PESCAN.IO - Analysis Report Basic

File Structure
Analysis Image
PE Chart Code
Executable header (light blue)
Executable sections (pink)
Non-executable sections (black)
External injected code (red)
File Structure in red = malformed or corrupted header

Chart Code For Other Files
Printable characters (blue)
Non-printable characters (black)
Information
Size: 550,00 KB
SHA-256 Hash: 504627F32C59EA1ED3EE145A2B2C7D6776D9393DC11EF46A7B96C92E5734B293
SHA-1 Hash: 4A6C5724440217A22B0C4E999CFB0D9C6F69CCBF
MD5 Hash: C380A979BF0B086709CB5410FFF9DB68
Imphash: 09F490BCB040C9029CFC94D70DB3A642
MajorOSVersion: 6
MinorOSVersion: 0
CheckSum: 00000000
EntryPoint (rva): 63248
SizeOfHeaders: 400
SizeOfImage: 8E000
ImageBase: 0000000180000000
Architecture: x64
ImportTable: 82084
IAT: 66000
Characteristics: 2022
TimeDateStamp: 69A548A7
Date: 02/03/2026 8:21:59
File Type: DLL
Number Of Sections: 6
ASLR: Disabled
Section Names (Optional Header): .text, .rdata, .data, .pdata, .rsrc, .reloc
Number Of Executable Sections: 1
Subsystem: Windows Console
UAC Execution Level Manifest: asInvoker

Sections Info
Section Name Flags ROffset RSize VOffset VSizeEntropyChi2
.text 60000020 (Code, Executable, Readable) 400 64800 1000 646436,53932474197,52
.rdata 40000040 (Initialized Data, Readable) 64C00 1E000 66000 1DE645,64073162926,35
.data C0000040 (Initialized Data, Readable, Writeable) 82C00 1200 84000 2CA04,6812102594,22
.pdata 40000040 (Initialized Data, Readable) 83E00 5000 87000 4EC05,8509469014,23
.rsrc 40000040 (Initialized Data, Readable) 88E00 200 8C000 1E04,72479288,00
.reloc 42000040 (Initialized Data, GP-Relative, Readable) 89000 800 8D000 6984,968532352,25
Entry Point
The section number (1) have the Entry Point
Information -> EntryPoint (calculated) - 62648
Code -> 48895C24084889742410574883EC20498BF88BDA488BF183FA017505E8E70400004C8BC78BD3488BCE488B5C2430488B7424
MOV QWORD PTR [RSP + 8], RBX
MOV QWORD PTR [RSP + 0X10], RSI
PUSH RDI
SUB RSP, 0X20
MOV RDI, R8
MOV EBX, EDX
MOV RSI, RCX
CMP EDX, 1
JNE 0X1021
CALL 0X1508
MOV R8, RDI
MOV EDX, EBX
MOV RCX, RSI
MOV RBX, QWORD PTR [RSP + 0X30]

Signatures
Rich Signature Analyzer:
Code -> 1A0502E75E646CB45E646CB45E646CB4571CFFB44E646CB4D9ED6FB55A646CB4D9ED68B556646CB4D9ED69B546646CB4D9ED6DB558646CB427E56DB551646CB45E646DB4AE646CB4C9ED65B54F646CB4C9ED93B45F646CB4C9ED6EB55F646CB4526963685E646CB4
Footprint md5 Hash -> EE5C188B9DE45F3B26F8747B370C2E08
• The Rich header apparently has not been modified
Certificate - Digital Signature Not Found:
• The file is not signed

Packer/Compiler
Compiler: Microsoft Visual Studio
Detect It Easy (die)
PE+(64): compiler: Microsoft Visual C/C++(-)[-]
PE+(64): linker: Microsoft Linker(14.44**)[-]
Entropy: 6.5401

Suspicious Functions
Library Function Description
KERNEL32.DLL GetModuleHandleA Retrieves a handle to the specified module.
KERNEL32.DLL ReadProcessMemory Reads data from an area of memory in a specified process.
KERNEL32.DLL GetProcAddress Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).
KERNEL32.DLL IsDebuggerPresent Determines if the calling process is being debugged by a user-mode debugger.
USER32.DLL GetAsyncKeyState Retrieves the status of a virtual key asynchronously.
File Access
api-ms-win-crt-locale-l1-1-0.dll
api-ms-win-crt-math-l1-1-0.dll
api-ms-win-crt-convert-l1-1-0.dll
api-ms-win-crt-utility-l1-1-0.dll
api-ms-win-crt-string-l1-1-0.dll
api-ms-win-crt-stdio-l1-1-0.dll
api-ms-win-crt-runtime-l1-1-0.dll
api-ms-win-crt-heap-l1-1-0.dll
VCRUNTIME140.dll
VCRUNTIME140_1.dll
dwmapi.dll
XINPUT1_4.dll
D3DCOMPILER_47.dll
IMM32.dll
MSVCP140.dll
USER32.dll
KERNEL32.dll
d3d11.dll
ntdll.dll
citizen-resources-core.dll
.dat
@.dat
imgui_log.txt
imgui.ini

File Access (UNICODE)
ntdll.dll
IdxBuffer.Dat
VtxBuffer.Dat
!g.Ini
g.Ini

Interest's Words
exec
attrib
systeminfo
replace

Interest's Words (UNICODE)
exec
start

Strings/Hex Code Found With The File Rules
Rule Type Encoding Matched (Word)
Text Ascii Anti-Analysis VM (IsDebuggerPresent)
Text Ascii Anti-Analysis VM (GetSystemInfo)
Text Ascii Stealth (GetThreadContext)
Text Ascii Stealth (SetThreadContext)
Text Ascii Stealth (ExitThread)
Text Ascii Stealth (CloseHandle)
Text Ascii Stealth (VirtualProtect)
Text Ascii Stealth (ReadProcessMemory)
Text Ascii Execution (ResumeThread)
Text Ascii Keyboard Key (Scroll)
Entry Point Hex Pattern Microsoft Visual C++ 8.0 (DLL)
Resources
Path DataRVA Size FileOffset CodeText
\24\2\1033 8C060 17D 88E60 3C3F786D6C2076657273696F6E3D27312E302720656E636F64696E673D275554462D3827207374616E64616C6F6E653D2779<?xml version='1.0' encoding='UTF-8' standalone='y
Intelligent String
• api-ms-win-crt-string-l1-1-0.dll
• api-ms-win-crt-stdio-l1-1-0.dll
• api-ms-win-crt-runtime-l1-1-0.dll
• ntdll.dll
• citizen-resources-core.dll
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imgui.h
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imgui_internal.h
• imgui.ini
• imgui_log.txt
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imgui.cpp
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imstb_rectpack.h
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imstb_truetype.h
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imgui_draw.cpp
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imgui_impl_win32.cpp
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imgui_widgets.cpp
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\imgui\imstb_textedit.h
• d3d11.dll
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\include\nlohmann\json.hpp
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\TextEditor.h
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\ImGui DirectX 11 Kiero Hook\TextEditor.cpp
• dump
• C:\Users\Fragment-MLXUTR\Downloads\FiveM Executor\x64\Release\d3d10.pdb
• .tls
• .bss
• KERNEL32.dll
• USER32.dll
• D3DCOMPILER_47.dll
• dwmapi.dll
• VCRUNTIME140_1.dll
• VCRUNTIME140.dll
• 6_initterm7_initterm_eapi-ms-win-crt-heap-l1-1-0.dll
• api-ms-win-crt-utility-l1-1-0.dll
• api-ms-win-crt-convert-l1-1-0.dll
• api-ms-win-crt-math-l1-1-0.dll
• api-ms-win-crt-locale-l1-1-0.dll

Flow Anomalies
Offset RVA Section Description
484 N/A .text CALL QWORD PTR [RIP+0x65456]
4DD N/A .text CALL QWORD PTR [RIP+0x6540D]
51F N/A .text JMP QWORD PTR [RIP+0x653CB]
5A4 N/A .text CALL QWORD PTR [RIP+0x65336]
5E4 N/A .text CALL QWORD PTR [RIP+0x652F6]
60B N/A .text CALL QWORD PTR [RIP+0x6501F]
63D N/A .text CALL QWORD PTR [RIP+0x64F3D]
674 N/A .text CALL QWORD PTR [RIP+0x64E9E]
851 N/A .text CALL QWORD PTR [RIP+0x65179]
9FB N/A .text CALL QWORD PTR [RIP+0x64FCF]
C79 N/A .text CALL QWORD PTR [RIP+0x64D51]
D35 N/A .text CALL QWORD PTR [RIP+0x64C95]
D4B N/A .text CALL QWORD PTR [RIP+0x648DF]
DEF N/A .text CALL QWORD PTR [RIP+0x64BDB]
E5A N/A .text CALL QWORD PTR [RIP+0x64AE0]
105E N/A .text CALL QWORD PTR [RIP+0x648DC]
1083 N/A .text CALL QWORD PTR [RIP+0x648B7]
10A5 N/A .text CALL QWORD PTR [RIP+0x64895]
10C7 N/A .text CALL QWORD PTR [RIP+0x64873]
10E9 N/A .text CALL QWORD PTR [RIP+0x64851]
110B N/A .text CALL QWORD PTR [RIP+0x6482F]
112D N/A .text CALL QWORD PTR [RIP+0x6480D]
11C4 N/A .text CALL QWORD PTR [RIP+0x6488E]
171A N/A .text CALL QWORD PTR [RIP+0x64238]
1B12 N/A .text CALL QWORD PTR [RIP+0x63E28]
1B3F N/A .text CALL QWORD PTR [RIP+0x63DFB]
1BA4 N/A .text CALL QWORD PTR [RIP+0x63D96]
1BC6 N/A .text CALL QWORD PTR [RIP+0x63D74]
1BE8 N/A .text CALL QWORD PTR [RIP+0x63D52]
1CD1 N/A .text JMP QWORD PTR [RIP+0x63C81]
1CE1 N/A .text JMP QWORD PTR [RIP+0x63C59]
2213 N/A .text CALL QWORD PTR [RIP+0x63827]
23E6 N/A .text CALL QWORD PTR [RIP+0x6356C]
2408 N/A .text CALL QWORD PTR [RIP+0x6361A]
2479 N/A .text CALL QWORD PTR [RIP+0x635A9]
24EA N/A .text CALL QWORD PTR [RIP+0x63538]
2509 N/A .text CALL QWORD PTR [RIP+0x63519]
2515 N/A .text CALL QWORD PTR [RIP+0x63545]
2538 N/A .text CALL QWORD PTR [RIP+0x63402]
2589 N/A .text CALL QWORD PTR [RIP+0x63499]
25CA N/A .text CALL QWORD PTR [RIP+0x634A8]
25E6 N/A .text CALL QWORD PTR [RIP+0x6349C]
25F7 N/A .text CALL QWORD PTR [RIP+0x6347B]
2611 N/A .text CALL QWORD PTR [RIP+0x63471]
2636 N/A .text CALL QWORD PTR [RIP+0x6331C]
2652 N/A .text CALL QWORD PTR [RIP+0x633F0]
2660 N/A .text CALL QWORD PTR [RIP+0x6341A]
267B N/A .text CALL QWORD PTR [RIP+0x632BF]
2683 N/A .text CALL QWORD PTR [RIP+0x633F7]
2699 N/A .text CALL QWORD PTR [RIP+0x633E1]
2C15 N/A .text CALL QWORD PTR [RIP+0x62E0D]
2CB7 N/A .text CALL QWORD PTR [RIP+0x62D6B]
2D6E N/A .text CALL QWORD PTR [RIP+0x62CB4]
2DC7 N/A .text CALL QWORD PTR [RIP+0x62CD3]
2DE0 N/A .text CALL QWORD PTR [RIP+0x62CBA]
2E04 N/A .text CALL QWORD PTR [RIP+0x62C96]
2E0F N/A .text CALL QWORD PTR [RIP+0x62C8B]
2E50 N/A .text CALL QWORD PTR [RIP+0x62C4A]
2E68 N/A .text CALL QWORD PTR [RIP+0x62C32]
2E8A N/A .text CALL QWORD PTR [RIP+0x62C10]
2E95 N/A .text CALL QWORD PTR [RIP+0x62C05]
2FC8 N/A .text CALL QWORD PTR [RIP+0x62A5A]
2FFC N/A .text CALL QWORD PTR [RIP+0x62A26]
30A2 N/A .text CALL QWORD PTR [RIP+0x62998]
3131 N/A .text CALL QWORD PTR [RIP+0x628F1]
3166 N/A .text CALL QWORD PTR [RIP+0x628D4]
331D N/A .text CALL QWORD PTR [RIP+0x62705]
334E N/A .text CALL QWORD PTR [RIP+0x626D4]
336E N/A .text CALL QWORD PTR [RIP+0x626B4]
36AF N/A .text CALL QWORD PTR [RIP+0x62373]
36E0 N/A .text CALL QWORD PTR [RIP+0x62342]
3700 N/A .text CALL QWORD PTR [RIP+0x62322]
382C N/A .text CALL QWORD PTR [RIP+0x621F6]
385D N/A .text CALL QWORD PTR [RIP+0x621C5]
387D N/A .text CALL QWORD PTR [RIP+0x621A5]
42E4 N/A .text CALL QWORD PTR [RIP+0x6173E]
484F N/A .text CALL QWORD PTR [RIP+0x611D3]
486F N/A .text CALL QWORD PTR [RIP+0x611B3]
4C70 N/A .text CALL QWORD PTR [RIP+0x60CE2]
4D6A N/A .text CALL QWORD PTR [RIP+0x60CB8]
4F47 N/A .text CALL QWORD PTR [RIP+0x609F3]
4F6C N/A .text CALL QWORD PTR [RIP+0x609CE]
4F91 N/A .text CALL QWORD PTR [RIP+0x609A9]
4FB6 N/A .text CALL QWORD PTR [RIP+0x60984]
4FDB N/A .text CALL QWORD PTR [RIP+0x6095F]
5031 N/A .text CALL QWORD PTR [RIP+0x609F1]
5051 N/A .text CALL QWORD PTR [RIP+0x608E9]
5084 N/A .text CALL QWORD PTR [RIP+0x6099E]
50A9 N/A .text CALL QWORD PTR [RIP+0x60891]
50E3 N/A .text CALL QWORD PTR [RIP+0x60857]
5108 N/A .text CALL QWORD PTR [RIP+0x60832]
513A N/A .text CALL QWORD PTR [RIP+0x60800]
518D N/A .text CALL QWORD PTR [RIP+0x60895]
5210 N/A .text CALL QWORD PTR [RIP+0x60812]
5304 N/A .text CALL QWORD PTR [RIP+0x60636]
5342 N/A .text CALL QWORD PTR [RIP+0x605F8]
5374 N/A .text CALL QWORD PTR [RIP+0x605C6]
53A6 N/A .text CALL QWORD PTR [RIP+0x60594]
53D8 N/A .text CALL QWORD PTR [RIP+0x60562]
540A N/A .text CALL QWORD PTR [RIP+0x60530]
83E00 1030 .pdata ExceptionHook | Pointer to 1030 - 0x430 .text + UnwindInfo: .rdata
83E0C 1060 .pdata ExceptionHook | Pointer to 1060 - 0x460 .text + UnwindInfo: .rdata
83E18 10C0 .pdata ExceptionHook | Pointer to 10C0 - 0x4C0 .text + UnwindInfo: .rdata
83E24 1160 .pdata ExceptionHook | Pointer to 1160 - 0x560 .text + UnwindInfo: .rdata
83E30 1180 .pdata ExceptionHook | Pointer to 1180 - 0x580 .text + UnwindInfo: .rdata
83E3C 11C0 .pdata ExceptionHook | Pointer to 11C0 - 0x5C0 .text + UnwindInfo: .rdata
83E48 1200 .pdata ExceptionHook | Pointer to 1200 - 0x600 .text + UnwindInfo: .rdata
83E54 1220 .pdata ExceptionHook | Pointer to 1220 - 0x620 .text + UnwindInfo: .rdata
83E60 12D0 .pdata ExceptionHook | Pointer to 12D0 - 0x6D0 .text + UnwindInfo: .rdata
83E6C 13A0 .pdata ExceptionHook | Pointer to 13A0 - 0x7A0 .text + UnwindInfo: .rdata
83E78 1460 .pdata ExceptionHook | Pointer to 1460 - 0x860 .text + UnwindInfo: .rdata
83E84 14A0 .pdata ExceptionHook | Pointer to 14A0 - 0x8A0 .text + UnwindInfo: .rdata
83E90 14E0 .pdata ExceptionHook | Pointer to 14E0 - 0x8E0 .text + UnwindInfo: .rdata
83E9C 152A .pdata ExceptionHook | Pointer to 152A - 0x92A .text + UnwindInfo: .rdata
83EA8 157F .pdata ExceptionHook | Pointer to 157F - 0x97F .text + UnwindInfo: .rdata
83EB4 1590 .pdata ExceptionHook | Pointer to 1590 - 0x990 .text + UnwindInfo: .rdata
83EC0 1620 .pdata ExceptionHook | Pointer to 1620 - 0xA20 .text + UnwindInfo: .rdata
83ECC 1890 .pdata ExceptionHook | Pointer to 1890 - 0xC90 .text + UnwindInfo: .rdata
83ED8 1940 .pdata ExceptionHook | Pointer to 1940 - 0xD40 .text + UnwindInfo: .rdata
83EE4 1960 .pdata ExceptionHook | Pointer to 1960 - 0xD60 .text + UnwindInfo: .rdata
83EF0 19B0 .pdata ExceptionHook | Pointer to 19B0 - 0xDB0 .text + UnwindInfo: .rdata
83EFC 1A30 .pdata ExceptionHook | Pointer to 1A30 - 0xE30 .text + UnwindInfo: .rdata
83F08 1A70 .pdata ExceptionHook | Pointer to 1A70 - 0xE70 .text + UnwindInfo: .rdata
83F14 1C20 .pdata ExceptionHook | Pointer to 1C20 - 0x1020 .text + UnwindInfo: .rdata
83F20 1D80 .pdata ExceptionHook | Pointer to 1D80 - 0x1180 .text + UnwindInfo: .rdata
83F2C 1E60 .pdata ExceptionHook | Pointer to 1E60 - 0x1260 .text + UnwindInfo: .rdata
83F38 26F0 .pdata ExceptionHook | Pointer to 26F0 - 0x1AF0 .text + UnwindInfo: .rdata
83F44 2720 .pdata ExceptionHook | Pointer to 2720 - 0x1B20 .text + UnwindInfo: .rdata
83F50 2750 .pdata ExceptionHook | Pointer to 2750 - 0x1B50 .text + UnwindInfo: .rdata
83F5C 2780 .pdata ExceptionHook | Pointer to 2780 - 0x1B80 .text + UnwindInfo: .rdata
83F68 28F0 .pdata ExceptionHook | Pointer to 28F0 - 0x1CF0 .text + UnwindInfo: .rdata
83F74 2A50 .pdata ExceptionHook | Pointer to 2A50 - 0x1E50 .text + UnwindInfo: .rdata
83F80 2DD0 .pdata ExceptionHook | Pointer to 2DD0 - 0x21D0 .text + UnwindInfo: .rdata
83F8C 2E50 .pdata ExceptionHook | Pointer to 2E50 - 0x2250 .text + UnwindInfo: .rdata
83F98 2F00 .pdata ExceptionHook | Pointer to 2F00 - 0x2300 .text + UnwindInfo: .rdata
83FA4 3160 .pdata ExceptionHook | Pointer to 3160 - 0x2560 .text + UnwindInfo: .rdata
83FB0 3460 .pdata ExceptionHook | Pointer to 3460 - 0x2860 .text + UnwindInfo: .rdata
83FBC 3480 .pdata ExceptionHook | Pointer to 3480 - 0x2880 .text + UnwindInfo: .rdata
83FC8 35C7 .pdata ExceptionHook | Pointer to 35C7 - 0x29C7 .text + UnwindInfo: .rdata
83FD4 3690 .pdata ExceptionHook | Pointer to 3690 - 0x2A90 .text + UnwindInfo: .rdata
83FE0 3740 .pdata ExceptionHook | Pointer to 3740 - 0x2B40 .text + UnwindInfo: .rdata
83FEC 3900 .pdata ExceptionHook | Pointer to 3900 - 0x2D00 .text + UnwindInfo: .rdata
83FF8 3B20 .pdata ExceptionHook | Pointer to 3B20 - 0x2F20 .text + UnwindInfo: .rdata
84004 3C30 .pdata ExceptionHook | Pointer to 3C30 - 0x3030 .text + UnwindInfo: .rdata
84010 3C60 .pdata ExceptionHook | Pointer to 3C60 - 0x3060 .text + UnwindInfo: .rdata
8401C 3CC3 .pdata ExceptionHook | Pointer to 3CC3 - 0x30C3 .text + UnwindInfo: .rdata
84028 3CC8 .pdata ExceptionHook | Pointer to 3CC8 - 0x30C8 .text + UnwindInfo: .rdata
84034 3D80 .pdata ExceptionHook | Pointer to 3D80 - 0x3180 .text + UnwindInfo: .rdata
84040 3D96 .pdata ExceptionHook | Pointer to 3D96 - 0x3196 .text + UnwindInfo: .rdata
8404C 3DB0 .pdata ExceptionHook | Pointer to 3DB0 - 0x31B0 .text + UnwindInfo: .rdata
84058 3E5F .pdata ExceptionHook | Pointer to 3E5F - 0x325F .text + UnwindInfo: .rdata
84064 3EDB .pdata ExceptionHook | Pointer to 3EDB - 0x32DB .text + UnwindInfo: .rdata
84070 3FC9 .pdata ExceptionHook | Pointer to 3FC9 - 0x33C9 .text + UnwindInfo: .rdata
8407C 3FF3 .pdata ExceptionHook | Pointer to 3FF3 - 0x33F3 .text + UnwindInfo: .rdata
84088 4020 .pdata ExceptionHook | Pointer to 4020 - 0x3420 .text + UnwindInfo: .rdata
84094 405E .pdata ExceptionHook | Pointer to 405E - 0x345E .text + UnwindInfo: .rdata
840A0 41D6 .pdata ExceptionHook | Pointer to 41D6 - 0x35D6 .text + UnwindInfo: .rdata
840AC 420C .pdata ExceptionHook | Pointer to 420C - 0x360C .text + UnwindInfo: .rdata
840B8 43A9 .pdata ExceptionHook | Pointer to 43A9 - 0x37A9 .text + UnwindInfo: .rdata
840C4 44E0 .pdata ExceptionHook | Pointer to 44E0 - 0x38E0 .text + UnwindInfo: .rdata
840D0 4547 .pdata ExceptionHook | Pointer to 4547 - 0x3947 .text + UnwindInfo: .rdata
840DC 4579 .pdata ExceptionHook | Pointer to 4579 - 0x3979 .text + UnwindInfo: .rdata
840E8 45A0 .pdata ExceptionHook | Pointer to 45A0 - 0x39A0 .text + UnwindInfo: .rdata
840F4 45CD .pdata ExceptionHook | Pointer to 45CD - 0x39CD .text + UnwindInfo: .rdata
84100 46C5 .pdata ExceptionHook | Pointer to 46C5 - 0x3AC5 .text + UnwindInfo: .rdata
8410C 471C .pdata ExceptionHook | Pointer to 471C - 0x3B1C .text + UnwindInfo: .rdata
84118 4916 .pdata ExceptionHook | Pointer to 4916 - 0x3D16 .text + UnwindInfo: .rdata
84124 4A36 .pdata ExceptionHook | Pointer to 4A36 - 0x3E36 .text + UnwindInfo: .rdata
84130 4A60 .pdata ExceptionHook | Pointer to 4A60 - 0x3E60 .text + UnwindInfo: .rdata
8413C 4A83 .pdata ExceptionHook | Pointer to 4A83 - 0x3E83 .text + UnwindInfo: .rdata
84148 4ACD .pdata ExceptionHook | Pointer to 4ACD - 0x3ECD .text + UnwindInfo: .rdata
84154 4BF1 .pdata ExceptionHook | Pointer to 4BF1 - 0x3FF1 .text + UnwindInfo: .rdata
84160 4C10 .pdata ExceptionHook | Pointer to 4C10 - 0x4010 .text + UnwindInfo: .rdata
8416C 4D70 .pdata ExceptionHook | Pointer to 4D70 - 0x4170 .text + UnwindInfo: .rdata
84178 4FC0 .pdata ExceptionHook | Pointer to 4FC0 - 0x43C0 .text + UnwindInfo: .rdata
84184 51F0 .pdata ExceptionHook | Pointer to 51F0 - 0x45F0 .text + UnwindInfo: .rdata
84190 522B .pdata ExceptionHook | Pointer to 522B - 0x462B .text + UnwindInfo: .rdata
8419C 5247 .pdata ExceptionHook | Pointer to 5247 - 0x4647 .text + UnwindInfo: .rdata
841A8 5272 .pdata ExceptionHook | Pointer to 5272 - 0x4672 .text + UnwindInfo: .rdata
841B4 5303 .pdata ExceptionHook | Pointer to 5303 - 0x4703 .text + UnwindInfo: .rdata
841C0 542E .pdata ExceptionHook | Pointer to 542E - 0x482E .text + UnwindInfo: .rdata
841CC 5490 .pdata ExceptionHook | Pointer to 5490 - 0x4890 .text + UnwindInfo: .rdata
841D8 55B4 .pdata ExceptionHook | Pointer to 55B4 - 0x49B4 .text + UnwindInfo: .rdata
841E4 55BC .pdata ExceptionHook | Pointer to 55BC - 0x49BC .text + UnwindInfo: .rdata
841F0 55D0 .pdata ExceptionHook | Pointer to 55D0 - 0x49D0 .text + UnwindInfo: .rdata
841FC 5B20 .pdata ExceptionHook | Pointer to 5B20 - 0x4F20 .text + UnwindInfo: .rdata
84208 5BF0 .pdata ExceptionHook | Pointer to 5BF0 - 0x4FF0 .text + UnwindInfo: .rdata
84214 5D60 .pdata ExceptionHook | Pointer to 5D60 - 0x5160 .text + UnwindInfo: .rdata
84220 5DE0 .pdata ExceptionHook | Pointer to 5DE0 - 0x51E0 .text + UnwindInfo: .rdata
8422C 5EB0 .pdata ExceptionHook | Pointer to 5EB0 - 0x52B0 .text + UnwindInfo: .rdata
84238 6030 .pdata ExceptionHook | Pointer to 6030 - 0x5430 .text + UnwindInfo: .rdata
84244 6190 .pdata ExceptionHook | Pointer to 6190 - 0x5590 .text + UnwindInfo: .rdata
84250 62A0 .pdata ExceptionHook | Pointer to 62A0 - 0x56A0 .text + UnwindInfo: .rdata
8425C 63E0 .pdata ExceptionHook | Pointer to 63E0 - 0x57E0 .text + UnwindInfo: .rdata
84268 6520 .pdata ExceptionHook | Pointer to 6520 - 0x5920 .text + UnwindInfo: .rdata
84274 67B0 .pdata ExceptionHook | Pointer to 67B0 - 0x5BB0 .text + UnwindInfo: .rdata
84280 6830 .pdata ExceptionHook | Pointer to 6830 - 0x5C30 .text + UnwindInfo: .rdata
8428C 68C0 .pdata ExceptionHook | Pointer to 68C0 - 0x5CC0 .text + UnwindInfo: .rdata
84298 68E6 .pdata ExceptionHook | Pointer to 68E6 - 0x5CE6 .text + UnwindInfo: .rdata
842A4 6A2E .pdata ExceptionHook | Pointer to 6A2E - 0x5E2E .text + UnwindInfo: .rdata
Extra Analysis
Metric Value Percentage
Ascii Code 350197 62,1799%
Null Byte Code 92834 16,4833%
© 2026 All rights reserved.