An analyst is performing static analysis on a suspected malicious executable.Which of the following activities would they most likely perform during this phase?