirect call to absolute memory address
592 5EF7EC .text CALL [static] | Indirect call to absolute memory address
6A5 5EF7EC .text CALL [static] | Indirect call to absolute memory address
6C1 5EF7EC .text CALL [static] | Indirect call to absolute memory address
6FF 5EF7EC .text CALL [static] | Indirect call to absolute memory address
75E 5EF7EC .text CALL [static] | Indirect call to absolute memory address
87F 5EF7EC .text CALL [static] | Indirect call to absolute memory address
890 5EF7EC .text CALL [static] | Indirect call to absolute memory address
8A1 5EF7EC .text CALL [static] | Indirect call to absolute memory address
8B2 5EF7EC .text CALL [static] | Indirect call to absolute memory address
8C3 5EF7EC .text CALL [static] | Indirect call to absolute memory address
8D4 5EF7EC .text CALL [static] | Indirect call to absolute memory address
8E5 5EF7EC .text CALL [static] | Indirect call to absolute memory address
8F6 5EF7EC .text CALL [static] | Indirect call to absolute memory address
907 5EF7EC .text CALL [static] | Indirect call to absolute memory address
918 5EF7EC .text CALL [static] | Indirect call to absolute memory address
929 5EF7EC .text CALL [static] | Indirect call to absolute memory address
95D 5EF7EC .text CALL [static] | Indirect call to absolute memory address
96E 5EF7EC .text CALL [static] | Indirect call to absolute memory address
97F 5EF7EC .text CALL [static] | Indirect call to absolute memory address
990 5EF7EC .text CALL [static] | Indirect call to absolute memory address
9A1 5EF7EC .text CALL [static] | Indirect call to absolute memory address
9EC 5EF7EC .text CALL [static] | Indirect call to absolute memory address
9FD 5EF7EC .text CALL [static] | Indirect call to absolute memory address
A0E 5EF7EC .text CALL [static] | Indirect call to absolute memory address
A1F 5EF7EC .text CALL [static] | Indirect call to absolute memory address
A30 5EF7EC .text CALL [static] | Indirect call to absolute memory address
A41 5EF7EC .text CALL [static] | Indirect call to absolute memory address
A67 5EF7EC .text CALL [static] | Indirect call to absolute memory address
B08 5EF7EC .text CALL [static] | Indirect call to absolute memory address
BFB 5EF7EC .text CALL [static] | Indirect call to absolute memory address
C2D 5EF7EC .text CALL [static] | Indirect call to absolute memory address
CB0 5EF7EC .text CALL [static] | Indirect call to absolute memory address
D66 5EF778 .text CALL [static] | Indirect call to absolute memory address
D70 5EF778 .text CALL [static] | Indirect call to absolute memory address
D88 5EF7EC .text CALL [static] | Indirect call to absolute memory address
DA4 5EF7EC .text CALL [static] | Indirect call to absolute memory address
DEF 5EF7EC .text CALL [static] | Indirect call to absolute memory address
E38 5EF7EC .text CALL [static] | Indirect call to absolute memory address
E49 5EF7EC .text CALL [static] | Indirect call to absolute memory address
E5A 5EF7EC .text CALL [static] | Indirect call to absolute memory address
E6B 5EF7EC .text CALL [static] | Indirect call to absolute memory address
E7C 5EF7EC .text CALL [static] | Indirect call to absolute memory address
EB0 5EF7EC .text CALL [static] | Indirect call to absolute memory address
2BE3 5EF478 .text CALL [static] | Indirect call to absolute memory address
2C95 5EF6B8 .text CALL [static] | Indirect call to absolute memory address
2D3E 5EF6B4 .text CALL [static] | Indirect call to absolute memory address
2E1D 5EF474 .text CALL [static] | Indirect call to absolute memory address
2E63 5EF470 .text CALL [static] | Indirect call to absolute memory address
2EC9 5EF6B8 .text CALL [static] | Indirect call to absolute memory address
2F2A 5EF6B4 .text CALL [static] | Indirect call to absolute memory address
318E 5EF484 .text CALL [static] | Indirect call to absolute memory address
31A8 5EF488 .text CALL [static] | Indirect call to absolute memory address
31C3 5EF47C .text CALL [static] | Indirect call to absolute memory address
324C 5EF480 .text CALL [static] | Indirect call to absolute memory address
3E60 5EF6B0 .text CALL [static] | Indirect call to absolute memory address
3E80 5EF6B0 .text CALL [static] | Indirect call to absolute memory address
CA45 6BE3E0 .text CALL [static] | Indirect call to absolute memory address
CB45 6BE3E0 .text CALL [static] | Indirect call to absolute memory address
CC45 6BE3E0 .text CALL [static] | Indirect call to absolute memory address
128AF 4000 .text JMP [static] | Indirect jump to absolute memory address
149B3 3000 .text JMP [static] | Indirect jump to absolute memory address
1A055 6BE3E0 .text CALL [static] | Indirect call to absolute memory address
1C210 5EF030 .text CALL [static] | Indirect call to absolute memory address
1C794 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C7AE 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C7C8 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C7E2 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C7FC 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C816 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C830 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C84A 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C864 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C87E 5EF6C0 .text CALL [static] | Indirect call to absolute memory address
1C939 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C949 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C959 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C969 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C979 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C989 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C999 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C9A9 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C9B9 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1C9C9 5EF1BC .text CALL [static] | Indirect call to absolute memory address
1CCB3 5EF770 .text CALL [static] | Indirect call to absolute memory address
1CE35 5EF778 .text CALL [static] | Indirect call to absolute memory address
1CE40 5EF778 .text CALL [static] | Indirect call to absolute memory address
1CF6C 5EF784 .text CALL [static] | Indirect call to absolute memory address
1D399 5EF46C .text CALL [static] | Indirect call to absolute memory address
1E919 5EF6B4 .text CALL [static] | Indirect call to absolute memory address
1E92C 5EF46C .text CALL [static] | Indirect call to absolute memory address
1E9C2 5EF78C .text CALL [static] | Indirect call to absolute memory address
1EBD9 5EF46C .text CALL [static] | Indirect call to absolute memory address
1EBE2 5EF46C .text CALL [static] | Indirect call to absolute memory address
1EBFC 5EF790 .text CALL [static] | Indirect call to absolute memory address
1EC0A 5EF794 .text CALL [static] | Indirect call to absolute memory address
1EC14 5EF798 .text CALL [static] | Indirect call to absolute memory address
1EE38 5EF6B4 .text CALL [static] | Indirect call to absolute memory address
234E9 5EF454 .text CALL [static] | Indirect call to absolute memory address
183B2-183CF N/A .text Unusual BP Cave, count: 30
Extra Analysis
Metric Value Percentage
Ascii Code 1747668 55,0817%
Null Byte Code 525689 16,5683%
NOP Cave Found 0x9090909090 Block Count: 1 | Total: 0,0001%
© 2026 All rights reserved.