filename | crackme13_p.exe | |
---|---|---|
size | 139860 (0x22254) | |
md5 | 301a281acf36c4b5c27de81280b4ffa5 | |
type | MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS | |
mimetype | application/x-dosexec | |
clamav | OK | |
virustotal | → scan with virustotal.com | |
histogram |
MZ Header
signature | MZ |
bytes_in_last_block | 0x40 |
blocks_in_file | 1 |
num_relocs | 0 |
header_paragraphs | 2 |
min_extra_paragraphs | 4 |
max_extra_paragraphs | 0xffff |
ss | 2 |
sp | 0x40 |
checksum | 0 |
ip | 0xe |
cs | 0 |
reloc_table_offset | 0x1c |
overlay_number | 0 |
reserved0 | 0x336e695700000000 |
oem_id | 0x2032 |
oem_info | 0x6e6f |
reserved2 | 0xd21796c |
reserved3 | 0xb40e240a |
reserved4 | 0xba09 |
reserved5 | 0xb821cd1f |
reserved6 | 0x21cd4c01 |
lfanew | 0x40 |
PE Header
Packer / Compiler
This file is packed with UPX. Analysis will be incomplete without unpacking. |
Sections
name | va | vsize | raw size | flags | |
---|---|---|---|---|---|
je | 0x1000 | 0xc000 | 0 | --- IDATA | |
text | 0xd000 | 0x20000 | 0x1fc00 | RW- IDATA | |
sos | 0x2d000 | 0x3000 | 0x2339 | --- IDATA | |
lookhere | 0x30000 | 0x1000 | 0x7c | --- IDATA |
Data Directory
type | va | size | |
---|---|---|---|
EXPORT | 0 | 0 | |
IMPORT | 0x30000 | 0x50 | |
RESOURCE | 0x2d000 | 0x229c | |
EXCEPTION | 0 | 0 | |
SECURITY | 0 | 0 | |
BASERELOC | 0 | 0 | |
DEBUG | 0 | 0 | |
ARCHITECTURE | 0 | 0 | |
GLOBALPTR | 0 | 0 | |
TLS | 0 | 0 | |
LOAD_CONFIG | 0 | 0 | |
Bound_IAT | 0 | 0 | |
IAT | 0 | 0 | |
Delay_IAT | 0 | 0 | |
CLR_Header | 0 | 0 |
type | name | size | cp | r | |
---|---|---|---|---|---|
#30001 | #0 | 2216 | 1200 | 0 | |
#30002 | #0 | 3240 | 1200 | 0 | |
#30003 | #0 | 1108496171 | 0 | 65536 | |
#30004 | #1 / #1 | 1108496171 | 0 | 262144 | |
#30004 | #1 / #1 | 4294082815 | 2415850120 | 4069981938 |
module_name | hint | ord | function_name |
---|
Scanning the drive for archives: 1 file, 139860 bytes (137 KiB) Errors: 1
Please donate some bucks to keep this site up and running: | |
Ko-fi | |
---|---|
Yandex.Money | |
Thank you! |
[!] PEdump::IMAGE_RESOURCE_DIRECTORY: loop3 detected at file pos 130576
[?] can't find file_offset of VA 0x0
[?] can't find file_offset of VA 0xf1779c92