c83e022667f1b5cdcde8bacd4374a45f

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2012-Oct-02 05:04:04
Detected languages English - United States
Comments This installation was built with Inno Setup.
CompanyName
FileDescription ELDEN RING Shadow of the Erdtree Update v1.16 Setup
FileVersion
LegalCopyright
ProductName ELDEN RING Shadow of the Erdtree Update v1.16
ProductVersion

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Looks for Qemu presence:
  • qeMu
Contains domain names:
  • bandcamp.com
  • http://ogresound.bandcamp.com
  • ogresound.bandcamp.com
Suspicious The PE is possibly packed. Unusual section name found: .itext
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • GetProcAddress
  • LoadLibraryW
Can access the registry:
  • RegQueryValueExW
  • RegOpenKeyExW
  • RegCloseKey
Possibly launches other programs:
  • CreateProcessW
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
Can shut the system down or lock the screen:
  • ExitWindowsEx
Suspicious The file contains overlay data. 8967311 bytes of data starting at offset 0x25600.
The overlay data has an entropy of 7.94604 and is possibly compressed or encrypted.
Overlay data amounts for 98.3215% of the executable.
Malicious VirusTotal score: 30/72 (Scanned on 2025-04-06 08:09:03) AVG: FileRepMalware [Misc]
Avast: FileRepMalware [Misc]
Avira: TR/AVI.Agent.ksyhu
Bkav: W32.Common.A16EBD76
CAT-QuickHeal: Trojan.Ghanarava.174383755074a45f
CTX: exe.trojan.crack
CrowdStrike: win/grayware_confidence_90% (W)
Cylance: Unsafe
Cynet: Malicious (score: 99)
DeepInstinct: MALICIOUS
ESET-NOD32: a variant of Win32/HackTool.Crack.ES potentially unsafe
Elastic: malicious (moderate confidence)
F-Secure: Trojan.TR/AVI.Agent.ksyhu
Fortinet: Riskware/Crack
Google: Detected
K7AntiVirus: Unwanted-Program ( 005146181 )
K7GW: Unwanted-Program ( 005146181 )
Lionic: Trojan.Win32.Crack.4!c
Malwarebytes: RiskWare.Crack
MaxSecure: Trojan.Malware.7164915.susgen
McAfee: Artemis!C83E022667F1
Microsoft: Trojan:Win32/Pomal!rfn
Paloalto: generic.ml
Sangfor: Trojan.Win32.Crack.V413
Sophos: Generic Reputation PUA (PUA)
Symantec: Trojan.Gen.MBT
TrendMicro-HouseCall: TROJ_GEN.R002H01KM24
Varist: W32/ABTrojan.XBLH-4895
Webroot: W32.Hacktool.Crack
alibabacloud: HackTool:Win/Crack.EB

Hashes

MD5 c83e022667f1b5cdcde8bacd4374a45f
SHA1 bfed4d931582a883f7ac793d5db36096593193cd
SHA256 e4f85d603ed0199eb63f59c9e02a34ad3271a13cb829b1229ba244e0cc252f6d
SHA3 98ee9d0e09baf9556fe5c0e770461af804d51238b05f04486725de1dba1ba00d
SSDeep 196608:rPjgxUVgTMUqraAXz20gxDzbN4lAyL+eFfOiztS9GFUN:zyZWaiiDLyxd5M9b
Imports Hash 9d8fb47598991ad8c0094898c32a6c3b

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 8
TimeDateStamp 2012-Oct-02 05:04:04
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0x15000
SizeOfInitializedData 0x10200
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00016478 (Section: .itext)
BaseOfCode 0x1000
BaseOfData 0x17000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.0
ImageVersion 6.0
SubsystemVersion 5.0
Win32VersionValue 0
SizeOfImage 0x30000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 345db2b6911addc85b53f32245f969a0
SHA1 0816ead74f84da89b3a6af4ee4e67e409c055459
SHA256 51b3d2adbf99a2341e26557e8de8b91e6a0874da2a4f9ff94d47d46a2dc87453
SHA3 15b306a304d51bb25bb361a63918eb1ddd66eb6fac5207baa12914dbb8fdcc93
VirtualSize 0x143f8
VirtualAddress 0x1000
SizeOfRawData 0x14400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.4822

.itext

MD5 2e74d968caedeb2d71b9505530d43907
SHA1 5fcb2b9b02cf13f4fbf445a1b98ef88f074dbf68
SHA256 3b8304273c6c60258c0893d9d2731268486afbf0faacbf65be18aa327ae2428b
SHA3 fa13c6a3e4a68b0cb3ca0cd034f920d30dc2c8a35e9e2d088612f122c9dd4562
VirtualSize 0xbe8
VirtualAddress 0x16000
SizeOfRawData 0xc00
PointerToRawData 0x14800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.01516

.data

MD5 d5b22eff9e08edaa95f493c1a71158c0
SHA1 6f2aff1b87c311ecfcd609b3b4588e75af4484d2
SHA256 d5723b90d6c0cb4ff31cebb81d0ee0b6da28fe0a923ceb54ad107bad22c84ab6
SHA3 bb0853ebda8aabaf2fcd4cb93236a57f56435a19f1b111ec42eacc9fb7e98420
VirtualSize 0xd9c
VirtualAddress 0x17000
SizeOfRawData 0xe00
PointerToRawData 0x15400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.66929

.bss

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x5750
VirtualAddress 0x18000
SizeOfRawData 0
PointerToRawData 0x16200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.idata

MD5 b47eaca4c149ee829de76a342b5560d5
SHA1 56a0ec8ac42ef35b0ee132508701868d83befc42
SHA256 1ea5a02fe0fde79fdd2d25e4a9b685d18118b74dcc53bbba9d54df63a6fd53c0
SHA3 a6c4a3115f9b16fd917a83f2157a158c28362886cd7414b31f05d345ab308a17
VirtualSize 0xf9e
VirtualAddress 0x1e000
SizeOfRawData 0x1000
PointerToRawData 0x16200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.96778

.tls

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x8
VirtualAddress 0x1f000
SizeOfRawData 0
PointerToRawData 0x17200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 3746f5876803f8f30db5bb2deb8772ae
SHA1 65e8dad930c8c32d40ca9aff4890630f20d87074
SHA256 9c8a4b346c5df43a9f90f5d15227c2dea3e7dfabfbe8402bcba85c3b2e9c84ae
SHA3 956c3695e53f796282349fc0b391c557d3f9bef6abb0d58045dacccc70b3a4cf
VirtualSize 0x18
VirtualAddress 0x20000
SizeOfRawData 0x200
PointerToRawData 0x17200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.190489

.rsrc

MD5 5ab6857c1649834fd02232e86a53e1ec
SHA1 f6cf2401b07680115238f37b524501d7b7a33b2b
SHA256 6cc614f5ac34dfce1f912c363a0c2d55649d61468271f838b8fc4db07e49847d
SHA3 70d5ff8b7d64ea6db0c974f2de578f009672a8d2b961ee8c6bd21bd81f137dd8
VirtualSize 0xe134
VirtualAddress 0x21000
SizeOfRawData 0xe200
PointerToRawData 0x17400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.75019

Imports

oleaut32.dll SysFreeString
SysReAllocStringLen
SysAllocStringLen
advapi32.dll RegQueryValueExW
RegOpenKeyExW
RegCloseKey
user32.dll GetKeyboardType
LoadStringW
MessageBoxA
CharNextW
kernel32.dll GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
CloseHandle
kernel32.dll (#2) GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
CloseHandle
user32.dll (#2) GetKeyboardType
LoadStringW
MessageBoxA
CharNextW
kernel32.dll (#3) GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
CloseHandle
advapi32.dll (#2) RegQueryValueExW
RegOpenKeyExW
RegCloseKey
comctl32.dll InitCommonControls
kernel32.dll (#4) GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
CloseHandle
advapi32.dll (#3) RegQueryValueExW
RegOpenKeyExW
RegCloseKey
oleaut32.dll (#2) SysFreeString
SysReAllocStringLen
SysAllocStringLen

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.54932
MD5 817b945f44ed585e0a60b5adfd30b29b
SHA1 e78c58edcfd78024b10af5192952372a347ad6cf
SHA256 c06a4cc6f513d73dc82aa52e5b5f2f35d344827ea3555294c90d5c509b4da656
SHA3 8bf52cd5625e394278d17b417594f1a578f4f9b85ca808d62b69976cb29081ef

4091

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0xc4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.13038
MD5 d2772bcc007d8465cf41352da64ed008
SHA1 3cb80c1ec7e649f89f425b6d7fdd11dd5333e052
SHA256 57fbdcb9b1d61d1269f5e9bc3e4f325029bd89778123d7703251761eebe26dea
SHA3 28c495a2cc8d92c07ea21db55f8e6ea142d60465f042d175b590db37884f5eb4

4092

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0xcc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.36196
MD5 1bb1699f3e79a261a1cb71a60a1ace7c
SHA1 268f9a2602e1187b881d96db521e82c8d051d656
SHA256 a073bc06540956a93a3ef6eaa7d558de6f92de721edd29d6a93551a0fab23c08
SHA3 a0d833ced8297a2d82be5b80dd79fa9f61b84033377016f4c588ff2cfc168cf9

4093

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x174
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.34841
MD5 b6bedb71d6a6fa5215e4afdd1e983bdc
SHA1 7541a76c3ab32506ab00c3ab56076bf01532b267
SHA256 203e2c213958348f4911dd2e3188ea694f7d1d97f9ea9a82f89f5ee7af8c9607
SHA3 3ad5273f1d88b58db23b17b0ecd52f1280b9c279f64aad4404f5487b5d8f264e

4094

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x39c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.29351
MD5 0b1533b447231c6319c4a10d84508e60
SHA1 f5477d91942bfe92a5dc3c46897a66fb663a124f
SHA256 6fa3bbc46b4cc3a979f4ebfc293c50453912eb51ef76d2ea3c7d3d86d7223e86
SHA3 aed1581927a66228d158a903e015bdfa9a12e44865ff24c991ba8e2c1a9de8c1

4095

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x34c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.34579
MD5 2596d19a6b88cbba9c9c9cb003affbc6
SHA1 37091a716fd1eed000e0c3bb195fbd589a750608
SHA256 7f63f3f944a0b62f8f3b35a60141081599f7f175605ced7e1b4dcb80fda58c8a
SHA3 0b2581dd0c1b08d882b1f4c4014652d2e7d046d95aa3df236690e9d22572b27c

4096

Type RT_STRING
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x294
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.28057
MD5 1f9009e4d5b61392e05aa8ac6eceb6aa
SHA1 4af6f3144fff0951da37370a3d200e8d74fc4862
SHA256 cb21f2b28bfc6b8046348c7a96bf97149dc5f91e1cc1a4f2904a1044a008425a
SHA3 c1aebde06ed543947facd67a9541283cbec74e559e267c1b84c168a2bf839812

CHARTABLE

Type RT_RCDATA
Language English - United States
Codepage Latin 1 / Western European
Size 0x82e8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.5072
MD5 6e9c1c8c0a0ec8d73165779560cd7ba4
SHA1 d044c45e2ffd24e1abef00079577df385e325ab4
SHA256 677245e2a6b2eb5495b4965b8c26025a4b26e8b8c21a825f658cb390b493b9a0
SHA3 3ec7819e8561ecad66b1ef2652d4f3b275030f7cf402f276daa38f28d288e4e7

DVCLAL

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4
MD5 d8090aba7197fbf9c7e2631c750965a8
SHA1 04f73efb0801b18f6984b14cd057fb56519cd31b
SHA256 88d14cc6638af8a0836f6d868dfab60df92907a2d7becaefbbd7e007acb75610
SHA3 a5a67ad8166061d38fc75cfb2c227911de631166c6531a6664cd49cfb207e8bb

PACKAGEINFO

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x1b0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.33025
MD5 b63242cacf6f441ebb5ab74da1376aa8
SHA1 cc018125166de149a2f781136d768cde547bf6ae
SHA256 c23c1472182122868d06e9efec4ce4ae9a1c2cf2e72aa2b8a5a7b0c6f221f86f
SHA3 bc3ee2273ea111b4af0521bb72c8a7869c2210806d3e7464168672f9c9803bcd

11111

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x2c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.65899
MD5 d3b26ad8bf843ce70fdf74e72dcfd5cc
SHA1 b014542a6a952546ea22be8b860fe5485597ef74
SHA256 62399b31741034c170b236cf424eb45b2593200b1f815a6ee142b617ad7eb821
SHA3 89350845315a46bcd17b94d0ce545c1180734dec44317f3e131bcd1fc8374ce8

MAINICON

Type RT_GROUP_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.91924
Detected Filetype Icon file
MD5 3e1d980f0dc747eec9d946c155cb1498
SHA1 15414ced0202f709d400c957d441a8856dde8479
SHA256 027e12c81d53ebb492d0e1ce8166c0c004e135274105fb79465b6b97bc6c71cd
SHA3 11e83c27ff3b8cca2c537273338202138c94fb4b10a6b2daf0f7d23d177cc049

1 (#2)

Type RT_VERSION
Language English - United States
Codepage Latin 1 / Western European
Size 0x4b8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.8037
MD5 9906b2e4d86b460a07b6a85534ec48a1
SHA1 ea24000f04ec018a1bc7485dcdb97010c52498c4
SHA256 abe67584ef418116004012a9c15dadf6fe16e6a4a6fd6a680f328711052da4bf
SHA3 abb12734e5d1fa1cb0926534d431d3ddc8d359c153127037dc9bb773e341a77f

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage Latin 1 / Western European
Size 0x560
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.06505
MD5 a55a7d7c9ff1dedb9adde63011baa3dd
SHA1 292e1726ad2fb93963565934fd3778a46f91ecf9
SHA256 2cf04736815666b1c1b91422e56e0a431c9e03075b7f543325fd16b88cff1b9e
SHA3 9e3955461fcb3b2d303ad2a473b4f1c4012a882a3e303ba6e7b0170fbb09819e

String Table contents

Thu
Fri
Sat
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Invalid file name - %s
January
February
March
April
May
June
July
August
September
October
November
December
Sun
Mon
Tue
Wed
Monitor support function not initialized
%s (%s, line %d)
Abstract Error
Access violation at address %p in module '%s'. %s of address %p
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Variant or safe array is locked
Invalid variant type conversion
Invalid variant operation
Invalid variant operation (%s%.8x)
%s
Could not convert variant of type (%s) into type (%s)
Overflow while converting variant of type (%s) into type (%s)
Variant overflow
Invalid argument
Invalid variant type
Operation not supported
Unexpected variant error
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
Object lock not owned
Invalid class typecast
Access violation at address %p. %s of address %p
Access violation
Stack overflow
Control-C hit
Privileged instruction
Operation aborted
Exception %s in module %s at %p.
%s%s
Application Error
Format '%s' invalid or incompatible with argument
No argument for format '%s'
Variant method calls not supported
Read
Write
Error creating variant or safe array
Variant or safe array index out of bounds
Out of memory
I/O error %d
File not found
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow
Invalid floating point operation
Floating point division by zero
Floating point overflow
Floating point underflow
Invalid pointer operation

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 0.0.0.0
ProductVersion 0.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments This installation was built with Inno Setup.
CompanyName
FileDescription ELDEN RING Shadow of the Erdtree Update v1.16 Setup
FileVersion (#2)
LegalCopyright
ProductName ELDEN RING Shadow of the Erdtree Update v1.16
ProductVersion (#2)
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x41f000
EndAddressOfRawData 0x41f008
AddressOfIndex 0x4177b4
AddressOfCallbacks 0x420010
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Section .bss has a size of 0! [*] Warning: Section .tls has a size of 0!