99e7a911bd77728999b99b1b73993a71d3c40c1bc2b4301047f8214b81a2809e

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2017-Jan-19 12:10:52
Detected languages English - United States
Debug artifacts C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\player_win_x86.pdb
FileVersion 5.5.1.8966154
ProductVersion 5.5.1.8966154
Unity Version 5.5.1f1_88d00a7498cd

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ v6.0 DLL
Microsoft Visual C++ 6.0 - 8.0
Microsoft Visual C++
Microsoft Visual C++ v6.0
Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to system / monitoring tools:
  • rundll32.exe
Contains references to internet browsers:
  • firefox.exe
  • iexplore.exe
Tries to detect virtualized environments:
  • HARDWARE\DESCRIPTION\System
  • b3 eb 36 e4 4f 52 ce 11 9f 53 00 20 af 0b a7 70
Looks for VMWare presence:
  • VMWare
Accesses the WMI:
  • root\cimv2
Contains domain names:
  • api.uca.cloud.unity3d.com
  • cdp.cloud.unity3d.com
  • cloud.unity3d.com
  • config.uca.cloud.unity3d.com
  • connectiontester.unity3d.com
  • connectiontesterbeta.unity3d.com
  • cs.unc.edu
  • curl.haxx.se
  • example.com
  • facilitator.unity3d.com
  • facilitatorbeta.unity3d.com
  • http://curl.haxx.se
  • http://curl.haxx.se/docs/http-cookies.html
  • http://msdl.microsoft.com
  • http://msdl.microsoft.com/download/symbols
  • http://unity3d.com
  • http://www.openssl.org
  • http://www.openssl.org/support/faq.html
  • https://api.uca.cloud.unity3d.com
  • https://api.uca.cloud.unity3d.com/v1/events
  • https://cdp.cloud.unity3d.com
  • https://cdp.cloud.unity3d.com/v1/events
  • https://config.uca.cloud.unity3d.com
  • https://stats.unity3d.com
  • https://stats.unity3d.com/HWStats.cgi
  • https://stats.unity3d.com/HWStatsUpdate.cgi
  • masterserver.unity3d.com
  • masterserverbeta.unity3d.com
  • microsoft.com
  • msdl.microsoft.com
  • normal.xyz
  • openssl.org
  • proxy.unity3d.com
  • proxybeta.unity3d.com
  • stats.unity3d.com
  • tangent.xyz
  • uca.cloud.unity3d.com
  • unity3d.com
  • vertex.xyz
  • www.openssl.org
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to AES
Uses constants related to Blowfish
Uses known Diffie-Helman primes
Uses known Mersenne Twister constants
Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .trace
Unusual section name found: .data1
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • LoadLibraryW
  • LoadLibraryA
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • SHDeleteKeyW
  • RegDeleteValueA
  • RegQueryValueExA
  • RegSetValueExA
  • RegCreateKeyW
  • RegOpenKeyExW
  • RegCloseKey
  • RegQueryValueExW
  • RegSetValueExW
  • RegCreateKeyExW
Possibly launches other programs:
  • ShellExecuteW
Uses Windows's Native API:
  • ntohs
  • ntohl
Uses Microsoft's cryptographic API:
  • CryptGetHashParam
  • CryptImportKey
  • CryptVerifySignatureA
  • CryptDestroyKey
  • CryptDestroyHash
  • CryptHashData
  • CryptReleaseContext
  • CryptCreateHash
  • CryptAcquireContextA
Can create temporary files:
  • CreateFileW
  • GetTempPathW
  • CreateFileA
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Has Internet access capabilities:
  • WinHttpGetIEProxyConfigForCurrentUser
Leverages the raw socket API to access the Internet:
  • accept
  • ntohs
  • gethostname
  • socket
  • WSAGetLastError
  • connect
  • WSAAsyncGetHostByName
  • WSAStartup
  • inet_ntoa
  • closesocket
  • WSACleanup
  • htonl
  • bind
  • htons
  • inet_addr
  • WSACancelAsyncRequest
  • getsockopt
  • WSAEventSelect
  • WSACloseEvent
  • WSACreateEvent
  • WSAWaitForMultipleEvents
  • WSAResetEvent
  • WSAEnumNetworkEvents
  • WSASetEvent
  • getpeername
  • getprotobyname
  • recv
  • gethostbyname
  • ntohl
  • shutdown
  • getnameinfo
  • getaddrinfo
  • WSAIoctl
  • recvfrom
  • sendto
  • send
  • select
  • __WSAFDIsSet
  • freeaddrinfo
  • WSASocketA
  • WSASetLastError
  • setsockopt
  • ioctlsocket
  • getsockname
  • listen
Functions related to the privilege level:
  • OpenProcessToken
Enumerates local disk drives:
  • GetDriveTypeW
  • GetDriveTypeA
Can use the microphone to record audio:
  • waveInOpen
Reads the contents of the clipboard:
  • GetClipboardData
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 e3a43e031be5cadea489eaef4cfa9a4b
SHA1 236352353a300cd0e12bde93f432b7a93001e145
SHA256 99e7a911bd77728999b99b1b73993a71d3c40c1bc2b4301047f8214b81a2809e
SHA3 a597bfc195cf72ad0c1ab34eb238dab8505307c2a34a11422a6f125605c86d5a
SSDeep 393216:dTHtu/KhKDsT6KgrJ5LvxUw/FYI3ehP1xv1zdAgs6tz9zqUFxxwKFnIC:c76h5qZK2
Imports Hash 50e57fe09abdcc2e55ceaa3b20bbd1da

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x128

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 9
TimeDateStamp 2017-Jan-19 12:10:52
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 10.0
SizeOfCode 0xe45400
SizeOfInitializedData 0x3e7600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00792A7B (Section: .text)
BaseOfCode 0x1000
BaseOfData 0xe47000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.1
ImageVersion 0.0
SubsystemVersion 5.1
Win32VersionValue 0
SizeOfImage 0x1231000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 676e07b8bf7c54d3edecee99ae059477
SHA1 9108f5b27a292855405d76ee79169d35e7ea6b9c
SHA256 219c335383cae7f30091f715a233f260305c947692f8888a11efeddf7bd15eab
SHA3 e2c0183a232751f83482a5018c9f950974970b0a90afc35bc5ab5c8c71b3eacf
VirtualSize 0xe4524a
VirtualAddress 0x1000
SizeOfRawData 0xe45400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.76457

.rdata

MD5 446fb728b511de3a14350701cd17972a
SHA1 f7be1bfebdb1d61edc0588b53108370ef88f0d24
SHA256 29b7f920c3f6a42fa0f3734e285a3a780190370569e6fc030af00e6a185a25b9
SHA3 1eaa4c08f7dc4cfbec3a8595bc1a721dee80d59df602cf0d86480068349cb8b4
VirtualSize 0x1c6acd
VirtualAddress 0xe47000
SizeOfRawData 0x1c6c00
PointerToRawData 0xe45800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.16232

.data

MD5 11626864c52170e944398a2ee99f7dd3
SHA1 7b2906b30f646bac666118399a8444aa6d5a5f86
SHA256 55392a008b936ee715dbc5e21643e90615f4f4abc85d2be046ef49fd0739abc6
SHA3 89c9a25326a509d1d29f5f67d79e2f499c90339c377823baa11df99de30c987f
VirtualSize 0x106e60
VirtualAddress 0x100e000
SizeOfRawData 0x38a00
PointerToRawData 0x100c400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.70836

.rodata

MD5 6cd27e3241430d756df37aef639cf48a
SHA1 8576e5bfef4f234eb7c754eb52e99698104a00c4
SHA256 144a34dada4708a578ca10af3f642be898566e2b31fb81ee1885b83f4983ebf2
SHA3 c62b9812b4d51c68577d75fd2bc029d35bfd3175295f479c2aca6c46832b0114
VirtualSize 0xad0
VirtualAddress 0x1115000
SizeOfRawData 0xc00
PointerToRawData 0x1044e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.97031

.trace

MD5 630a6c1fa114517a85cc515181f40aae
SHA1 033de86c80f3bc7d6e1083ccfa3f7dd35d575000
SHA256 d1ef87872af088d15e299a148bfaf4d0d1b82a242be02f2c4af5d02c721252cf
SHA3 efc1578a8987462ef3c8b83d9883a834099e01ea85d6405a591bffa19f6cd56e
VirtualSize 0x1d98
VirtualAddress 0x1116000
SizeOfRawData 0x1e00
PointerToRawData 0x1045a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.297

.data1

MD5 f5688adfeaf35cd6be99948b3e39f323
SHA1 2f55833ab355e954606909994f39dda329ac124f
SHA256 e4c3899536c9b4e013c94c9d414ad6c0902675cabdca901b48355f1cfc5b257c
SHA3 250e3c80907146c70bf643680ffe1d340a35f3acc2c6b24760df231480e9ac57
VirtualSize 0x40
VirtualAddress 0x1118000
SizeOfRawData 0x200
PointerToRawData 0x1047800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.436447

_RDATA

MD5 f1f89f2d16a4104b1b44a0abb1c0089e
SHA1 60839ee9e1d92ea4ed5290c5b684acd8c78ce825
SHA256 16d977a5f98f636ab98c6da1d9e8c4459a15a4fb9728e206842152eececfd4bb
SHA3 ef0ff19d8695008c590e9ef2248e10eda2d07d8f5bc6b8582ed1eee275ad577f
VirtualSize 0x540
VirtualAddress 0x1119000
SizeOfRawData 0x600
PointerToRawData 0x1047a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.54937

.rsrc

MD5 99ba762ac0df171bd2d7b25ff71d726b
SHA1 824db63b2b63139f4e875cf1c27f75b4f8371167
SHA256 587f5fedda90c74df84b5a906c571290e0ccf1ef7ff2f8488b961275b24cd55a
SHA3 310698c2a963f8b4bc4b63304f64374c0530860660417b3ae353bd77814792ee
VirtualSize 0x8a670
VirtualAddress 0x111a000
SizeOfRawData 0x8a800
PointerToRawData 0x1048000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.21137

.reloc

MD5 769e0e57576b0ade14643857e53c668e
SHA1 53e7ad9aa70af6d3d4ba6cf628b2c01a055ddd18
SHA256 4761177ae2cd70cc7292e810064fc6c039b7858b8294783f28b3c46a26275778
SHA3 a353526b63ed2810eab073874c02c015d9060f2968d272552ec7b88d11f8f88b
VirtualSize 0x8bf28
VirtualAddress 0x11a5000
SizeOfRawData 0x8c000
PointerToRawData 0x10d2800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.76479

Imports

HID.DLL HidP_GetButtonCaps
HidP_GetCaps
HidD_GetProductString
HidD_GetPreparsedData
HidP_MaxDataListLength
HidP_GetData
HidD_FreePreparsedData
HidP_GetValueCaps
HidD_GetHidGuid
KERNEL32.dll GetLocalTime
GetTimeZoneInformation
LocalFree
TerminateThread
GetSystemInfo
GetSystemTimeAsFileTime
CreateFileW
InitializeCriticalSection
ResetEvent
ReadFile
SetFilePointerEx
WriteFile
SetFilePointer
SetEndOfFile
GetFileAttributesExW
SetFileAttributesW
GetFileAttributesW
CopyFileW
MoveFileExW
FindClose
FindNextFileW
FindFirstFileW
FindFirstFileExW
LoadLibraryExW
InterlockedIncrement
InterlockedDecrement
CreateEventW
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleA
RemoveDirectoryW
DeleteFileW
SetFileTime
GetSystemTime
GetDiskFreeSpaceExA
GetModuleFileNameW
lstrcpynA
lstrcpyA
lstrcpynW
GetCommandLineW
CancelIo
GetOverlappedResult
ExpandEnvironmentStringsW
SetLastError
ResumeThread
GetThreadContext
SuspendThread
OutputDebugStringA
GetEnvironmentVariableA
GetFileAttributesA
GetModuleFileNameA
GetVersionExA
GetCurrentDirectoryA
VerifyVersionInfoW
VerSetConditionMask
GetVersionExW
GlobalMemoryStatusEx
GetUserDefaultUILanguage
GetComputerNameW
GetTempPathW
LocalAlloc
SetUnhandledExceptionFilter
GetCurrentDirectoryW
OpenEventW
DebugBreak
GetFileSize
FileTimeToDosDateTime
FileTimeToLocalFileTime
lstrlenA
GetFileTime
VirtualQuery
GlobalMemoryStatus
SetErrorMode
HeapAlloc
HeapFree
GetCurrentProcess
HeapReAlloc
DecodePointer
EncodePointer
HeapQueryInformation
HeapSize
DuplicateHandle
ExitProcess
SetConsoleCtrlHandler
SystemTimeToFileTime
MapViewOfFile
HeapSetInformation
GetStartupInfoW
GetStdHandle
HeapCreate
IsProcessorFeaturePresent
GetLocaleInfoW
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
InterlockedExchange
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
CreateFileA
CompareStringW
SetEnvironmentVariableA
GetProcessHeap
GetProcessAffinityMask
InterlockedExchangeAdd
VirtualProtect
VirtualAlloc
VirtualFree
SwitchToThread
SetThreadAffinityMask
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
InterlockedFlushSList
GetThreadPriority
OpenEventA
SetWaitableTimer
CreateWaitableTimerA
GetSystemDirectoryA
GetDriveTypeW
PeekNamedPipe
GetFileInformationByHandle
FindFirstFileExA
GetDriveTypeA
FileTimeToSystemTime
SetConsoleMode
ReadConsoleInputA
GetFullPathNameA
GetDateFormatA
GetTimeFormatA
CreateSemaphoreW
FlushInstructionCache
CreateMutexW
SignalObjectAndWait
ExpandEnvironmentStringsA
VerifyVersionInfoA
FlushConsoleInputBuffer
GetVersion
GetCurrentProcessId
GetFullPathNameW
GetModuleHandleW
GetCurrentThreadId
SetThreadPriority
FormatMessageA
ExitThread
CreateFileMappingA
CreateThread
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
UnmapViewOfFile
CreateMutexA
ReleaseMutex
WaitForSingleObject
GetWindowsDirectoryW
IsDebuggerPresent
GetCommandLineA
GetCurrentThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
RaiseException
SleepEx
QueryPerformanceFrequency
QueryPerformanceCounter
SetHandleInformation
FormatMessageW
SetDllDirectoryW
LoadLibraryW
GetLastError
CreateDirectoryW
LoadLibraryA
GetProcAddress
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
InterlockedCompareExchange
CreateEventA
SetEvent
ReleaseSemaphore
WaitForSingleObjectEx
Sleep
CloseHandle
CreateSemaphoreA
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
RtlUnwind
USER32.dll MessageBoxW
IsWindowVisible
ScreenToClient
WindowFromPoint
GetCursorPos
GetCaretBlinkTime
EnumDisplaySettingsA
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
IsClipboardFormatAvailable
CreateIconIndirect
ReleaseDC
GetDC
GetSystemMetrics
SetCursor
CloseClipboard
wvsprintfA
UpdateWindow
MonitorFromWindow
PostQuitMessage
ValidateRect
GetWindowLongW
RegisterClassExW
DialogBoxParamW
EndDialog
LoadIconA
SendDlgItemMessageW
SetDlgItemTextA
SetDlgItemTextW
MessageBoxA
CopyRect
OffsetRect
GetAncestor
UnregisterClassW
SetWindowTextW
GetDesktopWindow
AdjustWindowRectEx
GetWindowPlacement
ChangeDisplaySettingsA
GetDlgItem
SetWindowLongA
CreateDialogParamA
SetWindowPos
GetWindowRect
GetParent
GetThreadDesktop
GetUserObjectInformationA
EnumWindows
RegisterWindowMessageA
SendMessageA
IsIconic
ShowWindow
SetTimer
PeekMessageA
GetMessageA
KillTimer
LoadImageW
DialogBoxParamA
CheckDlgButton
PeekMessageW
CreateDialogParamW
IsDialogMessageW
DispatchMessageW
MsgWaitForMultipleObjects
EnableWindow
CopyImage
SetWindowLongW
IsDlgButtonChecked
LoadCursorA
DestroyCursor
DestroyIcon
SetCapture
ReleaseCapture
UnregisterDeviceNotification
DispatchMessageA
TranslateMessage
PtInRect
GetClientRect
GetWindowLongA
GetProcessWindowStation
GetUserObjectInformationW
SendMessageTimeoutA
GetMessageExtraInfo
RegisterDeviceNotificationW
SystemParametersInfoW
ClientToScreen
DefWindowProcW
DestroyWindow
CreateWindowExW
GetAsyncKeyState
GetKeyState
wsprintfA
RegisterRawInputDevices
GetRawInputData
GetRawInputDeviceInfoW
GetRawInputDeviceList
SetForegroundWindow
ClipCursor
SetCursorPos
ShowCursor
GetFocus
SetFocus
EnumDisplayDevicesA
EnumDisplayMonitors
GetMonitorInfoA
RegisterClassW
VERSION.dll GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
ole32.dll CoUninitialize
CoInitialize
CoCreateGuid
CoTaskMemAlloc
CoTaskMemFree
CoSetProxyBlanket
StringFromGUID2
PropVariantClear
CoCreateInstance
SHLWAPI.dll PathCanonicalizeW
PathFileExistsW
SHDeleteKeyW
ADVAPI32.dll CryptGetHashParam
RegisterEventSourceA
ReportEventA
DeregisterEventSource
CryptImportKey
CryptVerifySignatureA
CryptDestroyKey
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyW
OpenProcessToken
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
GetUserNameA
GetSidSubAuthority
GetTokenInformation
GDI32.dll SwapBuffers
DeleteObject
CreateBitmap
CreateDIBSection
SetPixelFormat
ChoosePixelFormat
GetDeviceCaps
GetObjectA
SHELL32.dll CommandLineToArgvW
SHGetFolderPathW
ShellExecuteW
SHFileOperationW
OPENGL32.dll wglGetCurrentContext
wglCreateContext
wglMakeCurrent
wglDeleteContext
wglGetProcAddress
wglGetCurrentDC
WINMM.dll timeBeginPeriod
waveInGetNumDevs
timeEndPeriod
waveOutGetDevCapsA
waveOutGetDevCapsW
waveOutClose
waveOutOpen
waveOutUnprepareHeader
waveOutWrite
waveOutReset
waveOutGetPosition
timeGetTime
waveOutGetNumDevs
waveInPrepareHeader
waveInUnprepareHeader
waveInGetDevCapsA
waveInGetDevCapsW
waveInStart
waveInOpen
waveInClose
waveInReset
waveOutPrepareHeader
waveInAddBuffer
WS2_32.dll accept
ntohs
gethostname
socket
WSAGetLastError
connect
WSAAsyncGetHostByName
WSAStartup
inet_ntoa
closesocket
WSACleanup
htonl
bind
htons
inet_addr
WSACancelAsyncRequest
getsockopt
WSAEventSelect
WSACloseEvent
WSACreateEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSAEnumNetworkEvents
WSASetEvent
getpeername
getprotobyname
recv
gethostbyname
ntohl
shutdown
getnameinfo
getaddrinfo
WSAIoctl
recvfrom
sendto
send
select
__WSAFDIsSet
freeaddrinfo
WSASocketA
WSASetLastError
setsockopt
ioctlsocket
getsockname
listen
OLEAUT32.dll VariantClear
SysAllocString
SysFreeString
VariantChangeType
VariantInit
IMM32.dll ImmReleaseContext
ImmSetOpenStatus
ImmGetConversionStatus
ImmGetCompositionStringW
ImmAssociateContextEx
ImmAssociateContext
ImmGetContext
ImmSetCompositionStringW
DNSAPI.dll DnsQuery_A
DnsFree
IPHLPAPI.DLL GetIpAddrTable
WINHTTP.dll WinHttpGetIEProxyConfigForCurrentUser

Delayed Imports

??0Allocator@shdfnd@physx@@QAE@PBD@Z

Ordinal 1
Address 0x879cf0

??0ErrorHandler@shdfnd@physx@@QAE@XZ

Ordinal 2
Address 0x8af170

??0FPUGuard@shdfnd@physx@@QAE@XZ

Ordinal 3
Address 0xa9fa60

??0Foundation@shdfnd@physx@@AAE@AAVPxErrorCallback@2@AAVPxAllocatorCallback@2@@Z

Ordinal 4
Address 0x87a120

??0MutexImpl@shdfnd@physx@@QAE@XZ

Ordinal 5
Address 0x8aefb0

??0PAUtils@shdfnd@physx@@QAE@XZ

Ordinal 6
Address 0x8af330

??0PxFoundation@physx@@QAE@ABV01@@Z

Ordinal 7
Address 0x879bb0

??0PxFoundation@physx@@QAE@XZ

Ordinal 8
Address 0x879ba0

??0ReadWriteLock@shdfnd@physx@@QAE@XZ

Ordinal 9
Address 0x8af090

??0SListImpl@shdfnd@physx@@QAE@XZ

Ordinal 10
Address 0xa253b0

??0SyncImpl@shdfnd@physx@@QAE@XZ

Ordinal 11
Address 0xa48480

??0TempAllocator@shdfnd@physx@@QAE@PBD@Z

Ordinal 12
Address 0x879cf0

??0ThreadImpl@shdfnd@physx@@QAE@P6APAXPAX@Z0@Z

Ordinal 13
Address 0xa48970

??0ThreadImpl@shdfnd@physx@@QAE@XZ

Ordinal 14
Address 0xa48560

??0Time@shdfnd@physx@@QAE@XZ

Ordinal 15
Address 0xa807d0

??1ErrorHandler@shdfnd@physx@@QAE@XZ

Ordinal 16
Address 0x8af180

??1FPUGuard@shdfnd@physx@@QAE@XZ

Ordinal 17
Address 0xa9faa0

??1Foundation@shdfnd@physx@@EAE@XZ

Ordinal 18
Address 0x87a000

??1MutexImpl@shdfnd@physx@@QAE@XZ

Ordinal 19
Address 0x8aefd0

??1PAUtils@shdfnd@physx@@QAE@XZ

Ordinal 20
Address 0x8af810

??1PxFoundation@physx@@MAE@XZ

Ordinal 21
Address 0x879b90

??1ReadWriteLock@shdfnd@physx@@QAE@XZ

Ordinal 22
Address 0x8af0d0

??1SListImpl@shdfnd@physx@@QAE@XZ

Ordinal 23
Address 0xa25390

??1SyncImpl@shdfnd@physx@@QAE@XZ

Ordinal 24
Address 0xa484a0

??1ThreadImpl@shdfnd@physx@@QAE@XZ

Ordinal 25
Address 0xa488d0

??4Allocator@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 26
Address 0x879cf0

??4ErrorHandler@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 27
Address 0x879c50

??4FPUGuard@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 28
Address 0x879bc0

??4MutexImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 29
Address 0x879cf0

??4PAUtils@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 30
Address 0x879c00

??4PxFoundation@physx@@QAEAAV01@ABV01@@Z

Ordinal 31
Address 0x879cf0

??4SListImpl@shdfnd@physx@@QAEAAU012@ABU012@@Z

Ordinal 32
Address 0x879cf0

??4SyncImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 33
Address 0x879cf0

??4TempAllocator@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 34
Address 0x879cf0

??4ThreadImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 35
Address 0x879cf0

??4Time@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 36
Address 0xa80680

??_7Foundation@shdfnd@physx@@6B@

Ordinal 37
Address 0xf58898

??_7PxFoundation@physx@@6B@

Ordinal 38
Address 0xf58628

??_FAllocator@shdfnd@physx@@QAEXXZ

Ordinal 39
Address 0x5d3f20

??_FTempAllocator@shdfnd@physx@@QAEXXZ

Ordinal 40
Address 0x5d3f20

?MAX_LISTENER_COUNT@ErrorHandler@shdfnd@physx@@2IB

Ordinal 41
Address 0xf58624

?PxDiagonalize@physx@@YA?AVPxVec3@1@ABVPxMat33@1@AAVPxQuat@1@@Z

Ordinal 42
Address 0x8eadb0

?PxShortestRotation@physx@@YA?AVPxQuat@1@ABVPxVec3@1@0@Z

Ordinal 43
Address 0x8ea720

?PxTransformFromPlaneEquation@physx@@YA?AVPxTransform@1@ABVPxPlane@1@@Z

Ordinal 44
Address 0x8ea8c0

?PxTransformFromSegment@physx@@YA?AVPxTransform@1@ABVPxVec3@1@0PAM@Z

Ordinal 45
Address 0x8eab60

?TlsAlloc@shdfnd@physx@@YAIXZ

Ordinal 46
Address 0xa487a0

?TlsFree@shdfnd@physx@@YAXI@Z

Ordinal 47
Address 0xa487b0

?TlsGet@shdfnd@physx@@YAPAXI@Z

Ordinal 48
Address 0xa487c0

?TlsSet@shdfnd@physx@@YAIIPAX@Z

Ordinal 49
Address 0xa487d0

?allocate@Allocator@shdfnd@physx@@QAEPAXIPBDH@Z

Ordinal 50
Address 0x8af110

?allocate@TempAllocator@shdfnd@physx@@QAEPAXIPBDH@Z

Ordinal 51
Address 0x8ebe20

?atomicAdd@shdfnd@physx@@YAHPCHH@Z

Ordinal 52
Address 0x995750

?atomicCompareExchange@shdfnd@physx@@YAHPCHHH@Z

Ordinal 53
Address 0x9956f0

?atomicCompareExchangePointer@shdfnd@physx@@YAPAXPAPCXPAX1@Z

Ordinal 54
Address 0x995710

?atomicDecrement@shdfnd@physx@@YAHPCH@Z

Ordinal 55
Address 0x995740

?atomicExchange@shdfnd@physx@@YAHPCHH@Z

Ordinal 56
Address 0x9956d0

?atomicIncrement@shdfnd@physx@@YAHPCH@Z

Ordinal 57
Address 0x995730

?atomicMax@shdfnd@physx@@YAHPCHH@Z

Ordinal 58
Address 0x995780

?computeQuatFromNormal@shdfnd@physx@@YA?AVPxQuat@2@ABVPxVec3@2@@Z

Ordinal 59
Address 0x97c780

?createInstance@Foundation@shdfnd@physx@@SAPAV123@IAAVPxErrorCallback@3@AAVPxAllocatorCallback@3@@Z

Ordinal 60
Address 0x87a1e0

?deallocate@Allocator@shdfnd@physx@@QAEXPAX@Z

Ordinal 61
Address 0x8af150

?deallocate@TempAllocator@shdfnd@physx@@QAEXPAX@Z

Ordinal 62
Address 0x8ebf20

?debugEvent@PAUtils@shdfnd@physx@@QAEXGII@Z

Ordinal 63
Address 0x8af7e0

?decRefCount@Foundation@shdfnd@physx@@SAXXZ

Ordinal 64
Address 0x879f10

?destroyInstance@Foundation@shdfnd@physx@@SAXXZ

Ordinal 65
Address 0x879e70

?disableFPExceptions@shdfnd@physx@@YAXXZ

Ordinal 66
Address 0xa9fb00

?enableFPExceptions@shdfnd@physx@@YAXXZ

Ordinal 67
Address 0xa9fae0

?error@Foundation@shdfnd@physx@@QAAXW4Enum@PxErrorCode@3@PBDH1ZZ

Ordinal 68
Address 0x879e00

?errorImpl@Foundation@shdfnd@physx@@QAEXW4Enum@PxErrorCode@3@PBDH1PAD@Z

Ordinal 69
Address 0x879d90

?flush@SListImpl@shdfnd@physx@@QAEPAVSListEntry@23@XZ

Ordinal 70
Address 0xa253f0

?getAllocator@Foundation@shdfnd@physx@@UBEAAVPxBroadcastingAllocator@3@XZ

Ordinal 71
Address 0x879c70

?getAllocator@shdfnd@physx@@YAAAVPxAllocatorCallback@2@XZ

Ordinal 72
Address 0x879df0

?getAllocatorCallback@Foundation@shdfnd@physx@@UBEAAVPxAllocatorCallback@3@XZ

Ordinal 73
Address 0x879d40

?getBootCounterFrequency@Time@shdfnd@physx@@SAABUCounterFrequencyToTensOfNanos@23@XZ

Ordinal 74
Address 0xa806e0

?getCallbackCount@ErrorHandler@shdfnd@physx@@QBEIXZ

Ordinal 75
Address 0x879c40

?getCheckedAllocator@Foundation@shdfnd@physx@@QAEAAVPxAllocatorCallback@3@XZ

Ordinal 76
Address 0x879c70

?getCounterFrequency@Time@shdfnd@physx@@SA?AUCounterFrequencyToTensOfNanos@23@XZ

Ordinal 77
Address 0xa806f0

?getCurrentCounterValue@Time@shdfnd@physx@@SA_KXZ

Ordinal 78
Address 0xa80720

?getCurrentTimeInTensOfNanoSeconds@Time@shdfnd@physx@@SA_KXZ

Ordinal 79
Address 0xa80810

?getDefaultStackSize@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 80
Address 0xa487f0

?getElapsedSeconds@Time@shdfnd@physx@@QAENXZ

Ordinal 81
Address 0xa80740

?getErrorCallback@ErrorHandler@shdfnd@physx@@QBEPAVPxErrorCallback@3@H@Z

Ordinal 82
Address 0x6c2040

?getErrorCallback@Foundation@shdfnd@physx@@UBEAAVPxErrorCallback@3@XZ

Ordinal 83
Address 0x879d50

?getErrorHandler@Foundation@shdfnd@physx@@QAEAAVErrorHandler@23@XZ

Ordinal 84
Address 0x879ce0

?getErrorLevel@Foundation@shdfnd@physx@@UBE?AW4Enum@PxErrorCode@3@XZ

Ordinal 85
Address 0x879d70

?getErrorMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 86
Address 0x729870

?getId@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 87
Address 0xa48550

?getInstance@Foundation@shdfnd@physx@@SAAAV123@XZ

Ordinal 88
Address 0x879d20

?getLastTime@Time@shdfnd@physx@@QBENXZ

Ordinal 89
Address 0xa807c0

?getMaxCallbackNum@ErrorHandler@shdfnd@physx@@QBEIXZ

Ordinal 90
Address 0x1076e0

?getNamedAllocMap@Foundation@shdfnd@physx@@QAEAAV?$HashMap@PBVNamedAllocator@shdfnd@physx@@PBDU?$Hash@PBVNamedAllocator@shdfnd@physx@@@23@VNonTrackingAllocator@23@@23@XZ

Ordinal 91
Address 0x879ca0

?getNamedAllocMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 92
Address 0x879cb0

?getNbPhysicalCores@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 93
Address 0xa48800

?getPAUtils@Foundation@shdfnd@physx@@QAEAAVPAUtils@23@XZ

Ordinal 94
Address 0x2165c0

?getPriority@ThreadImpl@shdfnd@physx@@SA?AW4Enum@ThreadPriority@23@I@Z

Ordinal 95
Address 0xa48750

?getReportAllocationNames@Foundation@shdfnd@physx@@UBE_NXZ

Ordinal 96
Address 0x879c80

?getSize@MutexImpl@shdfnd@physx@@SAABIXZ

Ordinal 97
Address 0x8af010

?getSize@SListImpl@shdfnd@physx@@SAABIXZ

Ordinal 98
Address 0xa253a0

?getSize@SyncImpl@shdfnd@physx@@SAABIXZ

Ordinal 99
Address 0xa48470

?getSize@ThreadImpl@shdfnd@physx@@SAABIXZ

Ordinal 100
Address 0xa48540

?getTempAllocFreeTable@Foundation@shdfnd@physx@@QAEAAV?$Array@PATTempAllocatorChunk@shdfnd@physx@@VAllocator@23@@23@XZ

Ordinal 101
Address 0x879cc0

?getTempAllocMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 102
Address 0x879cd0

?getWarnOnceTimestamp@Foundation@shdfnd@physx@@SAIXZ

Ordinal 103
Address 0x879d30

?incRefCount@Foundation@shdfnd@physx@@SAXXZ

Ordinal 104
Address 0x879ee0

?integrateTransform@shdfnd@physx@@YAXABVPxTransform@2@ABVPxVec3@2@1MAAV32@@Z

Ordinal 105
Address 0x97c520

?isEnabled@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 106
Address 0x8af5c0

?isEventEnabled@PAUtils@shdfnd@physx@@QAE_NG@Z

Ordinal 107
Address 0x8af590

?kill@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 108
Address 0xa485e0

?lock@MutexImpl@shdfnd@physx@@QAEXXZ

Ordinal 109
Address 0x8aefe0

?lock@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 110
Address 0x8af340

?lockReader@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 111
Address 0x8af030

?lockWriter@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 112
Address 0x8af060

?mInstance@Foundation@shdfnd@physx@@0PAV123@A

Ordinal 113
Address 0x10c9990

?mRefCount@Foundation@shdfnd@physx@@0IA

Ordinal 114
Address 0x10c9994

?mWarnOnceTimestap@Foundation@shdfnd@physx@@0IA

Ordinal 115
Address 0x10c9998

?optimizeBoundingBox@shdfnd@physx@@YA?AVPxVec3@2@AAVPxMat33@2@@Z

Ordinal 116
Address 0x97c8f0

?peekElapsedSeconds@Time@shdfnd@physx@@QAENXZ

Ordinal 117
Address 0xa80780

?pop@SListImpl@shdfnd@physx@@QAEPAVSListEntry@23@XZ

Ordinal 118
Address 0xa253e0

?push@SListImpl@shdfnd@physx@@QAEXPAVSListEntry@23@@Z

Ordinal 119
Address 0xa253c0

?quit@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 120
Address 0xa485d0

?quitIsSignalled@ThreadImpl@shdfnd@physx@@QAE_NXZ

Ordinal 121
Address 0xa485b0

?rawEvent@PAUtils@shdfnd@physx@@QAEXGIIE@Z

Ordinal 122
Address 0x8af5e0

?rawEventWithTimestamp@PAUtils@shdfnd@physx@@QAE_NG_KIIE@Z

Ordinal 123
Address 0x8af390

?registerErrorCallback@ErrorHandler@shdfnd@physx@@QAEHAAVPxErrorCallback@3@@Z

Ordinal 124
Address 0x8af210

?registerEvent@PAUtils@shdfnd@physx@@QAEGPBD@Z

Ordinal 125
Address 0x8af860

?release@Foundation@shdfnd@physx@@UAEXXZ

Ordinal 126
Address 0x879f40

?reportError@ErrorHandler@shdfnd@physx@@QAEXW4Enum@PxErrorCode@3@PBD1H@Z

Ordinal 127
Address 0x8af1b0

?reset@SyncImpl@shdfnd@physx@@QAEXXZ

Ordinal 128
Address 0xa484b0

?sNumTensOfNanoSecondsInASecond@Time@shdfnd@physx@@2_KB

Ordinal 129
Address 0xf5f650

?set@SyncImpl@shdfnd@physx@@QAEXXZ

Ordinal 130
Address 0xa484c0

?setAffinityMask@ThreadImpl@shdfnd@physx@@QAEII@Z

Ordinal 131
Address 0xa48620

?setErrorLevel@Foundation@shdfnd@physx@@UAEXW4Enum@PxErrorCode@3@@Z

Ordinal 132
Address 0x879d60

?setName@ThreadImpl@shdfnd@physx@@QAEXPBD@Z

Ordinal 133
Address 0xa48650

?setPriority@ThreadImpl@shdfnd@physx@@QAEXW4Enum@ThreadPriority@23@@Z

Ordinal 134
Address 0xa486d0

?setReportAllocationNames@Foundation@shdfnd@physx@@UAEX_N@Z

Ordinal 135
Address 0x879c90

?signalQuit@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 136
Address 0xa48580

?sleep@ThreadImpl@shdfnd@physx@@SAXI@Z

Ordinal 137
Address 0xa48600

?slerp@shdfnd@physx@@YA?AVPxQuat@2@MABV32@0@Z

Ordinal 138
Address 0x97c360

?start@ThreadImpl@shdfnd@physx@@QAEXIPAVRunnable@23@@Z

Ordinal 139
Address 0xa48900

?startEvent@PAUtils@shdfnd@physx@@QAEXGG@Z

Ordinal 140
Address 0x8af610

?statEvent@PAUtils@shdfnd@physx@@QAEXGI@Z

Ordinal 141
Address 0x8af770

?statEvent@PAUtils@shdfnd@physx@@QAEXGII@Z

Ordinal 142
Address 0x8af7b0

?stopEvent@PAUtils@shdfnd@physx@@QAEXGG@Z

Ordinal 143
Address 0x8af6c0

?trylock@MutexImpl@shdfnd@physx@@QAE_NXZ

Ordinal 144
Address 0x8aeff0

?unRegisterErrorCallback@ErrorHandler@shdfnd@physx@@QAEXAAVPxErrorCallback@3@@Z

Ordinal 145
Address 0x8af2d0

?unRegisterErrorCallback@ErrorHandler@shdfnd@physx@@QAEXH@Z

Ordinal 146
Address 0x8af280

?unlock@MutexImpl@shdfnd@physx@@QAEXXZ

Ordinal 147
Address 0x8af000

?unlock@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 148
Address 0x8af3c0

?unlockReader@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 149
Address 0x8af020

?unlockWriter@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 150
Address 0x8af080

?wait@SyncImpl@shdfnd@physx@@QAE_NI@Z

Ordinal 151
Address 0xa484d0

?waitForQuit@ThreadImpl@shdfnd@physx@@QAE_NXZ

Ordinal 152
Address 0xa48590

?waitForever@SyncImpl@shdfnd@physx@@2IB

Ordinal 153
Address 0xf5e060

?yield@ThreadImpl@shdfnd@physx@@SAXXZ

Ordinal 154
Address 0xa48610

AmdPowerXpressRequestHighPerformance

Ordinal 155
Address 0x10201c0

NvOptimusEnablement

Ordinal 156
Address 0x10201bc

PxCreateFoundation

Ordinal 157
Address 0x87a2e0

PxGetFoundation

Ordinal 158
Address 0x879d80

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.94836
MD5 eb27bc2011c60d1f76829366d1f225e8
SHA1 20aeaba83d4ae5f41c9f8cb6f58c099085b7d2ed
SHA256 ed5a985644303102ffbb22d69ae4d7e1c720950cc56db033263f2650cb7fb086
SHA3 3a5861d8f73917d3d8dcf4c0873147342c7dbbb4d38048fae8446c9939155bc5

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x988
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.92828
MD5 3c54a7267333db5a6924cee1a7c85e57
SHA1 4bfab9f44f0187f79e8a688cdefd62fbe04e2d40
SHA256 def927fb4bda7392c3a55ecddffd0ceda4956a58a7ff52b09da08fb3b28c1556
SHA3 1ffecf78f2a7c3397dc8fcff33f8c90c441a826b02faaa50a53ef89721a9048b

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.8204
MD5 5bfaf70b197fc02e9c5029e522d35419
SHA1 18c8092d7cd6a088dc09a8ae35a8c76b703b9fed
SHA256 28ddb7e1bcd00efc071a6c8bd738a9da394380f3c5a9c02f3bf3b38b5d5a68a5
SHA3 1b5d6713cd198c9413be24b2185abf8afd8249002d87bd17379ff09d6e39eb7e

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.58259
MD5 873a59e4fe49d5a7c8ad3dff60913324
SHA1 eeb8b7feab092cf6951393b06ee50dd0e46b11a6
SHA256 cecdbdaae598c186697bd0d65f1c677056dc9bae423ab431955dcc21c0573a0f
SHA3 4d60dffcf943c27d0c29943856d638eefa2bfcd12df20267780793526545de7f

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.50277
MD5 1364b7ba61b1b83a0436ee6bd9b840ef
SHA1 bb4d971c520b6077c11ad0b87230d280d0c15e90
SHA256 bfef1f7febba8ab3e468df8a67f07207f2130d706498463f1b61c8accff47d77
SHA3 ad8251290f8fb85defabe02a7067ded5ffd349068abad8ceaeab6b28b589ee31

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x94a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.37304
MD5 3a72b2c014e2438ad8a1101a742ab67b
SHA1 4de2baf41cf25cf2bef10fe774823abaf3dc8bc4
SHA256 51f7c2c98f5d647e07f20606eb1ce5fcd65c11444e013b3f138f6b2054405957
SHA3 a7076251d73217515231ebe7af9bed82f4de534cb55b8e5af3eed7b812eef0e7

7

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.27191
MD5 0f946a8ab2b0ec966947ffe075630e7b
SHA1 c136d24bf6b2731a776328f15d16005362893dd6
SHA256 5f161dfc6e19553a59f9561ee6b8e4384622e03554c36edd7ceb9d375bc4c41a
SHA3 487aac941cfed3d89e3fa43807a03adcff50170cc73c5434defd2d0336f17c21

8

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.18576
MD5 cfcd6fd425e655ea3d9f458941a5f818
SHA1 35398a2708c5917955c7812bbbc2b1ae6ed8259e
SHA256 472cddae35528d106bcade038642fbdcb805b18989b81704ace795b45683f6d1
SHA3 c91030f4f4a8116cdd71ec73d8aeecc749cc5a20a7a82d3979ba9bd29e794263

9

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x42028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.11785
MD5 4b5c6a7dac15d0e03d5368c53aff61b4
SHA1 684f318ccd7350d03c4d68d5066a73d9fb5fbb60
SHA256 3656c7a64d5805ed07179449aa75f7a04644f265e346ba23fb919e573613c226
SHA3 24360307ac58dd3398f8662cc79ca7d15c29dc2006d02113b4677f19e2090533

9 (#2)

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x124
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.99471
MD5 b62b6b1e4cd3054ab1b07b033356d108
SHA1 c0170ce1c06de46e62508e1d774d64e952cd111a
SHA256 6a3c71d7f89e83280ff2aa75c76d49c3239060f8ee53cfc2692e05c4fc9c7eab
SHA3 9e885ae1d0f740d603c9ef2ca1a92c8a61ddb587a0f50bee653496e0ac8fe4f6

105

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x10c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.98084
MD5 2165d3c35627dfb0f24dfa8839b650c1
SHA1 5168d394292dd31902f3f8112b22cd604529f378
SHA256 7aa854f2b6bf3241c666d0b851ecaea27082934a4b2fa43db752591dfcf9434e
SHA3 395d76a75afaab97318d9ea2f3785b5ade74331f689f98e69f22f301be84d67a

107

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x1c2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.19606
MD5 e71ed01bef9a6e44b5a60f28e2d14320
SHA1 28a0948d37b93bfd392044a4338968bd3f4de535
SHA256 af380b7f1f6bedba49ef3833569a36314f9834b759bfbdc7f5474d65081186c6
SHA3 a275daef8cf31a8e4d53a63b80b73137c0c41a126920ed0b63416f8643332d35

108

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0xdc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.23439
MD5 89647fd8d7ee80b9e9e46db2a1053a29
SHA1 10dd88f00a8f56cce48908628abe1215235f624a
SHA256 692985cf029eb28098357336ea128b16211fb8fb8ab3e8f90949a952a2514f65
SHA3 01c77f889f7bb48a0744fe4f076df03cf74591df831c9d043237c2a7a7426f3e

109

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x8e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.09377
MD5 839f2e562a1f062fd873414ab28cf1d2
SHA1 ed961a5852bd1ac5b55fa8fd70fa8213754abc57
SHA256 296b7d861a9ee473d4e8a62f9d7adb025d1fbe8e61206870f426e5c870a98936
SHA3 6a4b1fab7319e07585d923be21a3d852ecc1988286973bf8440e25f2a35a3cd0

103

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x84
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.04448
Detected Filetype Icon file
MD5 3bf2dac037ce87794e66ff7f054e913f
SHA1 52ca961fd37ad960905a681d1db5157508ef1602
SHA256 2a87b1f32c5d0435090c72c392b75394f706e5750eff64fd85d25e1c622ee581
SHA3 8454d3273522657b5926068082b2cb88f6dbf352e7e9568008c0e33c792f349b

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x1a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.35701
MD5 0d4201f5e131457d481bbd742b177f10
SHA1 60f8ee6c3cc65f2d1a25117fa41555bd4f53bee3
SHA256 c86139582b5a8285376eb75c79a1943c2bc4e6cc374460d1922fc6d99cdd2e5c
SHA3 5ca6f60b5e9b3acac25ffb4a299a3b4c6ded030703daa987e1b098df5293d673

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x581
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.37424
MD5 ed4212968d15a196c34d461040b44336
SHA1 4d331b10588bcfeb306ba2ad31ce5ee96e12667c
SHA256 b91c0fd1d3a91447a5b1207d1f625d19a6a0df1921aac32c60ffbd8e0a11ef00
SHA3 914a36db86cc3ab4399e6e59366be51f0f6dae23a7a55f7e19ea927f9dd1a2b0

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 5.5.1.53258
ProductVersion 5.5.1.53258
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language English - United States
FileVersion (#2) 5.5.1.8966154
ProductVersion (#2) 5.5.1.8966154
Unity Version 5.5.1f1_88d00a7498cd
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2017-Jan-19 12:10:52
Version 0.0
SizeofData 137
AddressOfRawData 0xfecefc
PointerToRawData 0xfeb6fc
Referenced File C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\player_win_x86.pdb

TLS Callbacks

Load Configuration

RICH Header

XOR Key 0x78e26d3d
Unmarked objects 0
ASM objects (VS2008 build 21022) 2
C++ objects (VS2010 build 30319) 4
Imports (VS2008 SP1 build 30729) 36
C objects (VS2012 build 50727 / VS2005 build 50727) 1
C objects (VS2008 SP1 build 30729) 33
Imports (VS2003 (.NET) build 4035) 3
Total imports 516
152 (20115) 8
ASM objects (VS2010 SP1 build 40219) 71
Unmarked objects (#2) 195
C objects (VS2010 SP1 build 40219) 1043
C++ objects (VS2010 SP1 build 40219) 2465
Exports (VS2010 SP1 build 40219) 1
Resource objects (VS2010 SP1 build 40219) 1
Linker (VS2010 SP1 build 40219) 1

Errors

Leave a comment

No comments yet.