Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SYSSE.BIN #3

Open
Aeonitis opened this issue Jul 10, 2022 · 0 comments
Open

SYSSE.BIN #3

Aeonitis opened this issue Jul 10, 2022 · 0 comments
Labels
focus on file This is to focus reverse engineering discussion on each specific file.

Comments

@Aeonitis
Copy link
Owner

Aeonitis commented Jul 10, 2022

Project File Name: SYS SE.BIN
Readonly: false
Program Name: SYS SE.BIN
Language ID: SuperH:BE:32:SH-2 (1.0)
Compiler ID: default
Processor: SuperH
Endian: Big
Address Size: 32
Minimum Address: 00000000
Maximum Address: 00001c17
No. of Bytes: 7192
No. of Memory Blocks: 1
No. of Instructions: 0
No. of Defined Data: 0
No. of Functions: 0
No. of Symbols: 0
No. of Data Types: 0
No. of Data Type Categories: 1
Created With Ghidra Version:10.1.4

Executable Format: Raw Binary
Executable MD5: 5d18eef9ed14fec8c916c3ea39c36eb8
Executable SHA256: c3474472b9ebb76343d3d2eff7fc8b103d2e71d4aa950851a0745c0696637510

@Aeonitis Aeonitis added the focus on file This is to focus reverse engineering discussion on each specific file. label Jul 10, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
focus on file This is to focus reverse engineering discussion on each specific file.
Projects
None yet
Development

No branches or pull requests

1 participant