PESCAN.IO - Analysis Report Basic |
|||||||
| File Structure |
|
PE Chart Code
Executable header (light blue)
Executable sections (pink)
Non-executable sections (black)
External injected code (red)
File Structure in red = malformed or corrupted header
Chart Code For Other Files
Printable characters (blue)
Non-printable characters (black)
| Information |
| Size: 1,39 MB SHA-256 Hash: E512D22D2BD989F35EBACCB63615434870DC0642B0F60E6D4BDA0BB89ADEE27A SHA-1 Hash: E27F4FEFFC1BA6BF4E35AEC4A5270FCCB636E5CF MD5 Hash: AA72609186042F1D7D01CE070306A9F2 Imphash: D810A3536BF9ECA80E4F8D1D08537D0B MajorOSVersion: 4 MinorOSVersion: 0 CheckSum: 0016918D EntryPoint (rva): 14D0 SizeOfHeaders: 400 SizeOfImage: 16A000 ImageBase: 0000000140000000 Architecture: x64 ImportTable: 163000 IAT: 163900 Characteristics: 22E TimeDateStamp: 69A5E26D Date: 02/03/2026 19:18:05 File Type: EXE Number Of Sections: 10 ASLR: Disabled Section Names (Optional Header): .text, .data, .rdata, .pdata, .xdata, .bss, .idata, .CRT, .tls, .reloc Number Of Executable Sections: 1 Subsystem: Windows Console |
| Sections Info |
| Section Name | Flags | ROffset | RSize | VOffset | VSize | Entropy | Chi2 |
|---|---|---|---|---|---|---|---|
| .text | 60000060 (Code, Initialized Data, Executable, Readable) | 400 | 11BE00 | 1000 | 11BCB0 |
|
|
| .data | C0000040 (Initialized Data, Readable, Writeable) | 11C200 | 7200 | 11D000 | 7060 |
|
|
| .rdata | 40000040 (Initialized Data, Readable) | 123400 | 1BA00 | 125000 | 1B840 |
|
|
| .pdata | 40000040 (Initialized Data, Readable) | 13EE00 | D200 | 141000 | D14C |
|
|
| .xdata | 40000040 (Initialized Data, Readable) | 14C000 | 12A00 | 14F000 | 1299C |
|
|
| .bss | C0000080 (Uninitialized Data, Readable, Writeable) | 0 | 0 | 162000 | DF0 |
|
|
| .idata | C0000040 (Initialized Data, Readable, Writeable) | 15EA00 | 2600 | 163000 | 2510 |
|
|
| .CRT | C0000040 (Initialized Data, Readable, Writeable) | 161000 | 200 | 166000 | 68 |
|
|
| .tls | C0000040 (Initialized Data, Readable, Writeable) | 161200 | 200 | 167000 | 10 |
|
|
| .reloc | 42000040 (Initialized Data, GP-Relative, Readable) | 161400 | 1800 | 168000 | 1720 |
|
|
| Entry Point |
The section number (1) have the Entry Point Information -> EntryPoint (calculated) - 8D0 Code -> 4883EC28488B05E55B1300C70000000000E89AFCFFFF90904883C428C30F1F004883EC28E8677B04004883F80119C04883C4 Assembler |SUB RSP, 0X28 |MOV RAX, QWORD PTR [RIP + 0X135BE5] |MOV DWORD PTR [RAX], 0 |CALL 0XCB0 |NOP |NOP |ADD RSP, 0X28 |RET |NOP DWORD PTR [RAX] |SUB RSP, 0X28 |CALL 0X48B90 |CMP RAX, 1 |SBB EAX, EAX |
| Signatures |
| Certificate - Digital Signature Not Found: • The file is not signed |
| Packer/Compiler |
| Detect It Easy (die) • PE+(64): linker: GNU linker ld (GNU Binutils)(2.40)[-] • Entropy: 6.32905 |
| Suspicious Functions |
| Library | Function | Description |
|---|---|---|
| KERNEL32.DLL | GetModuleFileNameA | Retrieve the fully qualified path for the executable file of a specified module. |
| KERNEL32.DLL | VirtualAlloc | Reserve, commit, or both, a region of memory within the virtual address space of a process. |
| KERNEL32.DLL | GetModuleHandleA | Retrieves a handle to the specified module. |
| KERNEL32.DLL | WriteFile | Writes data to a specified file or input/output (I/O) device. |
| KERNEL32.DLL | LoadLibraryW | Loads the specified module into the address space of the calling process. |
| KERNEL32.DLL | CreateToolhelp32Snapshot | Creates a snapshot of the specified processes, heaps, threads, and modules. |
| KERNEL32.DLL | GetProcAddress | Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL). |
| KERNEL32.DLL | DeleteFileA | Deletes an existing file. |
| KERNEL32.DLL | IsDebuggerPresent | Determines if the calling process is being debugged by a user-mode debugger. |
| ADVAPI32.DLL | RegCreateKeyExA | Creates a new registry key or opens an existing one. |
| ADVAPI32.DLL | RegSetValueExA | Sets the data and type of a specified value under a registry key. |
| File Access |
| sc.exe $com.Document.ActiveView.Exe WS2_32.dll USER32.dll PSAPI.DLL NETAPI32.dll msvcrt.dll MPR.dll KERNEL32.dll IPHLPAPI.DLL GDI32.dll ADVAPI32.dll .dat 1. Find !!!_READ_ME_!!!.txt .txt +] Check !!!_READ_ME_!!!.txt Temp |
| File Access (UNICODE) |
| httpdebugger.exe fiddler.exe ResourceHacker.exe joeboxserver.exe joeboxcontrol.exe sniff_hit.exe sysAnalyzer.exe proc_analyzer.exe SysInspector.exe LordPE.exe PETools.exe hookexplorer.exe dumpcap.exe wireshark.exe regmon.exe filemon.exe autorunsc.exe autoruns.exe procmon64.exe procmon.exe procexp64.exe procexp.exe processhacker.exe reshacker.exe MegaDumper.exe IMMUNITYDEBUGGER.EXE ImportREC.exe immunitydebugger.exe x96dbg.exe protection_id.exe scylla_x86.exe scylla_x64.exe scylla.exe idaq64.exe idaq.exe idaw64.exe idaw.exe idag64.exe idag.exe ida64.exe ida.exe windbg.exe x32dbg.exe x64dbg.exe construction from null is not validollydbg.exe rand_sadvapi32.dll msvcrt.dll boot.ini |
| Interest's Words |
| Encrypt exec schtasks netsh attrib start hostname systeminfo schtask expand replace sc.exe |
| Interest's Words (UNICODE) |
| bootsect sc.exe |
| Anti-VM/Sandbox/Debug Tricks (UNICODE) |
| LabTools - wireshark LabTools - filemon LabTools - procexp LabTools - procmon LabTools - regmon LabTools - idag LabTools - immunitydebugger LabTools - petools OllyDbg EXE - ollydbg.exe |
| URLs |
| https://H] https://H$ |
| Strings/Hex Code Found With The File Rules |
| Rule Type | Encoding | Matched (Word) |
|---|---|---|
| Text | Ascii | Registry (RegCreateKeyEx) |
| Text | Ascii | Registry (RegOpenKeyEx) |
| Text | Ascii | Registry (RegSetValueEx) |
| Text | Ascii | File (GetTempPath) |
| Text | Ascii | File (CreateFile) |
| Text | Ascii | File (WriteFile) |
| Text | Ascii | File (ReadFile) |
| Text | Ascii | Service (OpenSCManager) |
| Text | Ascii | Anti-Analysis VM (IsDebuggerPresent) |
| Text | Ascii | Anti-Analysis VM (GetSystemInfo) |
| Text | Ascii | Anti-Analysis VM (GlobalMemoryStatusEx) |
| Text | Ascii | Anti-Analysis VM (CreateToolhelp32Snapshot) |
| Text | Ascii | Reconnaissance (FindFirstFileA) |
| Text | Ascii | Reconnaissance (FindNextFileA) |
| Text | Ascii | Reconnaissance (FindFirstFileW) |
| Text | Ascii | Reconnaissance (FindNextFileW) |
| Text | Ascii | Reconnaissance (FindClose) |
| Text | Ascii | Stealth (GetThreadContext) |
| Text | Ascii | Stealth (SetThreadContext) |
| Text | Ascii | Stealth (ReleaseSemaphore) |
| Text | Ascii | Stealth (CloseHandle) |
| Text | Ascii | Stealth (VirtualAlloc) |
| Text | Ascii | Stealth (VirtualProtect) |
| Text | Ascii | Execution (CreateProcessA) |
| Text | Ascii | Execution (ResumeThread) |
| Text | Ascii | Execution (CreateSemaphoreA) |
| Text | Ascii | Execution (CreateEventA) |
| Text | Ascii | Information used for user authentication (Credential) |
| Entry Point | Hex Pattern | Microsoft Visual C++ 8.0 (DLL) |
| Intelligent String |
| • @.bss • .CRT • .tls • .exe • .dll • .sys • bootmgr.efi • bootmgfw.efi • bootsect.bak • boot.ini • bootfont.bin • Windows.old • $Recycle.Bin • $RECYCLE.BIN • $recycle.bin • C:\ProgramData\$name" • C:\ProgramData\$name"} -EA Stop • C:\ProgramData\$name" -EA Stop • C:\ProgramData\$name",$null,$null,'7') • schtasks /create /s $pc /u $u /p $p /tn $tn /tr "C:\ProgramData\$name" /sc once /st 00:00 /ru SYSTEM /f 2>$null • schtasks /run /s $pc /u $u /p $p /tn $tn 2>$null • schtasks /delete /s $pc /u $u /p $p /tn $tn /f 2>$null • C:\ProgramData\$using:name"} -EA Stop • sc.exe \\$pc create $svc binPath= "C:\ProgramData\$name" type= own start= auto 2>$null • sc.exe \\$pc start $svc 2>$null • sc.exe \\$pc delete $svc 2>$null • basic_string: construction from null is not validollydbg.exe • x64dbg.exe • x32dbg.exe • windbg.exe • ida.exe • ida64.exe • idag.exe • idag64.exe • idaw.exe • idaw64.exe • idaq.exe • idaq64.exe • scylla.exe • scylla_x64.exe • scylla_x86.exe • protection_id.exe • x96dbg.exe • immunitydebugger.exe • ImportREC.exe • IMMUNITYDEBUGGER.EXE • MegaDumper.exe • reshacker.exe • processhacker.exe • procexp.exe • procexp64.exe • procmon.exe • procmon64.exe • autoruns.exe • autorunsc.exe • filemon.exe • regmon.exe • wireshark.exe • dumpcap.exe • hookexplorer.exe • PETools.exe • LordPE.exe • SysInspector.exe • proc_analyzer.exe • sysAnalyzer.exe • sniff_hit.exe • joeboxcontrol.exe • joeboxserver.exe • ResourceHacker.exe • fiddler.exe • httpdebugger.exe • msvcrt.dll • advapi32.dll • kernel32.dll • 0ADVAPI32.dll • (0IPHLPAPI.DLL • 0PSAPI.DLL • 0USER32.dll • 0WS2_32.dll |
| Flow Anomalies |
| Offset | RVA | Section | Description |
|---|---|---|---|
| 658 | N/A | .text | CALL QWORD PTR [RIP+0x162A6A] |
| 853 | N/A | .text | CALL QWORD PTR [RIP+0x1626F7] |
| 3033 | N/A | .text | CALL QWORD PTR [RIP+0x15FE0F] |
| 3062 | N/A | .text | CALL QWORD PTR [RIP+0x15FF60] |
| 3065 | N/A | .text | CALL QWORD PTR [RIP+0x2B800] |
| 3098 | N/A | .text | CALL QWORD PTR [RIP+0x16015A] |
| 3118 | N/A | .text | CALL QWORD PTR [RIP+0x15FEC2] |
| 3150 | N/A | .text | CALL QWORD PTR [RIP+0x15FE8A] |
| 315E | N/A | .text | CALL QWORD PTR [RIP+0x1600BC] |
| 319F | N/A | .text | CALL QWORD PTR [RIP+0x15FE3B] |
| 31B0 | N/A | .text | CALL QWORD PTR [RIP+0x16006A] |
| 3236 | N/A | .text | CALL QWORD PTR [RIP+0x15FDA4] |
| 3248 | N/A | .text | CALL QWORD PTR [RIP+0x15FFD2] |
| 324B | N/A | .text | CALL QWORD PTR [RIP+0x100C700] |
| 3681 | N/A | .text | CALL QWORD PTR [RIP+0x15F8D9] |
| 36C4 | N/A | .text | CALL QWORD PTR [RIP+0x15FA56] |
| 3708 | N/A | .text | CALL QWORD PTR [RIP+0x15FA2A] |
| 3786 | N/A | .text | CALL QWORD PTR [RIP+0x15F984] |
| 37E1 | N/A | .text | CALL QWORD PTR [RIP+0x15F939] |
| 3870 | N/A | .text | CALL QWORD PTR [RIP+0x15F9AA] |
| 389A | N/A | .text | CALL QWORD PTR [RIP+0x15F958] |
| 38CC | N/A | .text | CALL QWORD PTR [RIP+0x15F94E] |
| 392F | N/A | .text | CALL QWORD PTR [RIP+0x15F7F3] |
| 3B75 | N/A | .text | CALL QWORD PTR [RIP+0x15F5BD] |
| 3B8E | N/A | .text | JMP QWORD PTR [RIP+0x15F584] |
| 3BE7 | N/A | .text | CALL QWORD PTR [RIP+0x15F53B] |
| 3C37 | N/A | .text | CALL QWORD PTR [RIP+0x15F4EB] |
| 3C87 | N/A | .text | CALL QWORD PTR [RIP+0x15F49B] |
| F6D6 | N/A | .text | CALL QWORD PTR [RIP+0x153B1C] |
| FA88 | N/A | .text | CALL QWORD PTR [RIP+0x10D0D2] |
| 1C818 | N/A | .text | CALL QWORD PTR [RIP+0x1003C2] |
| 1CC82 | N/A | .text | CALL QWORD PTR [RIP+0xFFF58] |
| 1CD12 | N/A | .text | CALL QWORD PTR [RIP+0xFFEC8] |
| 1CE00 | N/A | .text | CALL QWORD PTR [RIP+0x1463F2] |
| 1CF0D | N/A | .text | CALL QWORD PTR [RIP+0xFFCCD] |
| 1D105 | N/A | .text | CALL QWORD PTR [RIP+0xFFAD5] |
| 2E0D1 | N/A | .text | CALL QWORD PTR [RIP+0x48F80148] |
| 2E760 | N/A | .text | CALL QWORD PTR [RIP+0x9F8D48] |
| 2E914 | N/A | .text | CALL QWORD PTR [RIP+0xD1D86949] |
| 2E933 | N/A | .text | CALL QWORD PTR [RIP+0x246C8948] |
| 2F99F | N/A | .text | CALL QWORD PTR [RIP+0x48FD8948] |
| 2FF5D | N/A | .text | CALL QWORD PTR [RIP+0x241C8948] |
| 3010F | N/A | .text | CALL QWORD PTR [RIP+0xD1D96949] |
| 3012E | N/A | .text | CALL QWORD PTR [RIP+0x242C8948] |
| 3107D | N/A | .text | CALL QWORD PTR [RIP+0x9F8D48] |
| 3118B | N/A | .text | CALL QWORD PTR [RIP+0x38348D4F] |
| 3119D | N/A | .text | CALL QWORD PTR [RIP+0x49F9014C] |
| 3124D | N/A | .text | CALL QWORD PTR [RIP+0x49F0014D] |
| 31261 | N/A | .text | CALL QWORD PTR [RIP+0x246C8948] |
| 34A60 | N/A | .text | JMP QWORD PTR [RIP+0x12E36A] |
| 34A68 | N/A | .text | JMP QWORD PTR [RIP+0x12E2EA] |
| 34A70 | N/A | .text | JMP QWORD PTR [RIP+0x12EA3A] |
| 34A78 | N/A | .text | JMP QWORD PTR [RIP+0x12EA2A] |
| 34A80 | N/A | .text | JMP QWORD PTR [RIP+0x12EA1A] |
| 34A88 | N/A | .text | JMP QWORD PTR [RIP+0x12E712] |
| 34A90 | N/A | .text | JMP QWORD PTR [RIP+0x12E702] |
| 34A98 | N/A | .text | JMP QWORD PTR [RIP+0x12E6F2] |
| 34AA0 | N/A | .text | JMP QWORD PTR [RIP+0x12E6E2] |
| 34AA8 | N/A | .text | JMP QWORD PTR [RIP+0x12E6D2] |
| 34AB0 | N/A | .text | JMP QWORD PTR [RIP+0x12E6C2] |
| 34AB8 | N/A | .text | JMP QWORD PTR [RIP+0x12E6B2] |
| 34AC0 | N/A | .text | JMP QWORD PTR [RIP+0x12E9FA] |
| 34AC8 | N/A | .text | JMP QWORD PTR [RIP+0x12E692] |
| 34AD0 | N/A | .text | JMP QWORD PTR [RIP+0x12E54A] |
| 34AD8 | N/A | .text | JMP QWORD PTR [RIP+0x12E53A] |
| 34AE0 | N/A | .text | JMP QWORD PTR [RIP+0x12E342] |
| 3DFAB | N/A | .text | CALL QWORD PTR [RIP+0x12517F] |
| 3E00E | N/A | .text | CALL QWORD PTR [RIP+0x125114] |
| 3E018 | N/A | .text | CALL QWORD PTR [RIP+0x124EE2] |
| 3E5D4 | N/A | .text | CALL QWORD PTR [RIP+0x12486E] |
| 3E62A | N/A | .text | JMP QWORD PTR [RIP+0x1249B0] |
| 3E677 | N/A | .text | CALL QWORD PTR [RIP+0x1247CB] |
| 3E692 | N/A | .text | CALL QWORD PTR [RIP+0x124948] |
| 3E6CA | N/A | .text | CALL QWORD PTR [RIP+0x124778] |
| 3E706 | N/A | .text | CALL QWORD PTR [RIP+0x1248D4] |
| 3E7E5 | N/A | .text | CALL QWORD PTR [RIP+0x124645] |
| 3E817 | N/A | .text | CALL QWORD PTR [RIP+0x1247AB] |
| 3EC8B | N/A | .text | CALL QWORD PTR [RIP+0x1243A7] |
| 3ED7C | N/A | .text | CALL QWORD PTR [RIP+0x1242EE] |
| 3EE8E | N/A | .text | CALL QWORD PTR [RIP+0x1241A4] |
| 3EFAD | N/A | .text | CALL QWORD PTR [RIP+0x1240C5] |
| 3EFD3 | N/A | .text | CALL QWORD PTR [RIP+0x12409F] |
| 3F00B | N/A | .text | CALL QWORD PTR [RIP+0x124027] |
| 3F09E | N/A | .text | CALL QWORD PTR [RIP+0x123FC4] |
| 3F0BC | N/A | .text | CALL QWORD PTR [RIP+0x123FB6] |
| 3F1CA | N/A | .text | CALL QWORD PTR [RIP+0x123E98] |
| 3F826 | N/A | .text | CALL QWORD PTR [RIP+0x1237D4] |
| 3F89A | N/A | .text | CALL QWORD PTR [RIP+0x1238B0] |
| 46DF9 | N/A | .text | JMP QWORD PTR [RIP+0x11C049] |
| 46EC3 | N/A | .text | CALL QWORD PTR [RIP+0x11C117] |
| 46FCD | N/A | .text | JMP QWORD PTR [RIP+0x11C00D] |
| 4713C | N/A | .text | CALL QWORD PTR [RIP+0x11BE9E] |
| 47362 | N/A | .text | CALL QWORD PTR [RIP+0x11BC78] |
| 473EA | N/A | .text | CALL QWORD PTR [RIP+0x11BBF0] |
| 47D3D | N/A | .text | JMP QWORD PTR [RIP+0x11B105] |
| 47DAD | N/A | .text | JMP QWORD PTR [RIP+0x11B22D] |
| 47E30 | N/A | .text | CALL QWORD PTR [RIP+0x11B0F2] |
| 47E6F | N/A | .text | CALL QWORD PTR [RIP+0x11B173] |
| 47F42 | N/A | .text | CALL QWORD PTR [RIP+0x11B208] |
| 4810A | N/A | .text | CALL QWORD PTR [RIP+0x11AEC0] |
| 6DD8A-6DDC1 | N/A | .text | Potential obfuscated jump sequence detected, count: 28 |
| EDBE3-EDC08 | N/A | .text | Potential obfuscated jump sequence detected, count: 10 |
| EE393-EE3B8 | N/A | .text | Potential obfuscated jump sequence detected, count: 10 |
| 161038 | 3E8E0 | .CRT | TLS Callback | Pointer to 14003E8E0 - 0x3DCE0 .text |
| 161040 | 3E8B0 | .CRT | TLS Callback | Pointer to 14003E8B0 - 0x3DCB0 .text |
| 161048 | 4B8F0 | .CRT | TLS Callback | Pointer to 14004B8F0 - 0x4ACF0 .text |
| 13EE00 | 1000 | .pdata | ExceptionHook | Pointer to 1000 - 0x400 .text + UnwindInfo: .xdata |
| 13EE0C | 1010 | .pdata | ExceptionHook | Pointer to 1010 - 0x410 .text + UnwindInfo: .xdata |
| 13EE18 | 1130 | .pdata | ExceptionHook | Pointer to 1130 - 0x530 .text + UnwindInfo: .xdata |
| 13EE24 | 1180 | .pdata | ExceptionHook | Pointer to 1180 - 0x580 .text + UnwindInfo: .xdata |
| 13EE30 | 14B0 | .pdata | ExceptionHook | Pointer to 14B0 - 0x8B0 .text + UnwindInfo: .xdata |
| 13EE3C | 14D0 | .pdata | ExceptionHook | Pointer to 14D0 - 0x8D0 .text + UnwindInfo: .xdata |
| 13EE48 | 14F0 | .pdata | ExceptionHook | Pointer to 14F0 - 0x8F0 .text + UnwindInfo: .xdata |
| 13EE54 | 1510 | .pdata | ExceptionHook | Pointer to 1510 - 0x910 .text + UnwindInfo: .xdata |
| 13EE60 | 1520 | .pdata | ExceptionHook | Pointer to 1520 - 0x920 .text + UnwindInfo: .xdata |
| 13EE6C | 356F0 | .pdata | ExceptionHook | Pointer to 356F0 - 0x34AF0 .text + UnwindInfo: .xdata |
| 13EE78 | 357F0 | .pdata | ExceptionHook | Pointer to 357F0 - 0x34BF0 .text + UnwindInfo: .xdata |
| 13EE84 | 35850 | .pdata | ExceptionHook | Pointer to 35850 - 0x34C50 .text + UnwindInfo: .xdata |
| 13EE90 | 35910 | .pdata | ExceptionHook | Pointer to 35910 - 0x34D10 .text + UnwindInfo: .xdata |
| 13EE9C | 35990 | .pdata | ExceptionHook | Pointer to 35990 - 0x34D90 .text + UnwindInfo: .xdata |
| 13EEA8 | 359F0 | .pdata | ExceptionHook | Pointer to 359F0 - 0x34DF0 .text + UnwindInfo: .xdata |
| 13EEB4 | 35A70 | .pdata | ExceptionHook | Pointer to 35A70 - 0x34E70 .text + UnwindInfo: .xdata |
| 13EEC0 | 35B40 | .pdata | ExceptionHook | Pointer to 35B40 - 0x34F40 .text + UnwindInfo: .xdata |
| 13EECC | 35B70 | .pdata | ExceptionHook | Pointer to 35B70 - 0x34F70 .text + UnwindInfo: .xdata |
| 13EED8 | 35C40 | .pdata | ExceptionHook | Pointer to 35C40 - 0x35040 .text + UnwindInfo: .xdata |
| 13EEE4 | 35C70 | .pdata | ExceptionHook | Pointer to 35C70 - 0x35070 .text + UnwindInfo: .xdata |
| 13EEF0 | 35CC0 | .pdata | ExceptionHook | Pointer to 35CC0 - 0x350C0 .text + UnwindInfo: .xdata |
| 13EEFC | 35D30 | .pdata | ExceptionHook | Pointer to 35D30 - 0x35130 .text + UnwindInfo: .xdata |
| 13EF08 | 35D90 | .pdata | ExceptionHook | Pointer to 35D90 - 0x35190 .text + UnwindInfo: .xdata |
| 13EF14 | 35E30 | .pdata | ExceptionHook | Pointer to 35E30 - 0x35230 .text + UnwindInfo: .xdata |
| 13EF20 | 35F30 | .pdata | ExceptionHook | Pointer to 35F30 - 0x35330 .text + UnwindInfo: .xdata |
| 13EF2C | 35FC0 | .pdata | ExceptionHook | Pointer to 35FC0 - 0x353C0 .text + UnwindInfo: .xdata |
| 13EF38 | 36070 | .pdata | ExceptionHook | Pointer to 36070 - 0x35470 .text + UnwindInfo: .xdata |
| 13EF44 | 36170 | .pdata | ExceptionHook | Pointer to 36170 - 0x35570 .text + UnwindInfo: .xdata |
| 13EF50 | 363C0 | .pdata | ExceptionHook | Pointer to 363C0 - 0x357C0 .text + UnwindInfo: .xdata |
| 13EF5C | 36E90 | .pdata | ExceptionHook | Pointer to 36E90 - 0x36290 .text + UnwindInfo: .xdata |
| 13EF68 | 36F70 | .pdata | ExceptionHook | Pointer to 36F70 - 0x36370 .text + UnwindInfo: .xdata |
| 13EF74 | 36FF0 | .pdata | ExceptionHook | Pointer to 36FF0 - 0x363F0 .text + UnwindInfo: .xdata |
| 13EF80 | 370A0 | .pdata | ExceptionHook | Pointer to 370A0 - 0x364A0 .text + UnwindInfo: .xdata |
| 13EF8C | 37240 | .pdata | ExceptionHook | Pointer to 37240 - 0x36640 .text + UnwindInfo: .xdata |
| 13EF98 | 37750 | .pdata | ExceptionHook | Pointer to 37750 - 0x36B50 .text + UnwindInfo: .xdata |
| 13EFA4 | 37930 | .pdata | ExceptionHook | Pointer to 37930 - 0x36D30 .text + UnwindInfo: .xdata |
| 13EFB0 | 379D0 | .pdata | ExceptionHook | Pointer to 379D0 - 0x36DD0 .text + UnwindInfo: .xdata |
| 13EFBC | 37A80 | .pdata | ExceptionHook | Pointer to 37A80 - 0x36E80 .text + UnwindInfo: .xdata |
| 13EFC8 | 37C60 | .pdata | ExceptionHook | Pointer to 37C60 - 0x37060 .text + UnwindInfo: .xdata |
| 13EFD4 | 38440 | .pdata | ExceptionHook | Pointer to 38440 - 0x37840 .text + UnwindInfo: .xdata |
| 13EFE0 | 384F0 | .pdata | ExceptionHook | Pointer to 384F0 - 0x378F0 .text + UnwindInfo: .xdata |
| 13EFEC | 38730 | .pdata | ExceptionHook | Pointer to 38730 - 0x37B30 .text + UnwindInfo: .xdata |
| 13EFF8 | 38D30 | .pdata | ExceptionHook | Pointer to 38D30 - 0x38130 .text + UnwindInfo: .xdata |
| 13F004 | 391A0 | .pdata | ExceptionHook | Pointer to 391A0 - 0x385A0 .text + UnwindInfo: .xdata |
| 13F010 | 39360 | .pdata | ExceptionHook | Pointer to 39360 - 0x38760 .text + UnwindInfo: .xdata |
| 13F01C | 3C470 | .pdata | ExceptionHook | Pointer to 3C470 - 0x3B870 .text + UnwindInfo: .xdata |
| 13F028 | 3C510 | .pdata | ExceptionHook | Pointer to 3C510 - 0x3B910 .text + UnwindInfo: .xdata |
| 13F034 | 3CE00 | .pdata | ExceptionHook | Pointer to 3CE00 - 0x3C200 .text + UnwindInfo: .xdata |
| 13F040 | 3D120 | .pdata | ExceptionHook | Pointer to 3D120 - 0x3C520 .text + UnwindInfo: .xdata |
| 13F04C | 3D4A0 | .pdata | ExceptionHook | Pointer to 3D4A0 - 0x3C8A0 .text + UnwindInfo: .xdata |
| 13F058 | 3D770 | .pdata | ExceptionHook | Pointer to 3D770 - 0x3CB70 .text + UnwindInfo: .xdata |
| 13F064 | 3D830 | .pdata | ExceptionHook | Pointer to 3D830 - 0x3CC30 .text + UnwindInfo: .xdata |
| 13F070 | 3DE00 | .pdata | ExceptionHook | Pointer to 3DE00 - 0x3D200 .text + UnwindInfo: .xdata |
| 13F07C | 3DFB0 | .pdata | ExceptionHook | Pointer to 3DFB0 - 0x3D3B0 .text + UnwindInfo: .xdata |
| 13F088 | 3E340 | .pdata | ExceptionHook | Pointer to 3E340 - 0x3D740 .text + UnwindInfo: .xdata |
| 13F094 | 3E640 | .pdata | ExceptionHook | Pointer to 3E640 - 0x3DA40 .text + UnwindInfo: .xdata |
| 13F0A0 | 3E7A0 | .pdata | ExceptionHook | Pointer to 3E7A0 - 0x3DBA0 .text + UnwindInfo: .xdata |
| 13F0AC | 3E7D0 | .pdata | ExceptionHook | Pointer to 3E7D0 - 0x3DBD0 .text + UnwindInfo: .xdata |
| 13F0B8 | 3E810 | .pdata | ExceptionHook | Pointer to 3E810 - 0x3DC10 .text + UnwindInfo: .xdata |
| 13F0C4 | 3E880 | .pdata | ExceptionHook | Pointer to 3E880 - 0x3DC80 .text + UnwindInfo: .xdata |
| 13F0D0 | 3E8A0 | .pdata | ExceptionHook | Pointer to 3E8A0 - 0x3DCA0 .text + UnwindInfo: .xdata |
| 13F0DC | 3E8B0 | .pdata | ExceptionHook | Pointer to 3E8B0 - 0x3DCB0 .text + UnwindInfo: .xdata |
| 13F0E8 | 3E8E0 | .pdata | ExceptionHook | Pointer to 3E8E0 - 0x3DCE0 .text + UnwindInfo: .xdata |
| 13F0F4 | 3E970 | .pdata | ExceptionHook | Pointer to 3E970 - 0x3DD70 .text + UnwindInfo: .xdata |
| 13F100 | 3E980 | .pdata | ExceptionHook | Pointer to 3E980 - 0x3DD80 .text + UnwindInfo: .xdata |
| 13F10C | 3EA80 | .pdata | ExceptionHook | Pointer to 3EA80 - 0x3DE80 .text + UnwindInfo: .xdata |
| 13F118 | 3EA90 | .pdata | ExceptionHook | Pointer to 3EA90 - 0x3DE90 .text + UnwindInfo: .xdata |
| 13F124 | 3EB00 | .pdata | ExceptionHook | Pointer to 3EB00 - 0x3DF00 .text + UnwindInfo: .xdata |
| 13F130 | 3EC70 | .pdata | ExceptionHook | Pointer to 3EC70 - 0x3E070 .text + UnwindInfo: .xdata |
| 13F13C | 3EFD0 | .pdata | ExceptionHook | Pointer to 3EFD0 - 0x3E3D0 .text + UnwindInfo: .xdata |
| 13F148 | 3F010 | .pdata | ExceptionHook | Pointer to 3F010 - 0x3E410 .text + UnwindInfo: .xdata |
| 13F154 | 3F020 | .pdata | ExceptionHook | Pointer to 3F020 - 0x3E420 .text + UnwindInfo: .xdata |
| 13F160 | 3F1C0 | .pdata | ExceptionHook | Pointer to 3F1C0 - 0x3E5C0 .text + UnwindInfo: .xdata |
| 13F16C | 3F230 | .pdata | ExceptionHook | Pointer to 3F230 - 0x3E630 .text + UnwindInfo: .xdata |
| 13F178 | 3F2A0 | .pdata | ExceptionHook | Pointer to 3F2A0 - 0x3E6A0 .text + UnwindInfo: .xdata |
| 13F184 | 3F330 | .pdata | ExceptionHook | Pointer to 3F330 - 0x3E730 .text + UnwindInfo: .xdata |
| 13F190 | 3F430 | .pdata | ExceptionHook | Pointer to 3F430 - 0x3E830 .text + UnwindInfo: .xdata |
| 13F19C | 3F460 | .pdata | ExceptionHook | Pointer to 3F460 - 0x3E860 .text + UnwindInfo: .xdata |
| 13F1A8 | 3F4B0 | .pdata | ExceptionHook | Pointer to 3F4B0 - 0x3E8B0 .text + UnwindInfo: .xdata |
| 13F1B4 | 3F550 | .pdata | ExceptionHook | Pointer to 3F550 - 0x3E950 .text + UnwindInfo: .xdata |
| 13F1C0 | 3F5D0 | .pdata | ExceptionHook | Pointer to 3F5D0 - 0x3E9D0 .text + UnwindInfo: .xdata |
| 13F1CC | 3F610 | .pdata | ExceptionHook | Pointer to 3F610 - 0x3EA10 .text + UnwindInfo: .xdata |
| 13F1D8 | 3F690 | .pdata | ExceptionHook | Pointer to 3F690 - 0x3EA90 .text + UnwindInfo: .xdata |
| 13F1E4 | 3F6D0 | .pdata | ExceptionHook | Pointer to 3F6D0 - 0x3EAD0 .text + UnwindInfo: .xdata |
| 13F1F0 | 3F760 | .pdata | ExceptionHook | Pointer to 3F760 - 0x3EB60 .text + UnwindInfo: .xdata |
| 13F1FC | 3F870 | .pdata | ExceptionHook | Pointer to 3F870 - 0x3EC70 .text + UnwindInfo: .xdata |
| 13F208 | 3F8D0 | .pdata | ExceptionHook | Pointer to 3F8D0 - 0x3ECD0 .text + UnwindInfo: .xdata |
| 13F214 | 3F8F0 | .pdata | ExceptionHook | Pointer to 3F8F0 - 0x3ECF0 .text + UnwindInfo: .xdata |
| 13F220 | 3F910 | .pdata | ExceptionHook | Pointer to 3F910 - 0x3ED10 .text + UnwindInfo: .xdata |
| 13F22C | 3F920 | .pdata | ExceptionHook | Pointer to 3F920 - 0x3ED20 .text + UnwindInfo: .xdata |
| 13F238 | 3F930 | .pdata | ExceptionHook | Pointer to 3F930 - 0x3ED30 .text + UnwindInfo: .xdata |
| 13F244 | 3F940 | .pdata | ExceptionHook | Pointer to 3F940 - 0x3ED40 .text + UnwindInfo: .xdata |
| 13F250 | 3F950 | .pdata | ExceptionHook | Pointer to 3F950 - 0x3ED50 .text + UnwindInfo: .xdata |
| 13F25C | 3F960 | .pdata | ExceptionHook | Pointer to 3F960 - 0x3ED60 .text + UnwindInfo: .xdata |
| 13F268 | 3F970 | .pdata | ExceptionHook | Pointer to 3F970 - 0x3ED70 .text + UnwindInfo: .xdata |
| 13F274 | 3F9A0 | .pdata | ExceptionHook | Pointer to 3F9A0 - 0x3EDA0 .text + UnwindInfo: .xdata |
| 13F280 | 3F9B0 | .pdata | ExceptionHook | Pointer to 3F9B0 - 0x3EDB0 .text + UnwindInfo: .xdata |
| 13F28C | 3F9C0 | .pdata | ExceptionHook | Pointer to 3F9C0 - 0x3EDC0 .text + UnwindInfo: .xdata |
| 13F298 | 3FBE0 | .pdata | ExceptionHook | Pointer to 3FBE0 - 0x3EFE0 .text + UnwindInfo: .xdata |
| 13F2A4 | 3FC20 | .pdata | ExceptionHook | Pointer to 3FC20 - 0x3F020 .text + UnwindInfo: .xdata |
| Extra Analysis |
| Metric | Value | Percentage |
|---|---|---|
| Ascii Code | 859781 | 59,1705% |
| Null Byte Code | 244296 | 16,8126% |
| NOP Cave Found | 0x9090909090 | Block Count: 5720 | Total: 0,9841% |
© 2026 All rights reserved.