3e8a5e36517711e5bab18fc1ad4f9243

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2017-Jan-06 00:07:59
Detected languages English - United States
Debug artifacts C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\player_win_x86.pdb
FileVersion 5.5.0.3120186
ProductVersion 5.5.0.3120186
Unity Version 5.5.0p4_2f9c3a0f4141

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ v6.0 DLL
Microsoft Visual C++ 6.0 - 8.0
Microsoft Visual C++
Microsoft Visual C++ v6.0
Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to system / monitoring tools:
  • rundll32.exe
Contains references to internet browsers:
  • firefox.exe
  • iexplore.exe
Tries to detect virtualized environments:
  • HARDWARE\DESCRIPTION\System
  • b3 eb 36 e4 4f 52 ce 11 9f 53 00 20 af 0b a7 70
Looks for VMWare presence:
  • VMWare
Accesses the WMI:
  • root\cimv2
Contains domain names:
  • api.uca.cloud.unity3d.com
  • cdp.cloud.unity3d.com
  • cloud.unity3d.com
  • config.uca.cloud.unity3d.com
  • connectiontester.unity3d.com
  • connectiontesterbeta.unity3d.com
  • cs.unc.edu
  • curl.haxx.se
  • example.com
  • facilitator.unity3d.com
  • facilitatorbeta.unity3d.com
  • http://curl.haxx.se
  • http://curl.haxx.se/docs/http-cookies.html
  • http://msdl.microsoft.com
  • http://msdl.microsoft.com/download/symbols
  • http://unity3d.com
  • http://www.openssl.org
  • http://www.openssl.org/support/faq.html
  • https://api.uca.cloud.unity3d.com
  • https://api.uca.cloud.unity3d.com/v1/events
  • https://cdp.cloud.unity3d.com
  • https://cdp.cloud.unity3d.com/v1/events
  • https://config.uca.cloud.unity3d.com
  • https://stats.unity3d.com
  • https://stats.unity3d.com/HWStats.cgi
  • https://stats.unity3d.com/HWStatsUpdate.cgi
  • masterserver.unity3d.com
  • masterserverbeta.unity3d.com
  • microsoft.com
  • msdl.microsoft.com
  • normal.xyz
  • openssl.org
  • proxy.unity3d.com
  • proxybeta.unity3d.com
  • stats.unity3d.com
  • tangent.xyz
  • uca.cloud.unity3d.com
  • unity3d.com
  • vertex.xyz
  • www.openssl.org
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to AES
Uses constants related to Blowfish
Uses constants related to TEA
Uses known Diffie-Helman primes
Uses known Mersenne Twister constants
Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .trace
Unusual section name found: .data1
Unusual section name found: .bind
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExW
  • LoadLibraryW
  • LoadLibraryA
  • GetProcAddress
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • SHDeleteKeyW
  • RegDeleteValueA
  • RegQueryValueExA
  • RegSetValueExA
  • RegCreateKeyW
  • RegOpenKeyExW
  • RegCloseKey
  • RegQueryValueExW
  • RegSetValueExW
  • RegCreateKeyExW
Possibly launches other programs:
  • ShellExecuteW
Uses Windows's Native API:
  • ntohs
  • ntohl
Uses Microsoft's cryptographic API:
  • CryptGetHashParam
  • CryptImportKey
  • CryptVerifySignatureA
  • CryptDestroyKey
  • CryptDestroyHash
  • CryptHashData
  • CryptReleaseContext
  • CryptCreateHash
  • CryptAcquireContextA
Can create temporary files:
  • CreateFileW
  • GetTempPathW
  • CreateFileA
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Has Internet access capabilities:
  • WinHttpGetIEProxyConfigForCurrentUser
Leverages the raw socket API to access the Internet:
  • accept
  • ntohs
  • gethostname
  • socket
  • WSAGetLastError
  • connect
  • WSAAsyncGetHostByName
  • WSAStartup
  • inet_ntoa
  • closesocket
  • WSACleanup
  • htonl
  • bind
  • htons
  • inet_addr
  • WSACancelAsyncRequest
  • getsockopt
  • WSAEventSelect
  • WSACloseEvent
  • WSACreateEvent
  • WSAWaitForMultipleEvents
  • WSAResetEvent
  • WSAEnumNetworkEvents
  • WSASetEvent
  • getpeername
  • getprotobyname
  • recv
  • gethostbyname
  • ntohl
  • shutdown
  • getnameinfo
  • getaddrinfo
  • WSAIoctl
  • recvfrom
  • sendto
  • send
  • select
  • __WSAFDIsSet
  • freeaddrinfo
  • WSASocketA
  • WSASetLastError
  • setsockopt
  • ioctlsocket
  • getsockname
  • listen
Functions related to the privilege level:
  • OpenProcessToken
Enumerates local disk drives:
  • GetDriveTypeW
  • GetDriveTypeA
Can use the microphone to record audio:
  • waveInOpen
Reads the contents of the clipboard:
  • GetClipboardData
Suspicious VirusTotal score: 1/71 (Scanned on 2026-02-08 01:16:18) VBA32: BScope.Trojan.Agent

Hashes

MD5 3e8a5e36517711e5bab18fc1ad4f9243
SHA1 32d01ea495efd97e35f97fab16781ee8ab0fade1
SHA256 0dbfd532179f0639b2f7db3b5a9b88e8968e7ba846f2a4698856534ee34377b2
SHA3 516aaf9f01e6aa68914f9cedf912253fa1187546bcc5d0ad197008295cf86534
SSDeep 393216:t/imlWCZK7U3ayoDpxjvxkYnFYI3WhPVtjuv9ms4yZleY0M/xxQKkTAjVbp4:sWyHp0LK06c
Imports Hash 50e57fe09abdcc2e55ceaa3b20bbd1da

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x128

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 10
TimeDateStamp 2017-Jan-06 00:07:59
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 10.0
SizeOfCode 0xe45400
SizeOfInitializedData 0x3e7600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00792A7B (Section: .text)
BaseOfCode 0x1000
BaseOfData 0xe47000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.1
ImageVersion 0.0
SubsystemVersion 5.1
Win32VersionValue 0
SizeOfImage 0x1254000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 9b6959efa8e5eba51e50b7b1200541f7
SHA1 c60fa361ab3e208e1a92fe05b0489340777dfb52
SHA256 0c09d56cbcd220165e643be40ccf47f3ba2dbdbb10b0aea8a085a3d69287edd2
SHA3 30275f45a494af0fcd77d1f9be265ef23b4185c9648220fe737bde477355e231
VirtualSize 0xe4524a
VirtualAddress 0x1000
SizeOfRawData 0xe45400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.76449

.rdata

MD5 abf735eaacc07d6dd594c8ce381fcb18
SHA1 8437e6644e38936d3b4d0f0b38ab327d393e93fe
SHA256 db33f05440d9c323dd1106afc91ccbd4c201298794b422761ee5095e6c88574b
SHA3 faf929e0d82384215c4e6b9b8d49eeb5f9b96565752751ac4f724ef4a6b5318d
VirtualSize 0x1c6acd
VirtualAddress 0xe47000
SizeOfRawData 0x1c6c00
PointerToRawData 0xe45800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.16229

.data

MD5 10269debe2fe257c0dac1ccff33742f9
SHA1 c1676b9dfa51a89f18c8658e14919b11a72a450e
SHA256 1ff613f1a133a63b14b223f03f3436bb4d37c42946542f70c9e6dc51cf7c0fd2
SHA3 3447132776b22a6b7d3e8df38a20311a0a7268f9e12718331ff0a9c56d38478b
VirtualSize 0x106e60
VirtualAddress 0x100e000
SizeOfRawData 0x38a00
PointerToRawData 0x100c400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.70859

.rodata

MD5 6cd27e3241430d756df37aef639cf48a
SHA1 8576e5bfef4f234eb7c754eb52e99698104a00c4
SHA256 144a34dada4708a578ca10af3f642be898566e2b31fb81ee1885b83f4983ebf2
SHA3 c62b9812b4d51c68577d75fd2bc029d35bfd3175295f479c2aca6c46832b0114
VirtualSize 0xad0
VirtualAddress 0x1115000
SizeOfRawData 0xc00
PointerToRawData 0x1044e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.97031

.trace

MD5 630a6c1fa114517a85cc515181f40aae
SHA1 033de86c80f3bc7d6e1083ccfa3f7dd35d575000
SHA256 d1ef87872af088d15e299a148bfaf4d0d1b82a242be02f2c4af5d02c721252cf
SHA3 efc1578a8987462ef3c8b83d9883a834099e01ea85d6405a591bffa19f6cd56e
VirtualSize 0x1d98
VirtualAddress 0x1116000
SizeOfRawData 0x1e00
PointerToRawData 0x1045a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.297

.data1

MD5 f5688adfeaf35cd6be99948b3e39f323
SHA1 2f55833ab355e954606909994f39dda329ac124f
SHA256 e4c3899536c9b4e013c94c9d414ad6c0902675cabdca901b48355f1cfc5b257c
SHA3 250e3c80907146c70bf643680ffe1d340a35f3acc2c6b24760df231480e9ac57
VirtualSize 0x40
VirtualAddress 0x1118000
SizeOfRawData 0x200
PointerToRawData 0x1047800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.436447

_RDATA

MD5 f1f89f2d16a4104b1b44a0abb1c0089e
SHA1 60839ee9e1d92ea4ed5290c5b684acd8c78ce825
SHA256 16d977a5f98f636ab98c6da1d9e8c4459a15a4fb9728e206842152eececfd4bb
SHA3 ef0ff19d8695008c590e9ef2248e10eda2d07d8f5bc6b8582ed1eee275ad577f
VirtualSize 0x540
VirtualAddress 0x1119000
SizeOfRawData 0x600
PointerToRawData 0x1047a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.54937

.rsrc

MD5 73ced4ecece6682397ad5d4dbd316a3e
SHA1 72b4383a67547d6f2004e05e13138a2387589f91
SHA256 dfe7047507379d15a2d96ebb9a576191540a70f7e5c2ab720850150373d70b53
SHA3 091b05be7d1facdea3d831be23e1935f935bfaf924078b3ace0d29283b7fab08
VirtualSize 0x8a670
VirtualAddress 0x111a000
SizeOfRawData 0x8a800
PointerToRawData 0x1048000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.29497

.reloc

MD5 0799a1466b35b283190906876e726e5b
SHA1 8837f86bd5693c3b597bc991d9fa9c821b251a4f
SHA256 0ff2b37bf6e8a32433a61e27a5b44eda9db385928356c96a430f3fed0fb52a00
SHA3 a25a82c42bdb04e48f52753b853e32d5dd826ac1f9b5def3d5540bfae50f5d49
VirtualSize 0x8bf28
VirtualAddress 0x11a5000
SizeOfRawData 0x8c000
PointerToRawData 0x10d2800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.76476

.bind

MD5 1e59777b669c27ce4effb741d751d334
SHA1 d915ec85f2fa4e4083aa5a869464ef1622914b70
SHA256 8cf8f0df19e3800f3545174465e73fd9fb0d5571791e68578cf7d940666c8b7b
SHA3 0c15855bb61eb8f39ae53402251ef633ca980732c80ad87ef4d18eaec71a9e1e
VirtualSize 0x22890
VirtualAddress 0x1231000
SizeOfRawData 0x22890
PointerToRawData 0x115e800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 7.96262

Imports

HID.DLL HidP_GetButtonCaps
HidP_GetCaps
HidD_GetProductString
HidD_GetPreparsedData
HidP_MaxDataListLength
HidP_GetData
HidD_FreePreparsedData
HidP_GetValueCaps
HidD_GetHidGuid
KERNEL32.dll GetLocalTime
GetTimeZoneInformation
LocalFree
TerminateThread
GetSystemInfo
GetSystemTimeAsFileTime
CreateFileW
InitializeCriticalSection
ResetEvent
ReadFile
SetFilePointerEx
WriteFile
SetFilePointer
SetEndOfFile
GetFileAttributesExW
SetFileAttributesW
GetFileAttributesW
CopyFileW
MoveFileExW
FindClose
FindNextFileW
FindFirstFileW
FindFirstFileExW
LoadLibraryExW
InterlockedIncrement
InterlockedDecrement
CreateEventW
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleA
RemoveDirectoryW
DeleteFileW
SetFileTime
GetSystemTime
GetDiskFreeSpaceExA
GetModuleFileNameW
lstrcpynA
lstrcpyA
lstrcpynW
GetCommandLineW
CancelIo
GetOverlappedResult
ExpandEnvironmentStringsW
SetLastError
ResumeThread
GetThreadContext
SuspendThread
OutputDebugStringA
GetEnvironmentVariableA
GetFileAttributesA
GetModuleFileNameA
GetVersionExA
GetCurrentDirectoryA
VerifyVersionInfoW
VerSetConditionMask
GetVersionExW
GlobalMemoryStatusEx
GetUserDefaultUILanguage
GetComputerNameW
GetTempPathW
LocalAlloc
SetUnhandledExceptionFilter
GetCurrentDirectoryW
OpenEventW
DebugBreak
GetFileSize
FileTimeToDosDateTime
FileTimeToLocalFileTime
lstrlenA
GetFileTime
VirtualQuery
GlobalMemoryStatus
SetErrorMode
HeapAlloc
HeapFree
GetCurrentProcess
HeapReAlloc
DecodePointer
EncodePointer
HeapQueryInformation
HeapSize
DuplicateHandle
ExitProcess
SetConsoleCtrlHandler
SystemTimeToFileTime
MapViewOfFile
HeapSetInformation
GetStartupInfoW
GetStdHandle
HeapCreate
IsProcessorFeaturePresent
GetLocaleInfoW
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
InterlockedExchange
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
CreateFileA
CompareStringW
SetEnvironmentVariableA
GetProcessHeap
GetProcessAffinityMask
InterlockedExchangeAdd
VirtualProtect
VirtualAlloc
VirtualFree
SwitchToThread
SetThreadAffinityMask
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
InterlockedFlushSList
GetThreadPriority
OpenEventA
SetWaitableTimer
CreateWaitableTimerA
GetSystemDirectoryA
GetDriveTypeW
PeekNamedPipe
GetFileInformationByHandle
FindFirstFileExA
GetDriveTypeA
FileTimeToSystemTime
SetConsoleMode
ReadConsoleInputA
GetFullPathNameA
GetDateFormatA
GetTimeFormatA
CreateSemaphoreW
FlushInstructionCache
CreateMutexW
SignalObjectAndWait
ExpandEnvironmentStringsA
VerifyVersionInfoA
FlushConsoleInputBuffer
GetVersion
GetCurrentProcessId
GetFullPathNameW
GetModuleHandleW
GetCurrentThreadId
SetThreadPriority
FormatMessageA
ExitThread
CreateFileMappingA
CreateThread
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
UnmapViewOfFile
CreateMutexA
ReleaseMutex
WaitForSingleObject
GetWindowsDirectoryW
IsDebuggerPresent
GetCommandLineA
GetCurrentThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
RaiseException
SleepEx
QueryPerformanceFrequency
QueryPerformanceCounter
SetHandleInformation
FormatMessageW
SetDllDirectoryW
LoadLibraryW
GetLastError
CreateDirectoryW
LoadLibraryA
GetProcAddress
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
InterlockedCompareExchange
CreateEventA
SetEvent
ReleaseSemaphore
WaitForSingleObjectEx
Sleep
CloseHandle
CreateSemaphoreA
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
RtlUnwind
USER32.dll MessageBoxW
IsWindowVisible
ScreenToClient
WindowFromPoint
GetCursorPos
GetCaretBlinkTime
EnumDisplaySettingsA
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
IsClipboardFormatAvailable
CreateIconIndirect
ReleaseDC
GetDC
GetSystemMetrics
SetCursor
CloseClipboard
wvsprintfA
UpdateWindow
MonitorFromWindow
PostQuitMessage
ValidateRect
GetWindowLongW
RegisterClassExW
DialogBoxParamW
EndDialog
LoadIconA
SendDlgItemMessageW
SetDlgItemTextA
SetDlgItemTextW
MessageBoxA
CopyRect
OffsetRect
GetAncestor
UnregisterClassW
SetWindowTextW
GetDesktopWindow
AdjustWindowRectEx
GetWindowPlacement
ChangeDisplaySettingsA
GetDlgItem
SetWindowLongA
CreateDialogParamA
SetWindowPos
GetWindowRect
GetParent
GetThreadDesktop
GetUserObjectInformationA
EnumWindows
RegisterWindowMessageA
SendMessageA
IsIconic
ShowWindow
SetTimer
PeekMessageA
GetMessageA
KillTimer
LoadImageW
DialogBoxParamA
CheckDlgButton
PeekMessageW
CreateDialogParamW
IsDialogMessageW
DispatchMessageW
MsgWaitForMultipleObjects
EnableWindow
CopyImage
SetWindowLongW
IsDlgButtonChecked
LoadCursorA
DestroyCursor
DestroyIcon
SetCapture
ReleaseCapture
UnregisterDeviceNotification
DispatchMessageA
TranslateMessage
PtInRect
GetClientRect
GetWindowLongA
GetProcessWindowStation
GetUserObjectInformationW
SendMessageTimeoutA
GetMessageExtraInfo
RegisterDeviceNotificationW
SystemParametersInfoW
ClientToScreen
DefWindowProcW
DestroyWindow
CreateWindowExW
GetAsyncKeyState
GetKeyState
wsprintfA
RegisterRawInputDevices
GetRawInputData
GetRawInputDeviceInfoW
GetRawInputDeviceList
SetForegroundWindow
ClipCursor
SetCursorPos
ShowCursor
GetFocus
SetFocus
EnumDisplayDevicesA
EnumDisplayMonitors
GetMonitorInfoA
RegisterClassW
VERSION.dll GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
ole32.dll CoUninitialize
CoInitialize
CoCreateGuid
CoTaskMemAlloc
CoTaskMemFree
CoSetProxyBlanket
StringFromGUID2
PropVariantClear
CoCreateInstance
SHLWAPI.dll PathCanonicalizeW
PathFileExistsW
SHDeleteKeyW
ADVAPI32.dll CryptGetHashParam
RegisterEventSourceA
ReportEventA
DeregisterEventSource
CryptImportKey
CryptVerifySignatureA
CryptDestroyKey
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyW
OpenProcessToken
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
GetUserNameA
GetSidSubAuthority
GetTokenInformation
GDI32.dll SwapBuffers
DeleteObject
CreateBitmap
CreateDIBSection
SetPixelFormat
ChoosePixelFormat
GetDeviceCaps
GetObjectA
SHELL32.dll CommandLineToArgvW
SHGetFolderPathW
ShellExecuteW
SHFileOperationW
OPENGL32.dll wglGetCurrentContext
wglCreateContext
wglMakeCurrent
wglDeleteContext
wglGetProcAddress
wglGetCurrentDC
WINMM.dll timeBeginPeriod
waveInGetNumDevs
timeEndPeriod
waveOutGetDevCapsA
waveOutGetDevCapsW
waveOutClose
waveOutOpen
waveOutUnprepareHeader
waveOutWrite
waveOutReset
waveOutGetPosition
timeGetTime
waveOutGetNumDevs
waveInPrepareHeader
waveInUnprepareHeader
waveInGetDevCapsA
waveInGetDevCapsW
waveInStart
waveInOpen
waveInClose
waveInReset
waveOutPrepareHeader
waveInAddBuffer
WS2_32.dll accept
ntohs
gethostname
socket
WSAGetLastError
connect
WSAAsyncGetHostByName
WSAStartup
inet_ntoa
closesocket
WSACleanup
htonl
bind
htons
inet_addr
WSACancelAsyncRequest
getsockopt
WSAEventSelect
WSACloseEvent
WSACreateEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSAEnumNetworkEvents
WSASetEvent
getpeername
getprotobyname
recv
gethostbyname
ntohl
shutdown
getnameinfo
getaddrinfo
WSAIoctl
recvfrom
sendto
send
select
__WSAFDIsSet
freeaddrinfo
WSASocketA
WSASetLastError
setsockopt
ioctlsocket
getsockname
listen
OLEAUT32.dll VariantClear
SysAllocString
SysFreeString
VariantChangeType
VariantInit
IMM32.dll ImmReleaseContext
ImmSetOpenStatus
ImmGetConversionStatus
ImmGetCompositionStringW
ImmAssociateContextEx
ImmAssociateContext
ImmGetContext
ImmSetCompositionStringW
DNSAPI.dll DnsQuery_A
DnsFree
IPHLPAPI.DLL GetIpAddrTable
WINHTTP.dll WinHttpGetIEProxyConfigForCurrentUser

Delayed Imports

??0Allocator@shdfnd@physx@@QAE@PBD@Z

Ordinal 1
Address 0x879cf0

??0ErrorHandler@shdfnd@physx@@QAE@XZ

Ordinal 2
Address 0x8af170

??0FPUGuard@shdfnd@physx@@QAE@XZ

Ordinal 3
Address 0xa9fa60

??0Foundation@shdfnd@physx@@AAE@AAVPxErrorCallback@2@AAVPxAllocatorCallback@2@@Z

Ordinal 4
Address 0x87a120

??0MutexImpl@shdfnd@physx@@QAE@XZ

Ordinal 5
Address 0x8aefb0

??0PAUtils@shdfnd@physx@@QAE@XZ

Ordinal 6
Address 0x8af330

??0PxFoundation@physx@@QAE@ABV01@@Z

Ordinal 7
Address 0x879bb0

??0PxFoundation@physx@@QAE@XZ

Ordinal 8
Address 0x879ba0

??0ReadWriteLock@shdfnd@physx@@QAE@XZ

Ordinal 9
Address 0x8af090

??0SListImpl@shdfnd@physx@@QAE@XZ

Ordinal 10
Address 0xa253b0

??0SyncImpl@shdfnd@physx@@QAE@XZ

Ordinal 11
Address 0xa48480

??0TempAllocator@shdfnd@physx@@QAE@PBD@Z

Ordinal 12
Address 0x879cf0

??0ThreadImpl@shdfnd@physx@@QAE@P6APAXPAX@Z0@Z

Ordinal 13
Address 0xa48970

??0ThreadImpl@shdfnd@physx@@QAE@XZ

Ordinal 14
Address 0xa48560

??0Time@shdfnd@physx@@QAE@XZ

Ordinal 15
Address 0xa807d0

??1ErrorHandler@shdfnd@physx@@QAE@XZ

Ordinal 16
Address 0x8af180

??1FPUGuard@shdfnd@physx@@QAE@XZ

Ordinal 17
Address 0xa9faa0

??1Foundation@shdfnd@physx@@EAE@XZ

Ordinal 18
Address 0x87a000

??1MutexImpl@shdfnd@physx@@QAE@XZ

Ordinal 19
Address 0x8aefd0

??1PAUtils@shdfnd@physx@@QAE@XZ

Ordinal 20
Address 0x8af810

??1PxFoundation@physx@@MAE@XZ

Ordinal 21
Address 0x879b90

??1ReadWriteLock@shdfnd@physx@@QAE@XZ

Ordinal 22
Address 0x8af0d0

??1SListImpl@shdfnd@physx@@QAE@XZ

Ordinal 23
Address 0xa25390

??1SyncImpl@shdfnd@physx@@QAE@XZ

Ordinal 24
Address 0xa484a0

??1ThreadImpl@shdfnd@physx@@QAE@XZ

Ordinal 25
Address 0xa488d0

??4Allocator@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 26
Address 0x879cf0

??4ErrorHandler@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 27
Address 0x879c50

??4FPUGuard@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 28
Address 0x879bc0

??4MutexImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 29
Address 0x879cf0

??4PAUtils@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 30
Address 0x879c00

??4PxFoundation@physx@@QAEAAV01@ABV01@@Z

Ordinal 31
Address 0x879cf0

??4SListImpl@shdfnd@physx@@QAEAAU012@ABU012@@Z

Ordinal 32
Address 0x879cf0

??4SyncImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 33
Address 0x879cf0

??4TempAllocator@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 34
Address 0x879cf0

??4ThreadImpl@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 35
Address 0x879cf0

??4Time@shdfnd@physx@@QAEAAV012@ABV012@@Z

Ordinal 36
Address 0xa80680

??_7Foundation@shdfnd@physx@@6B@

Ordinal 37
Address 0xf58898

??_7PxFoundation@physx@@6B@

Ordinal 38
Address 0xf58628

??_FAllocator@shdfnd@physx@@QAEXXZ

Ordinal 39
Address 0x5d3f20

??_FTempAllocator@shdfnd@physx@@QAEXXZ

Ordinal 40
Address 0x5d3f20

?MAX_LISTENER_COUNT@ErrorHandler@shdfnd@physx@@2IB

Ordinal 41
Address 0xf58624

?PxDiagonalize@physx@@YA?AVPxVec3@1@ABVPxMat33@1@AAVPxQuat@1@@Z

Ordinal 42
Address 0x8eadb0

?PxShortestRotation@physx@@YA?AVPxQuat@1@ABVPxVec3@1@0@Z

Ordinal 43
Address 0x8ea720

?PxTransformFromPlaneEquation@physx@@YA?AVPxTransform@1@ABVPxPlane@1@@Z

Ordinal 44
Address 0x8ea8c0

?PxTransformFromSegment@physx@@YA?AVPxTransform@1@ABVPxVec3@1@0PAM@Z

Ordinal 45
Address 0x8eab60

?TlsAlloc@shdfnd@physx@@YAIXZ

Ordinal 46
Address 0xa487a0

?TlsFree@shdfnd@physx@@YAXI@Z

Ordinal 47
Address 0xa487b0

?TlsGet@shdfnd@physx@@YAPAXI@Z

Ordinal 48
Address 0xa487c0

?TlsSet@shdfnd@physx@@YAIIPAX@Z

Ordinal 49
Address 0xa487d0

?allocate@Allocator@shdfnd@physx@@QAEPAXIPBDH@Z

Ordinal 50
Address 0x8af110

?allocate@TempAllocator@shdfnd@physx@@QAEPAXIPBDH@Z

Ordinal 51
Address 0x8ebe20

?atomicAdd@shdfnd@physx@@YAHPCHH@Z

Ordinal 52
Address 0x995750

?atomicCompareExchange@shdfnd@physx@@YAHPCHHH@Z

Ordinal 53
Address 0x9956f0

?atomicCompareExchangePointer@shdfnd@physx@@YAPAXPAPCXPAX1@Z

Ordinal 54
Address 0x995710

?atomicDecrement@shdfnd@physx@@YAHPCH@Z

Ordinal 55
Address 0x995740

?atomicExchange@shdfnd@physx@@YAHPCHH@Z

Ordinal 56
Address 0x9956d0

?atomicIncrement@shdfnd@physx@@YAHPCH@Z

Ordinal 57
Address 0x995730

?atomicMax@shdfnd@physx@@YAHPCHH@Z

Ordinal 58
Address 0x995780

?computeQuatFromNormal@shdfnd@physx@@YA?AVPxQuat@2@ABVPxVec3@2@@Z

Ordinal 59
Address 0x97c780

?createInstance@Foundation@shdfnd@physx@@SAPAV123@IAAVPxErrorCallback@3@AAVPxAllocatorCallback@3@@Z

Ordinal 60
Address 0x87a1e0

?deallocate@Allocator@shdfnd@physx@@QAEXPAX@Z

Ordinal 61
Address 0x8af150

?deallocate@TempAllocator@shdfnd@physx@@QAEXPAX@Z

Ordinal 62
Address 0x8ebf20

?debugEvent@PAUtils@shdfnd@physx@@QAEXGII@Z

Ordinal 63
Address 0x8af7e0

?decRefCount@Foundation@shdfnd@physx@@SAXXZ

Ordinal 64
Address 0x879f10

?destroyInstance@Foundation@shdfnd@physx@@SAXXZ

Ordinal 65
Address 0x879e70

?disableFPExceptions@shdfnd@physx@@YAXXZ

Ordinal 66
Address 0xa9fb00

?enableFPExceptions@shdfnd@physx@@YAXXZ

Ordinal 67
Address 0xa9fae0

?error@Foundation@shdfnd@physx@@QAAXW4Enum@PxErrorCode@3@PBDH1ZZ

Ordinal 68
Address 0x879e00

?errorImpl@Foundation@shdfnd@physx@@QAEXW4Enum@PxErrorCode@3@PBDH1PAD@Z

Ordinal 69
Address 0x879d90

?flush@SListImpl@shdfnd@physx@@QAEPAVSListEntry@23@XZ

Ordinal 70
Address 0xa253f0

?getAllocator@Foundation@shdfnd@physx@@UBEAAVPxBroadcastingAllocator@3@XZ

Ordinal 71
Address 0x879c70

?getAllocator@shdfnd@physx@@YAAAVPxAllocatorCallback@2@XZ

Ordinal 72
Address 0x879df0

?getAllocatorCallback@Foundation@shdfnd@physx@@UBEAAVPxAllocatorCallback@3@XZ

Ordinal 73
Address 0x879d40

?getBootCounterFrequency@Time@shdfnd@physx@@SAABUCounterFrequencyToTensOfNanos@23@XZ

Ordinal 74
Address 0xa806e0

?getCallbackCount@ErrorHandler@shdfnd@physx@@QBEIXZ

Ordinal 75
Address 0x879c40

?getCheckedAllocator@Foundation@shdfnd@physx@@QAEAAVPxAllocatorCallback@3@XZ

Ordinal 76
Address 0x879c70

?getCounterFrequency@Time@shdfnd@physx@@SA?AUCounterFrequencyToTensOfNanos@23@XZ

Ordinal 77
Address 0xa806f0

?getCurrentCounterValue@Time@shdfnd@physx@@SA_KXZ

Ordinal 78
Address 0xa80720

?getCurrentTimeInTensOfNanoSeconds@Time@shdfnd@physx@@SA_KXZ

Ordinal 79
Address 0xa80810

?getDefaultStackSize@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 80
Address 0xa487f0

?getElapsedSeconds@Time@shdfnd@physx@@QAENXZ

Ordinal 81
Address 0xa80740

?getErrorCallback@ErrorHandler@shdfnd@physx@@QBEPAVPxErrorCallback@3@H@Z

Ordinal 82
Address 0x6c2040

?getErrorCallback@Foundation@shdfnd@physx@@UBEAAVPxErrorCallback@3@XZ

Ordinal 83
Address 0x879d50

?getErrorHandler@Foundation@shdfnd@physx@@QAEAAVErrorHandler@23@XZ

Ordinal 84
Address 0x879ce0

?getErrorLevel@Foundation@shdfnd@physx@@UBE?AW4Enum@PxErrorCode@3@XZ

Ordinal 85
Address 0x879d70

?getErrorMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 86
Address 0x729870

?getId@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 87
Address 0xa48550

?getInstance@Foundation@shdfnd@physx@@SAAAV123@XZ

Ordinal 88
Address 0x879d20

?getLastTime@Time@shdfnd@physx@@QBENXZ

Ordinal 89
Address 0xa807c0

?getMaxCallbackNum@ErrorHandler@shdfnd@physx@@QBEIXZ

Ordinal 90
Address 0x1076e0

?getNamedAllocMap@Foundation@shdfnd@physx@@QAEAAV?$HashMap@PBVNamedAllocator@shdfnd@physx@@PBDU?$Hash@PBVNamedAllocator@shdfnd@physx@@@23@VNonTrackingAllocator@23@@23@XZ

Ordinal 91
Address 0x879ca0

?getNamedAllocMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 92
Address 0x879cb0

?getNbPhysicalCores@ThreadImpl@shdfnd@physx@@SAIXZ

Ordinal 93
Address 0xa48800

?getPAUtils@Foundation@shdfnd@physx@@QAEAAVPAUtils@23@XZ

Ordinal 94
Address 0x2165c0

?getPriority@ThreadImpl@shdfnd@physx@@SA?AW4Enum@ThreadPriority@23@I@Z

Ordinal 95
Address 0xa48750

?getReportAllocationNames@Foundation@shdfnd@physx@@UBE_NXZ

Ordinal 96
Address 0x879c80

?getSize@MutexImpl@shdfnd@physx@@SAABIXZ

Ordinal 97
Address 0x8af010

?getSize@SListImpl@shdfnd@physx@@SAABIXZ

Ordinal 98
Address 0xa253a0

?getSize@SyncImpl@shdfnd@physx@@SAABIXZ

Ordinal 99
Address 0xa48470

?getSize@ThreadImpl@shdfnd@physx@@SAABIXZ

Ordinal 100
Address 0xa48540

?getTempAllocFreeTable@Foundation@shdfnd@physx@@QAEAAV?$Array@PATTempAllocatorChunk@shdfnd@physx@@VAllocator@23@@23@XZ

Ordinal 101
Address 0x879cc0

?getTempAllocMutex@Foundation@shdfnd@physx@@QAEAAV?$MutexT@V?$ReflectionAllocator@VMutexImpl@shdfnd@physx@@@shdfnd@physx@@@23@XZ

Ordinal 102
Address 0x879cd0

?getWarnOnceTimestamp@Foundation@shdfnd@physx@@SAIXZ

Ordinal 103
Address 0x879d30

?incRefCount@Foundation@shdfnd@physx@@SAXXZ

Ordinal 104
Address 0x879ee0

?integrateTransform@shdfnd@physx@@YAXABVPxTransform@2@ABVPxVec3@2@1MAAV32@@Z

Ordinal 105
Address 0x97c520

?isEnabled@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 106
Address 0x8af5c0

?isEventEnabled@PAUtils@shdfnd@physx@@QAE_NG@Z

Ordinal 107
Address 0x8af590

?kill@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 108
Address 0xa485e0

?lock@MutexImpl@shdfnd@physx@@QAEXXZ

Ordinal 109
Address 0x8aefe0

?lock@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 110
Address 0x8af340

?lockReader@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 111
Address 0x8af030

?lockWriter@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 112
Address 0x8af060

?mInstance@Foundation@shdfnd@physx@@0PAV123@A

Ordinal 113
Address 0x10c9990

?mRefCount@Foundation@shdfnd@physx@@0IA

Ordinal 114
Address 0x10c9994

?mWarnOnceTimestap@Foundation@shdfnd@physx@@0IA

Ordinal 115
Address 0x10c9998

?optimizeBoundingBox@shdfnd@physx@@YA?AVPxVec3@2@AAVPxMat33@2@@Z

Ordinal 116
Address 0x97c8f0

?peekElapsedSeconds@Time@shdfnd@physx@@QAENXZ

Ordinal 117
Address 0xa80780

?pop@SListImpl@shdfnd@physx@@QAEPAVSListEntry@23@XZ

Ordinal 118
Address 0xa253e0

?push@SListImpl@shdfnd@physx@@QAEXPAVSListEntry@23@@Z

Ordinal 119
Address 0xa253c0

?quit@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 120
Address 0xa485d0

?quitIsSignalled@ThreadImpl@shdfnd@physx@@QAE_NXZ

Ordinal 121
Address 0xa485b0

?rawEvent@PAUtils@shdfnd@physx@@QAEXGIIE@Z

Ordinal 122
Address 0x8af5e0

?rawEventWithTimestamp@PAUtils@shdfnd@physx@@QAE_NG_KIIE@Z

Ordinal 123
Address 0x8af390

?registerErrorCallback@ErrorHandler@shdfnd@physx@@QAEHAAVPxErrorCallback@3@@Z

Ordinal 124
Address 0x8af210

?registerEvent@PAUtils@shdfnd@physx@@QAEGPBD@Z

Ordinal 125
Address 0x8af860

?release@Foundation@shdfnd@physx@@UAEXXZ

Ordinal 126
Address 0x879f40

?reportError@ErrorHandler@shdfnd@physx@@QAEXW4Enum@PxErrorCode@3@PBD1H@Z

Ordinal 127
Address 0x8af1b0

?reset@SyncImpl@shdfnd@physx@@QAEXXZ

Ordinal 128
Address 0xa484b0

?sNumTensOfNanoSecondsInASecond@Time@shdfnd@physx@@2_KB

Ordinal 129
Address 0xf5f660

?set@SyncImpl@shdfnd@physx@@QAEXXZ

Ordinal 130
Address 0xa484c0

?setAffinityMask@ThreadImpl@shdfnd@physx@@QAEII@Z

Ordinal 131
Address 0xa48620

?setErrorLevel@Foundation@shdfnd@physx@@UAEXW4Enum@PxErrorCode@3@@Z

Ordinal 132
Address 0x879d60

?setName@ThreadImpl@shdfnd@physx@@QAEXPBD@Z

Ordinal 133
Address 0xa48650

?setPriority@ThreadImpl@shdfnd@physx@@QAEXW4Enum@ThreadPriority@23@@Z

Ordinal 134
Address 0xa486d0

?setReportAllocationNames@Foundation@shdfnd@physx@@UAEX_N@Z

Ordinal 135
Address 0x879c90

?signalQuit@ThreadImpl@shdfnd@physx@@QAEXXZ

Ordinal 136
Address 0xa48580

?sleep@ThreadImpl@shdfnd@physx@@SAXI@Z

Ordinal 137
Address 0xa48600

?slerp@shdfnd@physx@@YA?AVPxQuat@2@MABV32@0@Z

Ordinal 138
Address 0x97c360

?start@ThreadImpl@shdfnd@physx@@QAEXIPAVRunnable@23@@Z

Ordinal 139
Address 0xa48900

?startEvent@PAUtils@shdfnd@physx@@QAEXGG@Z

Ordinal 140
Address 0x8af610

?statEvent@PAUtils@shdfnd@physx@@QAEXGI@Z

Ordinal 141
Address 0x8af770

?statEvent@PAUtils@shdfnd@physx@@QAEXGII@Z

Ordinal 142
Address 0x8af7b0

?stopEvent@PAUtils@shdfnd@physx@@QAEXGG@Z

Ordinal 143
Address 0x8af6c0

?trylock@MutexImpl@shdfnd@physx@@QAE_NXZ

Ordinal 144
Address 0x8aeff0

?unRegisterErrorCallback@ErrorHandler@shdfnd@physx@@QAEXAAVPxErrorCallback@3@@Z

Ordinal 145
Address 0x8af2d0

?unRegisterErrorCallback@ErrorHandler@shdfnd@physx@@QAEXH@Z

Ordinal 146
Address 0x8af280

?unlock@MutexImpl@shdfnd@physx@@QAEXXZ

Ordinal 147
Address 0x8af000

?unlock@PAUtils@shdfnd@physx@@QAE_NXZ

Ordinal 148
Address 0x8af3c0

?unlockReader@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 149
Address 0x8af020

?unlockWriter@ReadWriteLock@shdfnd@physx@@QAEXXZ

Ordinal 150
Address 0x8af080

?wait@SyncImpl@shdfnd@physx@@QAE_NI@Z

Ordinal 151
Address 0xa484d0

?waitForQuit@ThreadImpl@shdfnd@physx@@QAE_NXZ

Ordinal 152
Address 0xa48590

?waitForever@SyncImpl@shdfnd@physx@@2IB

Ordinal 153
Address 0xf5e070

?yield@ThreadImpl@shdfnd@physx@@SAXXZ

Ordinal 154
Address 0xa48610

AmdPowerXpressRequestHighPerformance

Ordinal 155
Address 0x10201c0

NvOptimusEnablement

Ordinal 156
Address 0x10201bc

PxCreateFoundation

Ordinal 157
Address 0x87a2e0

PxGetFoundation

Ordinal 158
Address 0x879d80

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.22716
MD5 7640c53859b6fb265d02c6b3c455abea
SHA1 5ea1d41c96c0b6073b0207d18eca16cf4bb91751
SHA256 167971c838159711b5a81b4dfcf07ede01ce2d0456b5535702ce58dcaba4cf1f
SHA3 213dbf9e1126f45796e50ff5382ee5a16cdc292f0b6eb808d1e85b41596a302e

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x988
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.40654
MD5 757c7c6eb0f5d8babdb432ea0467393d
SHA1 52e4380e6bb7a215a2e73c3be30f10261f87f8fa
SHA256 4d7ade97c0c889f6071aa6929ae72f61ed643f00dc5e853f9b06a22a3b5391dc
SHA3 9edaab31351856314c33d64aad58617cb6280f72b1d41300c3c50481c6b540ba

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.47956
MD5 837fcd770ecdd4c9e67608c10ccd83fd
SHA1 cfef4deee0ef857cddc72cc1e79214fe758f2481
SHA256 5d9cd66214e3c10b5877a71777bc46a2a2551bc32fb77685832d916c88aad965
SHA3 12b5d28eacb9c3c7f1b54aa73b64f12765af9e4e6a861fe973bd70d95f6c025d

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.40429
MD5 1258a4d531be3e5a6f35b70b3bbaae1c
SHA1 17ebbb615896bc8297887527744d3f2ec3e219f6
SHA256 d6fdf0e6ff2188d64fa2bec917299e12d12ea5006d719ef6e1db12c50871d6a1
SHA3 c07831b72e9ac4441dbe129af0ff1ebeaaafc6bbc09599857f6209f1cdefbdcf

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.40866
MD5 b1fb80ff0aaffb1c122b19150b82e7d0
SHA1 96c516ef1ff360c9dbeaf5ffa31aebf4236ccb4a
SHA256 bdba0a61cee08040ba252c6803f2d34e0f1e8bdebdb0be094cc9fc3e74810754
SHA3 b79faaa494ebe7e3cb48cdaad7b979efe4417a61db6bd8a4b760a52772cde34f

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x94a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.37013
MD5 1dff4e8b740ad37785f905d840c96ff1
SHA1 076a8c43869116ea78dc5f3c3db21de803ff4ecf
SHA256 9c49c18ebc0b096cfcb48e0f2961486eab6bfeb7a749427fd1550a2dde8f8d70
SHA3 21a46e749bd71b7a58fbdcc928233d804b02133c0cf0a1c6200450579691753d

7

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.32849
MD5 63daac0bd543d9710d86601ffcb27d0b
SHA1 23eb2a6d316a9143bf30bb0426d73cef5b735a66
SHA256 abbb97546d09bbf4bdb0a26c9f4486dc61ff1493037f9c7c00d2fdfabafc9bcf
SHA3 a3991f84f67c431e3d51259d4e442ee93e2682cb0b9c9bb122a886766b1de42d

8

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.28052
MD5 38dcf0b26377b22fbf13b1590b733340
SHA1 694fec6055c8c40f4f0ac43fff458f95e1c245f3
SHA256 9175ee4623f28ed64419a5ea8099d93722d28225a4448568d20fff999f74dfc3
SHA3 a47feba98e50f11a4ee3659601fa186abfb43239588a42584902f441d13eecc7

9

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x42028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.25319
MD5 dc7931f5d6616432d03017404f4b146e
SHA1 b30eb1643ed6740c9aa9082ff0779ba80b9dd7fa
SHA256 444fba76dead73d1a772cb7bc000a14bf2b4d5f550214642951a7c060fef454d
SHA3 01b7028b4d754760907ec8e004bfe1401599f017b0b7d063c22e1ee8d6f0c3a0

9 (#2)

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x124
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.99471
MD5 b62b6b1e4cd3054ab1b07b033356d108
SHA1 c0170ce1c06de46e62508e1d774d64e952cd111a
SHA256 6a3c71d7f89e83280ff2aa75c76d49c3239060f8ee53cfc2692e05c4fc9c7eab
SHA3 9e885ae1d0f740d603c9ef2ca1a92c8a61ddb587a0f50bee653496e0ac8fe4f6

105

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x10c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.98084
MD5 2165d3c35627dfb0f24dfa8839b650c1
SHA1 5168d394292dd31902f3f8112b22cd604529f378
SHA256 7aa854f2b6bf3241c666d0b851ecaea27082934a4b2fa43db752591dfcf9434e
SHA3 395d76a75afaab97318d9ea2f3785b5ade74331f689f98e69f22f301be84d67a

107

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x1c2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.19606
MD5 e71ed01bef9a6e44b5a60f28e2d14320
SHA1 28a0948d37b93bfd392044a4338968bd3f4de535
SHA256 af380b7f1f6bedba49ef3833569a36314f9834b759bfbdc7f5474d65081186c6
SHA3 a275daef8cf31a8e4d53a63b80b73137c0c41a126920ed0b63416f8643332d35

108

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0xdc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.23439
MD5 89647fd8d7ee80b9e9e46db2a1053a29
SHA1 10dd88f00a8f56cce48908628abe1215235f624a
SHA256 692985cf029eb28098357336ea128b16211fb8fb8ab3e8f90949a952a2514f65
SHA3 01c77f889f7bb48a0744fe4f076df03cf74591df831c9d043237c2a7a7426f3e

109

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0x8e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.09377
MD5 839f2e562a1f062fd873414ab28cf1d2
SHA1 ed961a5852bd1ac5b55fa8fd70fa8213754abc57
SHA256 296b7d861a9ee473d4e8a62f9d7adb025d1fbe8e61206870f426e5c870a98936
SHA3 6a4b1fab7319e07585d923be21a3d852ecc1988286973bf8440e25f2a35a3cd0

103

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x84
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.04448
Detected Filetype Icon file
MD5 3bf2dac037ce87794e66ff7f054e913f
SHA1 52ca961fd37ad960905a681d1db5157508ef1602
SHA256 2a87b1f32c5d0435090c72c392b75394f706e5750eff64fd85d25e1c622ee581
SHA3 8454d3273522657b5926068082b2cb88f6dbf352e7e9568008c0e33c792f349b

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x1a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.34573
MD5 6b059bd682f19dcb133d8f403ccd1335
SHA1 51e42b05cc90a9cc93679c76b2fddbbcc3ac4ad0
SHA256 bc17cdcca8ebb2c1485e1117bafb4ad249527a34514a36951c5d18553daf9978
SHA3 93b34a80c4f72d6c894e8b1f5da2bf32ec2b62e40c0c98e06466be55388783d5

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x581
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.37424
MD5 ed4212968d15a196c34d461040b44336
SHA1 4d331b10588bcfeb306ba2ad31ce5ee96e12667c
SHA256 b91c0fd1d3a91447a5b1207d1f625d19a6a0df1921aac32c60ffbd8e0a11ef00
SHA3 914a36db86cc3ab4399e6e59366be51f0f6dae23a7a55f7e19ea927f9dd1a2b0

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 5.5.0.39994
ProductVersion 5.5.0.39994
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_UNKNOWN
Language English - United States
FileVersion (#2) 5.5.0.3120186
ProductVersion (#2) 5.5.0.3120186
Unity Version 5.5.0p4_2f9c3a0f4141
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2017-Jan-06 00:07:59
Version 0.0
SizeofData 137
AddressOfRawData 0xfecefc
PointerToRawData 0xfeb6fc
Referenced File C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\player_win_x86.pdb

TLS Callbacks

Load Configuration

RICH Header

Errors