985944dee86ab81368698d5b0b2b9fbc82be0daf983b20048284941611fe3ce6

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2017-May-30 12:40:39
Detected languages English - United States
Debug artifacts C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\player_win_x86.pdb
FileVersion 5.5.4.9436430
ProductVersion 5.5.4.9436430
Unity Version 5.5.4f1_8ffd0efd98b1

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ v6.0 DLL
Microsoft Visual C++ 6.0 - 8.0
Microsoft Visual C++
Microsoft Visual C++ v6.0
Suspicious PEiD Signature: Crunch 4
Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to system / monitoring tools:
  • rundll32.exe
Contains references to internet browsers:
  • firefox.exe
  • iexplore.exe
Tries to detect virtualized environments:
  • HARDWARE\DESCRIPTION\System
  • b3 eb 36 e4 4f 52 ce 11 9f 53 00 20 af 0b a7 70
Looks for VMWare presence:
  • VMWare
Accesses the WMI:
  • root\cimv2
Contains domain names:
  • api.uca.cloud.unity3d.com
  • cdp.cloud.unity3d.com
  • cloud.unity3d.com
  • config.uca.cloud.unity3d.com
  • connectiontester.unity3d.com
  • connectiontesterbeta.unity3d.com
  • cs.unc.edu
  • curl.haxx.se
  • example.com
  • facilitator.unity3d.com
  • facilitatorbeta.unity3d.com
  • http://msdl.microsoft.com
  • http://msdl.microsoft.com/download/symbols
  • http://unity3d.com
  • http://www.openssl.org
  • http://www.openssl.org/support/faq.html
  • https://api.uca.cloud.unity3d.com
  • https://api.uca.cloud.unity3d.com/v1/events
  • https://cdp.cloud.unity3d.com
  • https://cdp.cloud.unity3d.com/v1/events
  • https://config.uca.cloud.unity3d.com
  • https://curl.haxx.se
  • https://curl.haxx.se/docs/http-cookies.html
  • https://stats.unity3d.com
  • https://stats.unity3d.com/HWStats.cgi
  • https://stats.unity3d.com/HWStatsUpdate.cgi
  • masterserver.unity3d.com
  • masterserverbeta.unity3d.com
  • microsoft.com
  • msdl.microsoft.com
  • normal.xyz
  • openssl.org
  • proxy.unity3d.com
  • proxybeta.unity3d.com
  • stats.unity3d.com
  • tangent.xyz
  • uca.cloud.unity3d.com
  • unity3d.com
  • vertex.xyz
  • www.openssl.org
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to AES
Uses constants related to Blowfish
Uses known Mersenne Twister constants
Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .trace
Unusual section name found: .data1
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • LoadLibraryW
  • LoadLibraryA
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • SHDeleteKeyW
  • RegDeleteValueA
  • RegQueryValueExA
  • RegSetValueExA
  • RegCreateKeyW
  • RegOpenKeyExW
  • RegCloseKey
  • RegQueryValueExW
  • RegSetValueExW
  • RegCreateKeyExW
Possibly launches other programs:
  • ShellExecuteW
Uses Windows's Native API:
  • ntohs
  • ntohl
Uses Microsoft's cryptographic API:
  • CryptGetHashParam
  • CryptImportKey
  • CryptVerifySignatureA
  • CryptDestroyKey
  • CryptDestroyHash
  • CryptHashData
  • CryptReleaseContext
  • CryptCreateHash
  • CryptAcquireContextA
Can create temporary files:
  • CreateFileW
  • GetTempPathW
  • CreateFileA
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Has Internet access capabilities:
  • WinHttpGetIEProxyConfigForCurrentUser
Leverages the raw socket API to access the Internet:
  • WSAAsyncGetHostByName
  • ntohs
  • gethostname
  • socket
  • WSAGetLastError
  • connect
  • WSACancelAsyncRequest
  • WSAStartup
  • inet_ntoa
  • closesocket
  • WSACleanup
  • htonl
  • bind
  • htons
  • inet_addr
  • getsockopt
  • WSAEventSelect
  • WSACloseEvent
  • WSACreateEvent
  • WSAWaitForMultipleEvents
  • WSAResetEvent
  • WSAEnumNetworkEvents
  • WSASetEvent
  • getpeername
  • getprotobyname
  • recv
  • gethostbyname
  • ntohl
  • shutdown
  • getnameinfo
  • getaddrinfo
  • WSAIoctl
  • recvfrom
  • sendto
  • send
  • select
  • __WSAFDIsSet
  • freeaddrinfo
  • WSASocketA
  • WSASetLastError
  • setsockopt
  • ioctlsocket
  • listen
  • getsockname
  • accept
Functions related to the privilege level:
  • OpenProcessToken
Enumerates local disk drives:
  • GetDriveTypeW
  • GetDriveTypeA
Can use the microphone to record audio:
  • waveInOpen
Reads the contents of the clipboard:
  • GetClipboardData
Malicious VirusTotal score: 3/71 (Scanned on 2025-10-30 18:36:19) DrWeb: Trojan.PWS.Lumma.478
VBA32: BScope.Trojan.Agent
Zillya: Trojan.Kryptik.Win32.4905886

Hashes

MD5 a6fcc484d864272c73ffe56bb15fb9b9
SHA1 24d57a7bb0c9174c0e253ed692a97679a7d26e10
SHA256 985944dee86ab81368698d5b0b2b9fbc82be0daf983b20048284941611fe3ce6
SHA3 260fe153fb6bd3c5db85d3e8ec006d205b292cf3894cef8790294d820249b085
SSDeep 393216:SV1scpVE53NCgldcaRKo4OAMziY0brer9FQifrOGgcZ+jEwNXU7KPJa1m1:JfVYj+KPJa
Imports Hash 8397d35bd2ea7327c4d272e2b350a33f

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x128

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 9
TimeDateStamp 2017-May-30 12:40:39
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 10.0
SizeOfCode 0xe1d800
SizeOfInitializedData 0x3e5600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00794B6B (Section: .text)
BaseOfCode 0x1000
BaseOfData 0xe1f000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.1
ImageVersion 0.0
SubsystemVersion 5.1
Win32VersionValue 0
SizeOfImage 0x1207000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 027594a3866672c072d4569993c2065d
SHA1 96c81aa6a47751ffcea2db18f800676aea3a7ba3
SHA256 211a18b326c88d551b62dd2e46bf429acc0a76fecc0d318f337a8375b55afb78
SHA3 2bda7b14a58c08c9676ec43f92b67a034534cb07d4c134e0eaafd6375306ae84
VirtualSize 0xe1d62a
VirtualAddress 0x1000
SizeOfRawData 0xe1d800
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.74527

.rdata

MD5 ac0655c16a1af579f40ed27c947abf00
SHA1 a862988214fe867aa40882efc60ccf1c368b9a59
SHA256 44d542c2a6bb770bf9a559e71fb7b37f50d417566af1bf5cc6198dd4b017d625
SHA3 99583b1a29d66308ca32370bf7ec2387faf32d8e85a37fa630670524b8408901
VirtualSize 0x1c1ddd
VirtualAddress 0xe1f000
SizeOfRawData 0x1c1e00
PointerToRawData 0xe1dc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.16384

.data

MD5 8a527c2df91987e9cba46e773e2f3203
SHA1 4f6e50ecb8a7a152fa160dc421b2ce1d647a933b
SHA256 83bc4d5ba2a42247317cd2f0063b4264d3a30d9afb063f1595a04d09721f687a
SHA3 bf3bac78ce84cc389303dc96c547ad35fb9a8cfcdd77229b04077ea9f2abb8d5
VirtualSize 0x109ee0
VirtualAddress 0xfe1000
SizeOfRawData 0x3ba00
PointerToRawData 0xfdfa00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.67587

.rodata

MD5 6cd27e3241430d756df37aef639cf48a
SHA1 8576e5bfef4f234eb7c754eb52e99698104a00c4
SHA256 144a34dada4708a578ca10af3f642be898566e2b31fb81ee1885b83f4983ebf2
SHA3 c62b9812b4d51c68577d75fd2bc029d35bfd3175295f479c2aca6c46832b0114
VirtualSize 0xad0
VirtualAddress 0x10eb000
SizeOfRawData 0xc00
PointerToRawData 0x101b400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.97031

.trace

MD5 5cbef51892dec45a1bb723c138ba7496
SHA1 03f540e05fae12252ad04739da6aa3a6e85050f5
SHA256 edcf708cb391ad5340b98acf8b9b0b754e9423b463f600324a87b8f9c717aef5
SHA3 fa2b0fe6de58fc3231f8ab95b4a01b397df3306d02aa33e5f88f3a2cfdb4a7d7
VirtualSize 0x1d98
VirtualAddress 0x10ec000
SizeOfRawData 0x1e00
PointerToRawData 0x101c000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.29994

.data1

MD5 f5688adfeaf35cd6be99948b3e39f323
SHA1 2f55833ab355e954606909994f39dda329ac124f
SHA256 e4c3899536c9b4e013c94c9d414ad6c0902675cabdca901b48355f1cfc5b257c
SHA3 250e3c80907146c70bf643680ffe1d340a35f3acc2c6b24760df231480e9ac57
VirtualSize 0x40
VirtualAddress 0x10ee000
SizeOfRawData 0x200
PointerToRawData 0x101de00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.436447

_RDATA

MD5 1b7e2bffd9f44509a41503514b320d13
SHA1 83751e489de1df66afecb273209b00abbf292f2d
SHA256 0958c42b17f70fc2d5934c4d16feb8aa35e023587119ee679153f1bc209b0b1b
SHA3 34009c0253cf377a4f8d21310b8fe933f33d9beacceb580c37e0e88151ef7932
VirtualSize 0x540
VirtualAddress 0x10ef000
SizeOfRawData 0x600
PointerToRawData 0x101e000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.53188

.rsrc

MD5 df847564ef0f16d71cf02ff34183f223
SHA1 ddb265435c3e7ad5d45d8bf6355dc77c0e7d72e6
SHA256 a9554c1b3d013fff209c3915ee66eacf4f58c120e78a173497e9fa8616a6f407
SHA3 41afd3f37208571996dd60dbde1cec92a11caf661996e87b739b9825e5a28c55
VirtualSize 0x8a670
VirtualAddress 0x10f0000
SizeOfRawData 0x8a800
PointerToRawData 0x101e600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.09613

.reloc

MD5 948c9c70caa08ed8f5b5d681547c276a
SHA1 f75a16321da4644f498051e3421e32d0f7e125eb
SHA256 fe46821393c7a4ba89135aa8e8c9d6f7a873b1980bfc8f46943eac2fafc1785e
SHA3 7c6968ac37377ec7bd780edf8c3d114342145ca4e1b9f91158d8a6202896abc4
VirtualSize 0x8bd14
VirtualAddress 0x117b000
SizeOfRawData 0x8be00
PointerToRawData 0x10a8e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.76389

Imports

HID.DLL HidP_GetButtonCaps
HidP_GetCaps
HidD_GetProductString
HidD_GetPreparsedData
HidP_MaxDataListLength
HidP_GetData
HidD_FreePreparsedData
HidP_GetValueCaps
HidD_GetHidGuid
KERNEL32.dll GetLocalTime
GetTimeZoneInformation
LocalFree
TerminateThread
GetSystemInfo
GetSystemTimeAsFileTime
GetModuleFileNameW
InitializeCriticalSection
ResetEvent
ReadFile
SetFilePointerEx
WriteFile
SetFilePointer
SetEndOfFile
GetFileAttributesExW
CreateFileW
SetFileAttributesW
GetFileAttributesW
CopyFileW
MoveFileExW
FindClose
FindNextFileW
FindFirstFileW
FindFirstFileExW
ReplaceFileW
GetTempFileNameW
LoadLibraryExW
InterlockedIncrement
InterlockedDecrement
CreateEventW
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleA
RemoveDirectoryW
DeleteFileW
SetFileTime
GetSystemTime
GetDiskFreeSpaceExA
lstrcpynA
lstrcpyA
lstrcpynW
GetCommandLineW
CancelIo
GetOverlappedResult
ExpandEnvironmentStringsW
SetLastError
ResumeThread
GetThreadContext
SuspendThread
OutputDebugStringA
GetEnvironmentVariableA
GetFileAttributesA
GetModuleFileNameA
GetVersionExA
GetCurrentDirectoryA
VerifyVersionInfoW
VerSetConditionMask
GetVersionExW
GlobalMemoryStatusEx
GetUserDefaultUILanguage
GetComputerNameW
GetTempPathW
LocalAlloc
SetUnhandledExceptionFilter
GetCurrentDirectoryW
OpenEventW
DebugBreak
GetFileSize
FileTimeToDosDateTime
FileTimeToLocalFileTime
lstrlenA
GetFileTime
VirtualQuery
GlobalMemoryStatus
SetErrorMode
HeapAlloc
GetCurrentProcess
RtlUnwind
HeapReAlloc
DecodePointer
EncodePointer
HeapQueryInformation
HeapSize
DuplicateHandle
SystemTimeToFileTime
SetConsoleCtrlHandler
MapViewOfFile
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetStdHandle
HeapCreate
IsProcessorFeaturePresent
GetLocaleInfoW
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
InterlockedExchange
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
CreateFileA
CompareStringW
SetEnvironmentVariableA
GetProcessHeap
GetProcessAffinityMask
InterlockedExchangeAdd
VirtualProtect
VirtualAlloc
VirtualFree
SwitchToThread
SetThreadAffinityMask
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
InterlockedFlushSList
GetThreadPriority
OpenEventA
SetWaitableTimer
CreateWaitableTimerA
GetSystemDirectoryA
GetDriveTypeW
PeekNamedPipe
GetFileInformationByHandle
FindFirstFileExA
GetDriveTypeA
FileTimeToSystemTime
SetConsoleMode
ReadConsoleInputA
GetFullPathNameA
GetDateFormatA
GetTimeFormatA
CreateSemaphoreW
FlushInstructionCache
CreateMutexW
SignalObjectAndWait
VerifyVersionInfoA
ExpandEnvironmentStringsA
FlushConsoleInputBuffer
GetVersion
GetCurrentProcessId
GetFullPathNameW
GetModuleHandleW
GetCurrentThreadId
SetThreadPriority
FormatMessageA
ExitProcess
CreateFileMappingA
CreateThread
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
UnmapViewOfFile
CreateMutexA
ReleaseMutex
WaitForSingleObject
GetWindowsDirectoryW
IsDebuggerPresent
ExitThread
GetCurrentThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
RaiseException
SleepEx
QueryPerformanceFrequency
QueryPerformanceCounter
SetHandleInformation
FormatMessageW
SetDllDirectoryW
LoadLibraryW
GetLastError
CreateDirectoryW
LoadLibraryA
GetProcAddress
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
InterlockedCompareExchange
CreateEventA
SetEvent
ReleaseSemaphore
WaitForSingleObjectEx
Sleep
CloseHandle
CreateSemaphoreA
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
HeapFree
USER32.dll MessageBoxW
IsWindowVisible
ScreenToClient
WindowFromPoint
GetCursorPos
GetCaretBlinkTime
EnumDisplaySettingsA
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
IsClipboardFormatAvailable
CreateIconIndirect
ReleaseDC
GetDC
GetSystemMetrics
SetCursor
wvsprintfA
CloseClipboard
UpdateWindow
MonitorFromWindow
ValidateRect
SetTimer
GetWindowLongW
RegisterClassExW
DialogBoxParamW
EndDialog
LoadIconA
SendDlgItemMessageW
SetDlgItemTextA
SetDlgItemTextW
MessageBoxA
CopyRect
OffsetRect
GetAncestor
UnregisterClassW
ClipCursor
GetDesktopWindow
AdjustWindowRectEx
GetWindowPlacement
ChangeDisplaySettingsA
GetDlgItem
SetWindowLongA
CreateDialogParamA
SetWindowPos
GetWindowRect
GetParent
GetThreadDesktop
GetUserObjectInformationA
EnumWindows
RegisterWindowMessageA
SendMessageA
SendMessageTimeoutA
ShowWindow
SetForegroundWindow
PeekMessageA
GetMessageA
KillTimer
LoadImageW
DialogBoxParamA
CheckDlgButton
CreateDialogParamW
IsDialogMessageW
PeekMessageW
DispatchMessageW
MsgWaitForMultipleObjects
EnableWindow
CopyImage
IsDlgButtonChecked
SetWindowLongW
SetWindowTextW
LoadCursorA
DestroyCursor
DestroyIcon
SetCapture
ReleaseCapture
UnregisterDeviceNotification
DispatchMessageA
TranslateMessage
PtInRect
GetClientRect
GetProcessWindowStation
GetUserObjectInformationW
IsIconic
GetWindowLongA
GetMessageExtraInfo
RegisterDeviceNotificationW
SystemParametersInfoW
ClientToScreen
DefWindowProcW
DestroyWindow
CreateWindowExW
GetAsyncKeyState
GetKeyState
wsprintfA
RegisterRawInputDevices
GetRawInputData
GetRawInputDeviceInfoW
GetRawInputDeviceList
SetCursorPos
ShowCursor
GetFocus
SetFocus
EnumDisplayDevicesA
EnumDisplayMonitors
GetMonitorInfoA
RegisterClassW
PostQuitMessage
VERSION.dll GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
ole32.dll CoUninitialize
CoInitialize
CoCreateGuid
CoTaskMemAlloc
CoTaskMemFree
CoSetProxyBlanket
StringFromGUID2
PropVariantClear
CoCreateInstance
SHLWAPI.dll PathCanonicalizeW
PathFileExistsW
SHDeleteKeyW
ADVAPI32.dll CryptGetHashParam
RegisterEventSourceA
ReportEventA
DeregisterEventSource
CryptImportKey
CryptVerifySignatureA
CryptDestroyKey
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyW
OpenProcessToken
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
GetUserNameA
GetSidSubAuthority
GetTokenInformation
GDI32.dll SwapBuffers
DeleteObject
CreateBitmap
CreateDIBSection
SetPixelFormat
ChoosePixelFormat
GetDeviceCaps
GetObjectA
SHELL32.dll CommandLineToArgvW
SHGetFolderPathW
ShellExecuteW
SHFileOperationW
OPENGL32.dll wglGetCurrentContext
wglCreateContext
wglMakeCurrent
wglDeleteContext
wglGetProcAddress
wglGetCurrentDC
WINMM.dll timeBeginPeriod
waveInGetNumDevs
timeEndPeriod
waveOutGetDevCapsA
waveOutGetDevCapsW
waveOutClose
waveOutOpen
waveOutUnprepareHeader
waveOutWrite
waveOutReset
timeGetTime
waveOutGetNumDevs
waveInAddBuffer
waveInPrepareHeader
waveInUnprepareHeader
waveInGetDevCapsA
waveInGetDevCapsW
waveInStart
waveInOpen
waveInClose
waveInReset
waveOutPrepareHeader
waveOutGetPosition
WS2_32.dll WSAAsyncGetHostByName
ntohs
gethostname
socket
WSAGetLastError
connect
WSACancelAsyncRequest
WSAStartup
inet_ntoa
closesocket
WSACleanup
htonl
bind
htons
inet_addr
getsockopt
WSAEventSelect
WSACloseEvent
WSACreateEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSAEnumNetworkEvents
WSASetEvent
getpeername
getprotobyname
recv
gethostbyname
ntohl
shutdown
getnameinfo
getaddrinfo
WSAIoctl
recvfrom
sendto
send
select
__WSAFDIsSet
freeaddrinfo
WSASocketA
WSASetLastError
setsockopt
ioctlsocket
listen
getsockname
accept
OLEAUT32.dll VariantClear
SysAllocString
SysFreeString
VariantChangeType
VariantInit
IMM32.dll ImmReleaseContext
ImmSetOpenStatus
ImmGetConversionStatus
ImmGetCompositionStringW
ImmAssociateContextEx
ImmAssociateContext
ImmGetContext
ImmSetCompositionStringW
DNSAPI.dll DnsQuery_A
DnsFree
IPHLPAPI.DLL GetIpAddrTable
WINHTTP.dll WinHttpGetIEProxyConfigForCurrentUser

Delayed Imports

??0Allocator@shdfnd@physx@@QAE@PBD@Z

Ordinal 1
Address 0x87bd70

??0ErrorHandler@shdfnd@physx@@QAE@XZ

Ordinal 2
Address 0x8b0960

??0FPUGuard@shdfnd@physx@@QAE@XZ

Ordinal 3
Address 0xaa18c0

??0Foundation@shdfnd@physx@@AAE@AAVPxErrorCallback@2@AAVPxAllocatorCallback@2@@Z

Ordinal 4
Address 0x87c1b0

??0MutexImpl@shdfnd@physx@@QAE@XZ

Ordinal 5
Address 0x8b07a0

??0PAUtils@shdfnd@physx@@QAE@XZ

Ordinal 6
Address 0x8b0b20

??0PxFoundation@physx@@QAE@ABV01@@Z

Ordinal 7
Address 0x87bc30

??0PxFoundation@physx@@QAE@XZ

Ordinal 8
Address 0x87bc20

??0ReadWriteLock@shdfnd@physx@@QAE@XZ

Ordinal 9
Address 0x8b0880

??0SListImpl@shdfnd@physx@@QAE@XZ

Ordinal 10
Address 0xa27b70

??0SyncImpl@shdfnd@physx@@QAE@XZ

Ordinal 11
Address 0xa4a9d0

??0TempAllocator@shdfnd@physx@@QAE@PBD@Z

Ordinal 12
Address 0x87bd70

??0ThreadImpl@shdfnd@physx@@QAE@P6APAXPAX@Z0@Z

Ordinal 13
Address 0xa4aec0

??0ThreadImpl@shdfnd@physx@@QAE@XZ

Ordinal 14
Address 0xa4aab0

??0Time@shdfnd@physx@@QAE@XZ

Ordinal 15
Address 0xa82d20

??1ErrorHandler@shdfnd@physx@@QAE@XZ

Ordinal 16
Address 0x8b0970

??1FPUGuard@shdfnd@physx@@QAE@XZ

Ordinal 17
Address 0xaa1900

??1Foundation@shdfnd@physx@@EAE@XZ

Ordinal 18
Address 0x87c090

??1MutexImpl@shdfnd@physx@@QAE@XZ

Ordinal 19
Address 0x8b07c0

??1PAUtils@shdfnd@physx@@QAE@XZ

Ordinal 20
Address 0x8b1000

??1PxFoundation@physx@@MAE@XZ

Ordinal 21
Address 0x87bc10

??1ReadWriteLock@shdfnd@physx@@QAE@XZ

Ordinal 22
Address 0x8b08c0

??1SListImpl@shdfnd@physx@@QAE@XZ

Ordinal 23
Address 0xa27b50

??1SyncImpl@shdfnd@physx@@QAE@XZ

Ordinal 24
Address 0xa4a9f0

??1ThreadImpl@shdfnd@physx@@QAE@XZ

Ordinal 25
Address 0xa4ae20

??4Allocator@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 26
Address 0x87bd70

??4ErrorHandler@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 27
Address 0x87bcd0

??4FPUGuard@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 28
Address 0x87bc40

??4MutexImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 29
Address 0x87bd70

??4PAUtils@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 30
Address 0x87bc80

??4PxFoundation@physx@@QAEAAV01@ABV01@@Z

Ordinal 31
Address 0x87bd70

??4SListImpl@shdfnd@physx@@QAEAAU012@ABU012@@Z

Ordinal 32
Address 0x87bd70

??4SyncImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 33
Address 0x87bd70

??4TempAllocator@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 34
Address 0x87bd70

??4ThreadImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 35
Address 0x87bd70

??4Time@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 36
Address 0xa82bd0

??_7Foundation@shdfnd@physx@@6B@

Ordinal 37
Address 0xf31028

??_7PxFoundation@physx@@6B@

Ordinal 38
Address 0xf30db8

??_FAllocator@shdfnd@physx@@QAEXXZ

Ordinal 39
Address 0x2cb460

??_FTempAllocator@shdfnd@physx@@QAEXXZ

Ordinal 40
Address 0x2cb460

?MAX_LISTENER_COUNT@ErrorHandler@shdfnd@physx@@2IB

Ordinal 41
Address 0xf30db4

?PxDiagonalize@physx@@YA?AVPxVec3@1@ABVPxMat33@1@AAVPxQuat@1@@Z

Ordinal 42
Address 0x8ec700

?PxShortestRotation@physx@@YA?AVPxQuat@1@ABVPxVec3@1@0@Z

Ordinal 43
Address 0x8ec070

?PxTransformFromPlaneEquation@physx@@YA?AVPxTransform@1@ABVPxPlane@1@@Z

Ordinal 44
Address 0x8ec210

?PxTransformFromSegment@physx@@YA?AVPxTransform@1@ABVPxVec3@1@0PAM@Z

Ordinal 45
Address 0x8ec4b0

?TlsAlloc@shdfnd@physx@@YAIXZ

Ordinal 46
Address 0xa4acf0

?TlsFree@shdfnd@physx@@YAXI@Z

Ordinal 47
Address 0xa4ad00

?TlsGet@shdfnd@physx@@YAPAXI@Z

Ordinal 48
Address 0xa4ad10

?TlsSet@shdfnd@physx@@YAIIPAX@Z

Ordinal 49
Address 0xa4ad20

?allocate@Allocator@shdfnd@physx@@QAEPAXIPBDH@Z

Ordinal 50
Address 0x8b0900

?allocate@TempAllocator@shdfnd@physx@@QAEPAXIPBDH@Z

Ordinal 51
Address 0x8ed770

?atomicAdd@shdfnd@physx@@YAHPCHH@Z

Ordinal 52
Address 0x996f00

?atomicCompareExchange@shdfnd@physx@@YAHPCHHH@Z

Ordinal 53
Address 0x996ea0

?atomicCompareExchangePointer@shdfnd@physx@@YAPAXPAPCXPAX1@Z

Ordinal 54
Address 0x996ec0

?atomicDecrement@shdfnd@physx@@YAHPCH@Z

Ordinal 55
Address 0x996ef0

?atomicExchange@shdfnd@physx@@YAHPCHH@Z

Ordinal 56
Address 0x996e80

?atomicIncrement@shdfnd@physx@@YAHPCH@Z

Ordinal 57
Address 0x996ee0

?atomicMax@shdfnd@physx@@YAHPCHH@Z

Ordinal 58
Address 0x996f30

?computeQuatFromNormal@shdfnd@physx@@YA?AVPxQuat@2@ABVPxVec3@2@@Z

Ordinal 59
Address 0x97df30

?createInstance@Foundation@shdfnd@physx@@SAPAV123@IAAVPxErrorCallback@3@AAVPxAllocatorCallback@3@@Z

Ordinal 60
Address 0x87c270

?deallocate@Allocator@shdfnd@physx@@QAEXPAX@Z

Ordinal 61
Address 0x8b0940

?deallocate@TempAllocator@shdfnd@physx@@QAEXPAX@Z

Ordinal 62
Address 0x8ed870

?debugEvent@PAUtils@shdfnd@physx@@QAEXGII@Z

Ordinal 63
Address 0x8b0fd0

?decRefCount@Foundation@shdfnd@physx@@SAXXZ

Ordinal 64
Address 0x87bfa0

?destroyInstance@Foundation@shdfnd@physx@@SAXXZ

Ordinal 65
Address 0x87bf00

?disableFPExceptions@shdfnd@physx@@YAXXZ

Ordinal 66
Address 0xaa1960

?enableFPExceptions@shdfnd@physx@@YAXXZ

Ordinal 67
Address 0xaa1940

?error@Foundation@shdfnd@physx@@QAAXW4Enum@PxErrorCode@3@PBDH1ZZ

Ordinal 68
Address 0x87be90

?errorImpl@Foundation@shdfnd@physx@@QAEXW4Enum@PxErrorCode@3@PBDH1PAD@Z

Ordinal 69
Address 0x87be20

?flush@SListImpl@shdfnd@physx@@QAEPAVSListEntry@23@XZ

Ordinal 70
Address 0xa27bb0

?getAllocator@Foundation@shdfnd@physx@@UBEAAVPxBroadcastingAllocator@3@XZ

Ordinal 71
Address 0x87bcf0

?getAllocator@shdfnd@physx@@YAAAVPxAllocatorCallback@2@XZ

Ordinal 72
Address 0x87be80

?getAllocatorCallback@Foundation@shdfnd@physx@@UBEAAVPxAllocatorCallback@3@XZ

Ordinal 73
Address 0x87bdd0

?getBootCounterFrequency@Time@shdfnd@physx@@SAABUCounterFrequencyToTensOfNanos@23@XZ

Ordinal 74
Address 0xa82c30

?getCallbackCount@ErrorHandler@shdfnd@physx@@QBEIXZ

Ordinal 75
Address 0x4979c0

?getCheckedAllocator@Foundation@shdfnd@physx@@QAEAAVPxAllocatorCallback@3@XZ

Ordinal 76
Address 0x87bcf0

?getCounterFrequency@Time@shdfnd@physx@@SA?AUCounterFrequencyToTensOfNanos@23@XZ

Ordinal 77
Address 0xa82c40

?getCurrentCounterValue@Time@shdfnd@physx@@SA_KXZ

Ordinal 78
Address 0xa82c70

?getCurrentTimeInTensOfNanoSeconds@Time@shdfnd@physx@@SA_KXZ

Ordinal 79
Address 0xa82d60

?getDefaultStackSize@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 80
Address 0xa4ad40

?getElapsedSeconds@Time@shdfnd@physx@@QAENXZ

Ordinal 81
Address 0xa82c90

?getErrorCallback@ErrorHandler@shdfnd@physx@@QBEPAVPxErrorCallback@3@H@Z

Ordinal 82
Address 0x87bcc0

?getErrorCallback@Foundation@shdfnd@physx@@UBEAAVPxErrorCallback@3@XZ

Ordinal 83
Address 0x87bde0

?getErrorHandler@Foundation@shdfnd@physx@@QAEAAVErrorHandler@23@XZ

Ordinal 84
Address 0x87bd60

?getErrorLevel@Foundation@shdfnd@physx@@UBE?AW4Enum@PxErrorCode@3@XZ

Ordinal 85
Address 0x87be00

?getErrorMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 86
Address 0x87bd20

?getId@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 87
Address 0xa4aaa0

?getInstance@Foundation@shdfnd@physx@@SAAAV123@XZ

Ordinal 88
Address 0x87bdb0

?getLastTime@Time@shdfnd@physx@@QBENXZ

Ordinal 89
Address 0xa82d10

?getMaxCallbackNum@ErrorHandler@shdfnd@physx@@QBEIXZ

Ordinal 90
Address 0x1ced80

?getNamedAllocMap@Foundation@shdfnd@physx@@QAEAAV?$HashMap@PBVNamedAllocator@shdfnd@physx@@PBDU?$Hash@PBVNamedAllocator@shdfnd@physx@@@23@VNonTrackingAllocator@23@@23@XZ

Ordinal 91
Address 0x87bd30

?getNamedAllocMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 92
Address 0x87bd40

?getNbPhysicalCores@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 93
Address 0xa4ad50

?getPAUtils@Foundation@shdfnd@physx@@QAEAAVPAUtils@23@XZ

Ordinal 94
Address 0x216a30

?getPriority@ThreadImpl@shdfnd@physx@@SA?AW4Enum@ThreadPriority@23@I@Z

Ordinal 95
Address 0xa4aca0

?getReportAllocationNames@Foundation@shdfnd@physx@@UBE_NXZ

Ordinal 96
Address 0x87bd00

?getSize@MutexImpl@shdfnd@physx@@SAABIXZ

Ordinal 97
Address 0x8b0800

?getSize@SListImpl@shdfnd@physx@@SAABIXZ

Ordinal 98
Address 0xa27b60

?getSize@SyncImpl@shdfnd@physx@@SAABIXZ

Ordinal 99
Address 0xa4a9c0

?getSize@ThreadImpl@shdfnd@physx@@SAABIXZ

Ordinal 100
Address 0xa4aa90

?getTempAllocFreeTable@Foundation@shdfnd@physx@@QAEAAV?$Array@PATTempAllocatorChunk@shdfnd@physx@@VAllocator@23@@23@XZ

Ordinal 101
Address 0x87bd50

?getTempAllocMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 102
Address 0x291ca0

?getWarnOnceTimestamp@Foundation@shdfnd@physx@@SAIXZ

Ordinal 103
Address 0x87bdc0

?incRefCount@Foundation@shdfnd@physx@@SAXXZ

Ordinal 104
Address 0x87bf70

?integrateTransform@shdfnd@physx@@YAXABVPxTransform@2@ABVPxVec3@2@1MAAV32@@Z

Ordinal 105
Address 0x97dcd0

?isEnabled@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 106
Address 0x8b0db0

?isEventEnabled@PAUtils@shdfnd@physx@@QAE_NG@Z

Ordinal 107
Address 0x8b0d80

?kill@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 108
Address 0xa4ab30

?lock@MutexImpl@shdfnd@physx@@QAEXXZ

Ordinal 109
Address 0x8b07d0

?lock@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 110
Address 0x8b0b30

?lockReader@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 111
Address 0x8b0820

?lockWriter@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 112
Address 0x8b0850

?mInstance@Foundation@shdfnd@physx@@0PAV123@A

Ordinal 113
Address 0x109f910

?mRefCount@Foundation@shdfnd@physx@@0IA

Ordinal 114
Address 0x109f914

?mWarnOnceTimestap@Foundation@shdfnd@physx@@0IA

Ordinal 115
Address 0x109f918

?optimizeBoundingBox@shdfnd@physx@@YA?AVPxVec3@2@AAVPxMat33@2@@Z

Ordinal 116
Address 0x97e0a0

?peekElapsedSeconds@Time@shdfnd@physx@@QAENXZ

Ordinal 117
Address 0xa82cd0

?pop@SListImpl@shdfnd@physx@@QAEPAVSListEntry@23@XZ

Ordinal 118
Address 0xa27ba0

?push@SListImpl@shdfnd@physx@@QAEXPAVSListEntry@23@@Z

Ordinal 119
Address 0xa27b80

?quit@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 120
Address 0xa4ab20

?quitIsSignalled@ThreadImpl@shdfnd@physx@@QAE_NXZ

Ordinal 121
Address 0xa4ab00

?rawEvent@PAUtils@shdfnd@physx@@QAEXGIIE@Z

Ordinal 122
Address 0x8b0dd0

?rawEventWithTimestamp@PAUtils@shdfnd@physx@@QAE_NG_KIIE@Z

Ordinal 123
Address 0x8b0b80

?registerErrorCallback@ErrorHandler@shdfnd@physx@@QAEHAAVPxErrorCallback@3@@Z

Ordinal 124
Address 0x8b0a00

?registerEvent@PAUtils@shdfnd@physx@@QAEGPBD@Z

Ordinal 125
Address 0x8b1050

?release@Foundation@shdfnd@physx@@UAEXXZ

Ordinal 126
Address 0x87bfd0

?reportError@ErrorHandler@shdfnd@physx@@QAEXW4Enum@PxErrorCode@3@PBD1H@Z

Ordinal 127
Address 0x8b09a0

?reset@SyncImpl@shdfnd@physx@@QAEXXZ

Ordinal 128
Address 0xa4aa00

?sNumTensOfNanoSecondsInASecond@Time@shdfnd@physx@@2_KB

Ordinal 129
Address 0xf37e20

?set@SyncImpl@shdfnd@physx@@QAEXXZ

Ordinal 130
Address 0xa4aa10

?setAffinityMask@ThreadImpl@shdfnd@physx@@QAEII@Z

Ordinal 131
Address 0xa4ab70

?setErrorLevel@Foundation@shdfnd@physx@@UAEXW4Enum@PxErrorCode@3@@Z

Ordinal 132
Address 0x87bdf0

?setName@ThreadImpl@shdfnd@physx@@QAEXPBD@Z

Ordinal 133
Address 0xa4aba0

?setPriority@ThreadImpl@shdfnd@physx@@QAEXW4Enum@ThreadPriority@23@@Z

Ordinal 134
Address 0xa4ac20

?setReportAllocationNames@Foundation@shdfnd@physx@@UAEX_N@Z

Ordinal 135
Address 0x87bd10

?signalQuit@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 136
Address 0xa4aad0

?sleep@ThreadImpl@shdfnd@physx@@SAXI@Z

Ordinal 137
Address 0xa4ab50

?slerp@shdfnd@physx@@YA?AVPxQuat@2@MABV32@0@Z

Ordinal 138
Address 0x97db10

?start@ThreadImpl@shdfnd@physx@@QAEXIPAVRunnable@23@@Z

Ordinal 139
Address 0xa4ae50

?startEvent@PAUtils@shdfnd@physx@@QAEXGG@Z

Ordinal 140
Address 0x8b0e00

?statEvent@PAUtils@shdfnd@physx@@QAEXGI@Z

Ordinal 141
Address 0x8b0f60

?statEvent@PAUtils@shdfnd@physx@@QAEXGII@Z

Ordinal 142
Address 0x8b0fa0

?stopEvent@PAUtils@shdfnd@physx@@QAEXGG@Z

Ordinal 143
Address 0x8b0eb0

?trylock@MutexImpl@shdfnd@physx@@QAE_NXZ

Ordinal 144
Address 0x8b07e0

?unRegisterErrorCallback@ErrorHandler@shdfnd@physx@@QAEXAAVPxErrorCallback@3@@Z

Ordinal 145
Address 0x8b0ac0

?unRegisterErrorCallback@ErrorHandler@shdfnd@physx@@QAEXH@Z

Ordinal 146
Address 0x8b0a70

?unlock@MutexImpl@shdfnd@physx@@QAEXXZ

Ordinal 147
Address 0x8b07f0

?unlock@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 148
Address 0x8b0bb0

?unlockReader@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 149
Address 0x8b0810

?unlockWriter@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 150
Address 0x8b0870

?wait@SyncImpl@shdfnd@physx@@QAE_NI@Z

Ordinal 151
Address 0xa4aa20

?waitForQuit@ThreadImpl@shdfnd@physx@@QAE_NXZ

Ordinal 152
Address 0xa4aae0

?waitForever@SyncImpl@shdfnd@physx@@2IB

Ordinal 153
Address 0xf36820

?yield@ThreadImpl@shdfnd@physx@@SAXXZ

Ordinal 154
Address 0xa4ab60

AmdPowerXpressRequestHighPerformance

Ordinal 155
Address 0xff3300

NvOptimusEnablement

Ordinal 156
Address 0xff32fc

PxCreateFoundation

Ordinal 157
Address 0x87c370

PxGetFoundation

Ordinal 158
Address 0x87be10

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.11163
MD5 0a55f7a7849e34b7b20d0d72a8b3ae9f
SHA1 7d56e99451b547c0adc4e06fe94e7fde22efdc99
SHA256 a3917abc9291ad227cc1cc22aa24d93145c376726b44298c7d0592a85f50c2bc
SHA3 be951def278e09e082cc773dc7690f3718d3a8d192c0096e60b0d85a761f8725

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x988
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.01667
MD5 2da65146ce95d06061e4ca2e71faa80a
SHA1 8716c073f2e9def1edb3a78374a84098549ce447
SHA256 cee633aa7a55c475e499f057cdce22deefea21efe21c0ca37752e417bf677128
SHA3 d523bc5b9096f631d035ef5e85ea69eca53887402c4110cf4b020f427b4ababd

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.87277
MD5 eed1629036b710156de6e226d7ca4379
SHA1 f6025c79f2bc6ce67c2b0cf56e372d8e412de279
SHA256 4d9ab02d1d9400ff0cd3f64fb089a74870b0836c81774fa921cd542f0b400bc1
SHA3 d76b6fbfd9f04d6cad7a7e146911d9a8e198a32460301b8cd3566ae199a4371c

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.33531
MD5 b85c0f0352ed552948caf4dec63f3a93
SHA1 4a820635012f07267ca27cd11c584bb7b1775b9c
SHA256 841289c6e8f5e8e812213452af78947bf390cbb3d70314530b310ef5138962aa
SHA3 8dbb6598132e84a72ebba85eeac64880b98e0f800df129cbcb7d8400b337d41b

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.01237
MD5 1dd2c24868df1d064a3b2821f427c7f5
SHA1 fa627a4dc7b8f70e00b91e8c9e71f9c1af2e2d3b
SHA256 37c8b48dea8c5710c1522380ddcca4d7a9d5ac4792e82f12b62ec1919b16505d
SHA3 ad4d1f2749a922b661c8d31c02708462ac7b8d71bc35542fe2c7cccc9759a8ce

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x94a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.51854
MD5 c8929332f3344b3a09d763c719109f55
SHA1 6893ee18fe23ca49523c58ae14e723ac6a549304
SHA256 22a081ec2cf6addd09ae9685a8e78f8540d42b8dcc34f80d0baafb04c323bd01
SHA3 f62028d779be9c1b9fc8cb5def607308f507e76e10ef433f5018807c0d84b0a8

7

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.35769
MD5 213d838a9fff1c0de019a679d0931926
SHA1 12ee41b7c1226bdab824ec5bd0edc5aad23ff708
SHA256 b5f82fab15c1dec1079c948070c3822cd9dd932fd0ba0cb0d6ce9bb3f267f367
SHA3 15de5a3eac50fa40c89c0fa605ee8ca8dd87de2f57f2f087459d3cc841ad2762

8

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.17346
MD5 265bd33da569da798703fe2b09fb1dea
SHA1 1f1c78cb5248102cd477df44d4a5078a09046677
SHA256 b7cdcc181141ffac73e5bb88e83ba8797ee04fa441e276603450449e5caa9f0e
SHA3 94d2357191418933c688a1c1669f9b53245193770050d61ae63567c924b4f0ce

9

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x42028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.54086
MD5 f18d46b5c9b5bcb3be63d512f7a157e0
SHA1 42452ec23d7bf8f4f8b884c9980d71e5b51f1458
SHA256 8afab99ef3a8605859709115efbb23b0f4a8993cdf533b7b9a0f4a126e38bb15
SHA3 b08e1919e79ad4afcaaeb8cb28395f7542693dbbef7166a49870e2c43e574d78

9 (#2)

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x124
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.99471
MD5 b62b6b1e4cd3054ab1b07b033356d108
SHA1 c0170ce1c06de46e62508e1d774d64e952cd111a
SHA256 6a3c71d7f89e83280ff2aa75c76d49c3239060f8ee53cfc2692e05c4fc9c7eab
SHA3 9e885ae1d0f740d603c9ef2ca1a92c8a61ddb587a0f50bee653496e0ac8fe4f6

105

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x10c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.98084
MD5 2165d3c35627dfb0f24dfa8839b650c1
SHA1 5168d394292dd31902f3f8112b22cd604529f378
SHA256 7aa854f2b6bf3241c666d0b851ecaea27082934a4b2fa43db752591dfcf9434e
SHA3 395d76a75afaab97318d9ea2f3785b5ade74331f689f98e69f22f301be84d67a

107

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x1c2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.19606
MD5 e71ed01bef9a6e44b5a60f28e2d14320
SHA1 28a0948d37b93bfd392044a4338968bd3f4de535
SHA256 af380b7f1f6bedba49ef3833569a36314f9834b759bfbdc7f5474d65081186c6
SHA3 a275daef8cf31a8e4d53a63b80b73137c0c41a126920ed0b63416f8643332d35

108

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0xdc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.23439
MD5 89647fd8d7ee80b9e9e46db2a1053a29
SHA1 10dd88f00a8f56cce48908628abe1215235f624a
SHA256 692985cf029eb28098357336ea128b16211fb8fb8ab3e8f90949a952a2514f65
SHA3 01c77f889f7bb48a0744fe4f076df03cf74591df831c9d043237c2a7a7426f3e

109

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x8e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.09377
MD5 839f2e562a1f062fd873414ab28cf1d2
SHA1 ed961a5852bd1ac5b55fa8fd70fa8213754abc57
SHA256 296b7d861a9ee473d4e8a62f9d7adb025d1fbe8e61206870f426e5c870a98936
SHA3 6a4b1fab7319e07585d923be21a3d852ecc1988286973bf8440e25f2a35a3cd0

103

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x84
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.04448
Detected Filetype Icon file
MD5 3bf2dac037ce87794e66ff7f054e913f
SHA1 52ca961fd37ad960905a681d1db5157508ef1602
SHA256 2a87b1f32c5d0435090c72c392b75394f706e5750eff64fd85d25e1c622ee581
SHA3 8454d3273522657b5926068082b2cb88f6dbf352e7e9568008c0e33c792f349b

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x1a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.34189
MD5 c39274da774edf9cc92084d7bf8fa51b
SHA1 d47d782a7acfb40f03a570c3eb88a7f3cfd12e26
SHA256 d45a7ec34c578c24a44f6d029a80cac8c34d46b24f251a99a8634e10e03b5898
SHA3 db7bf0e7eae8461f8cc7c5a8717170d5766aa68e8149e553cccccff6f188532e

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x581
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.37424
MD5 ed4212968d15a196c34d461040b44336
SHA1 4d331b10588bcfeb306ba2ad31ce5ee96e12667c
SHA256 b91c0fd1d3a91447a5b1207d1f625d19a6a0df1921aac32c60ffbd8e0a11ef00
SHA3 914a36db86cc3ab4399e6e59366be51f0f6dae23a7a55f7e19ea927f9dd1a2b0

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 5.5.4.64782
ProductVersion 5.5.4.64782
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language English - United States
FileVersion (#2) 5.5.4.9436430
ProductVersion (#2) 5.5.4.9436430
Unity Version 5.5.4f1_8ffd0efd98b1
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2017-May-30 12:40:39
Version 0.0
SizeofData 137
AddressOfRawData 0xfc01ec
PointerToRawData 0xfbedec
Referenced File C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\player_win_x86.pdb

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0x75cf9178
Unmarked objects 0
ASM objects (VS2008 build 21022) 2
C++ objects (VS2010 build 30319) 4
Imports (VS2008 SP1 build 30729) 36
C objects (VS2012 build 50727 / VS2005 build 50727) 1
C objects (VS2008 SP1 build 30729) 33
Imports (VS2003 (.NET) build 4035) 3
Total imports 517
152 (20115) 6
ASM objects (VS2010 SP1 build 40219) 71
Unmarked objects (#2) 195
C objects (VS2010 SP1 build 40219) 1039
C++ objects (VS2010 SP1 build 40219) 2468
Exports (VS2010 SP1 build 40219) 1
Resource objects (VS2010 SP1 build 40219) 1
Linker (VS2010 SP1 build 40219) 1

Errors

Leave a comment

No comments yet.