6a74bf4afbd8c85ba517bdf13964d0e0d4eb91066af7c178acaa95ffaa153620

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2021-Jul-07 22:46:31
Detected languages English - United States
Debug artifacts C:\dvs\p4\build\sw\devrel\libdev\NGX\snippets\rel_2_2\source\features\dlaa\_out\wddm_amd64_release\unity_generic\nvngx_dlss.pdb
CompanyName NVIDIA
FileDescription NVIDIA DLSSv2 - DVS PRODUCTION
FileVersion 2,2,11,0
InternalName DLSSv2
LegalCopyright Copyright 2018 - 2020 NVIDIA CORP
LegalTrademarks1 All Rights Reserved
LegalTrademarks2 All Rights Reserved
OriginalFilename CL 30163314
ProductName NVIDIA Deep Learning SuperSampling
ProductVersion 2,2,11,0
NGXMinimumDriverVersion 445.0
NGXAppId 140609876
NGXGpuArchitecture NVSDK_NGX_GPU_Arch_Turing
NGXApiVersion 0x0000013

Plugin Output

Suspicious PEiD Signature: PeStubOEP v1.x
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • LoadLibraryW
  • GetProcAddress
  • LoadLibraryExW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegOpenKeyExW
  • RegCloseKey
  • RegQueryValueExW
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Info The PE is digitally signed. Signer: NVIDIA Corporation
Issuer: Symantec Class 3 SHA256 Code Signing CA - G2
Safe VirusTotal score: 0/72 (Scanned on 2026-03-05 11:44:31) All the AVs think this file is safe.

Hashes

MD5 cd3e6670719439c239f9598550707758
SHA1 605bf2515a8c763173858808e183e2514d94446f
SHA256 6a74bf4afbd8c85ba517bdf13964d0e0d4eb91066af7c178acaa95ffaa153620
SHA3 274fd2afc5462792b15c639e010a94ff010d2c30a5f2bac1508071112aa87d11
SSDeep 393216:3AQB/YTv1+LrhK1xzWs3viAQB/YTv1+LrhK1xzWs3vi:bsv1qVK1JWs/asv1qVK1JWs/i
Imports Hash cf3043f31cc6983a66cebef6206d81e9

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x128

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2021-Jul-07 22:46:31
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x88000
SizeOfInitializedData 0xd5ce00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000049EC0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x180000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xde9000
SizeOfHeaders 0x400
Checksum 0xdd29b4
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 17bbdcbb975589b8cf40af658a2c125e
SHA1 83afa048f148965ae8eba1bdf8ade860ccf554e4
SHA256 5143aa8b0aa51663a350273e6ec918f94a4e2f3fcd5089ef1c58387cc08823b7
SHA3 ec58c0026eb0a7545255292b1368f41374e34e5fea6024c7bace75c962dee7e0
VirtualSize 0x87ea2
VirtualAddress 0x1000
SizeOfRawData 0x88000
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.33581

.rdata

MD5 b20692c6170bd89585b930cf73612fb1
SHA1 193c2d7321b8f9600590a49686ba6a187ceaf830
SHA256 c5999cbda36b28d879c3909b8e4c0a21739116d92f679dd1c37a7f8cefbb8538
SHA3 32267d17a87bd46dc9354b0da3e40d852e6b31fc17a7e4abb8b4806f6a7bb90e
VirtualSize 0x2c8ce
VirtualAddress 0x89000
SizeOfRawData 0x2ca00
PointerToRawData 0x88400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.31383

.data

MD5 2b44b1ed5d39479dd9f7da9cfb50939d
SHA1 fd4b658b0da9cb955c987583d1eeda50d0defe6f
SHA256 3f94f1e57fb614b89ce0ced24c770a5b5bc80ed74861a6b75403332bb412f537
SHA3 4a0e2c65851457845db73235ab48fb7b3729df978b68fbefb6cb7d29e5c21c44
VirtualSize 0xd2773c
VirtualAddress 0xb6000
SizeOfRawData 0xd08000
PointerToRawData 0xb4e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 6.83872

.pdata

MD5 9370ee147b2664bcfd8c12adf0e2a856
SHA1 29a9c5668be0b7ec4f2889ededb9398a69b74a18
SHA256 b66ef2d67d2c964f08a9e85b15540727287ff6b0807efdeb435f2483454966fe
SHA3 30c94bdb29d22478e56806abdb6f7e1c28bdf99dc1fd9bb308e63bc2c194b01c
VirtualSize 0x6dec
VirtualAddress 0xdde000
SizeOfRawData 0x6e00
PointerToRawData 0xdbce00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.87278

.tls

MD5 1f354d76203061bfdd5a53dae48d5435
SHA1 aa0d33a0c854e073439067876e932688b65cb6a9
SHA256 4c6474903705cb450bb6434c29e8854f17d8324efca1fdb9ee9008599060883a
SHA3 991fbbd46bbd69198269fe6c247d440e0f8a7d38259b7a1e04b74790301d1d2b
VirtualSize 0x9
VirtualAddress 0xde5000
SizeOfRawData 0x200
PointerToRawData 0xdc3c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.0203931

.rsrc

MD5 aa8047c16c9ea53a3c2dd3dd98c97abf
SHA1 7a26332311a98177503479eeeb521e8ca5d8ca7c
SHA256 d97f63094c4aaead8427e9e2d6e4e834a3b2ad6ce734bd3654cf2e0c2d90ddaa
SHA3 65fbb80371a168532c48b7acdf22b3a3d5d206240954137a677edaaf6ed7d660
VirtualSize 0x528
VirtualAddress 0xde6000
SizeOfRawData 0x600
PointerToRawData 0xdc3e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.06158

.reloc

MD5 2f2d9878dd5632d7abd1b5aa291b7dc6
SHA1 a112eb031c6239eae61af26aec8f2f7a336e185a
SHA256 52c9d6f28d291e76a2e4658ffff102f5f01a0a2a1fc8459f1dde55a229ed7955
SHA3 1f0ba99284ea33707be33ae4b0f70ddf6f3cceb897c2462cb53fceec62dd496d
VirtualSize 0x157c
VirtualAddress 0xde7000
SizeOfRawData 0x1600
PointerToRawData 0xdc4400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.42378

Imports

ADVAPI32.dll RegOpenKeyExW
RegCloseKey
RegQueryValueExW
KERNEL32.dll SetEndOfFile
WriteConsoleW
MultiByteToWideChar
WideCharToMultiByte
SetLastError
GetModuleFileNameW
LocalAlloc
CreateFileW
GetFileAttributesW
GetSystemDirectoryW
GetModuleHandleExA
GetLastError
CloseHandle
LoadLibraryW
GetProcAddress
LocalFree
VerSetConditionMask
GetModuleHandleW
FreeLibrary
VerifyVersionInfoW
LoadLibraryExW
GetStdHandle
WriteConsoleA
OutputDebugStringA
GetCurrentProcessId
Sleep
EnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
QueryPerformanceFrequency
EncodePointer
DecodePointer
GetCPInfo
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetStringTypeW
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlPcToFileHeader
RaiseException
RtlUnwindEx
GetFileType
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetACP
SetStdHandle
ReadFile
GetConsoleMode
ReadConsoleW
FlushFileBuffers
WriteFile
GetConsoleCP
GetDateFormatW
GetTimeFormatW
SetFilePointerEx
HeapSize
GetTimeZoneInformation
GetProcessHeap
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA

Delayed Imports

NGX_SNIPPETS_GetRequiredDriverSupport

Ordinal 1
Address 0x32f20

NVSDK_NGX_D3D11_CreateFeature

Ordinal 2
Address 0xc4f0

NVSDK_NGX_D3D11_EvaluateFeature

Ordinal 3
Address 0xc520

NVSDK_NGX_D3D11_GetScratchBufferSize

Ordinal 4
Address 0xc4d0

NVSDK_NGX_D3D11_Init

Ordinal 5
Address 0xc280

NVSDK_NGX_D3D11_Init_Ext

Ordinal 6
Address 0xc390

NVSDK_NGX_D3D11_PopulateParameters_Impl

Ordinal 7
Address 0xc550

NVSDK_NGX_D3D11_ReleaseFeature

Ordinal 8
Address 0xc510

NVSDK_NGX_D3D11_Shutdown

Ordinal 9
Address 0xc4b0

NVSDK_NGX_D3D11_Shutdown1

Ordinal 10
Address 0xc4c0

NVSDK_NGX_D3D12_CreateFeature

Ordinal 11
Address 0xe6c0

NVSDK_NGX_D3D12_EvaluateFeature

Ordinal 12
Address 0xe6f0

NVSDK_NGX_D3D12_GetScratchBufferSize

Ordinal 13
Address 0xc4d0

NVSDK_NGX_D3D12_Init

Ordinal 14
Address 0xe470

NVSDK_NGX_D3D12_Init_Ext

Ordinal 15
Address 0xe580

NVSDK_NGX_D3D12_PopulateParameters_Impl

Ordinal 16
Address 0xe720

NVSDK_NGX_D3D12_ReleaseFeature

Ordinal 17
Address 0xe6e0

NVSDK_NGX_D3D12_Shutdown

Ordinal 18
Address 0xe6a0

NVSDK_NGX_D3D12_Shutdown1

Ordinal 19
Address 0xe6b0

NVSDK_NGX_GetAPIVersion

Ordinal 20
Address 0x32e70

NVSDK_NGX_GetApplicationId

Ordinal 21
Address 0x32f10

NVSDK_NGX_GetDriverVersion

Ordinal 22
Address 0x32ea0

NVSDK_NGX_GetDriverVersionEx

Ordinal 23
Address 0x32eb0

NVSDK_NGX_GetGPUArchitecture

Ordinal 24
Address 0x32e60

NVSDK_NGX_GetSnippetVersion

Ordinal 25
Address 0x32e80

NVSDK_NGX_SetInfoCallback

Ordinal 26
Address 0x32e90

NVSDK_NGX_SetTelemetryCallback

Ordinal 27
Address 0x10010

NVSDK_NGX_VULKAN_CreateFeature

Ordinal 28
Address 0x34510

NVSDK_NGX_VULKAN_CreateFeature1

Ordinal 29
Address 0x34530

NVSDK_NGX_VULKAN_EvaluateFeature

Ordinal 30
Address 0x34550

NVSDK_NGX_VULKAN_GetScratchBufferSize

Ordinal 31
Address 0xc4d0

NVSDK_NGX_VULKAN_Init

Ordinal 32
Address 0x34270

NVSDK_NGX_VULKAN_Init_Ext

Ordinal 33
Address 0x343a0

NVSDK_NGX_VULKAN_PopulateParameters_Impl

Ordinal 34
Address 0x34580

NVSDK_NGX_VULKAN_ReleaseFeature

Ordinal 35
Address 0x34540

NVSDK_NGX_VULKAN_Shutdown

Ordinal 36
Address 0x344f0

NVSDK_NGX_VULKAN_Shutdown1

Ordinal 37
Address 0x34500

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x4c8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.53683
MD5 825e3647f4d632bf78f9708b9e41328a
SHA1 bc5c6851ecb365842c39c247917023929e82f0ed
SHA256 fb631c0d73c42dd3a82c43f2e03c2a265a0b80d32c982036199c932b892a93db
SHA3 53acc729d693a082b13b8a6c861113b0bd1961f16485f6e194a7b099f7103c5d

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 2.2.11.0
ProductVersion 2.2.11.0
FileFlags (EMPTY)
FileOs (EMPTY)
FileType VFT_UNKNOWN
Language English - United States
CompanyName NVIDIA
FileDescription NVIDIA DLSSv2 - DVS PRODUCTION
FileVersion (#2) 2,2,11,0
InternalName DLSSv2
LegalCopyright Copyright 2018 - 2020 NVIDIA CORP
LegalTrademarks1 All Rights Reserved
LegalTrademarks2 All Rights Reserved
OriginalFilename CL 30163314
ProductName NVIDIA Deep Learning SuperSampling
ProductVersion (#2) 2,2,11,0
NGXMinimumDriverVersion 445.0
NGXAppId 140609876
NGXGpuArchitecture NVSDK_NGX_GPU_Arch_Turing
NGXApiVersion 0x0000013
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2021-Jul-07 22:46:31
Version 0.0
SizeofData 152
AddressOfRawData 0xaa264
PointerToRawData 0xa9664
Referenced File C:\dvs\p4\build\sw\devrel\libdev\NGX\snippets\rel_2_2\source\features\dlaa\_out\wddm_amd64_release\unity_generic\nvngx_dlss.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2021-Jul-07 22:46:31
Version 0.0
SizeofData 20
AddressOfRawData 0xaa2fc
PointerToRawData 0xa96fc

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2021-Jul-07 22:46:31
Version 0.0
SizeofData 960
AddressOfRawData 0xaa310
PointerToRawData 0xa9710

TLS Callbacks

StartAddressOfRawData 0x180de5000
EndAddressOfRawData 0x180de5008
AddressOfIndex 0x180dc2ffc
AddressOfCallbacks 0x180089558
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x94
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1800b7cf0
GuardCFCheckFunctionPointer 6443013136
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

XOR Key 0x3e78423d
Unmarked objects 0
241 (40116) 11
243 (40116) 170
242 (40116) 31
ASM objects (VS2015 UPD3 build 24123) 8
C++ objects (VS2015 UPD3 build 24123) 109
C objects (VS2015 UPD3 build 24123) 37
173 (VS2010 build 30319) 1
C++ objects (VS2008 SP1 build 30729) 1
C objects (VS2008 SP1 build 30729) 1
Imports (VS2017 v15.?.? build 25203) 7
Total imports 160
C++ objects (LTCG) (VS2015 UPD3 build 24210) 31
Exports (VS2015 UPD3 build 24210) 1
Resource objects (VS2015 UPD3 build 24210) 1
Linker (VS2015 UPD3 build 24210) 1

Errors

Leave a comment

No comments yet.