4c13bccad371792258133cb5f57bd559

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2022-Jan-12 02:02:09
Detected languages English - United States
TLS Callbacks 1 callback(s) detected.
Debug artifacts Z:\export\jenkins\workspace\int8-build-stream-pcv2\obj\v141\x64\PC\PlatinumSteam\GameP.pdb
CompanyName Santa Monica Studio
FileDescription God of War
FileVersion 0,0,0,0
InternalName int8
LegalCopyright Copyright (C) 2021 Santa Monica Studio
OriginalFilename GoW
ProductName GoW
ProductVersion GoW-4389704-Tue Jan 11 17:32:27 2022

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: May have dropper capabilities:
  • CurrentControlSet\Services
Contains domain names:
  • curl.haxx.se
  • example.com
  • http://curl.haxx.se
  • http://curl.haxx.se/docs/http-cookies.html
  • https://upload.studiocrs.playstation.com
  • https://upload.studiocrs.playstation.com/crashrecorder/rest/recv/upload/v1/67125a5f-9eb4-46e1-8fe2-4595dc69745a/21f239f0-ad9e-487d-8fde-cc9dd9b8a003
  • playstation.com
  • studiocrs.playstation.com
  • upload.studiocrs.playstation.com
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to TEA
Suspicious The PE is possibly packed. Unusual section name found: .bind
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryW
  • LoadLibraryExW
Can access the registry:
  • RegisterHotKey
  • RegCloseKey
  • RegOpenKeyExW
  • RegQueryValueExW
Possibly launches other programs:
  • CreateProcessW
  • CreateProcessA
Uses Windows's Native API:
  • ntohs
  • ntohl
Uses functions commonly found in keyloggers:
  • GetForegroundWindow
  • MapVirtualKeyA
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Leverages the raw socket API to access the Internet:
  • getaddrinfo
  • freeaddrinfo
  • getnameinfo
  • inet_pton
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
Suspicious VirusTotal score: 1/65 (Scanned on 2022-01-14 19:40:50) APEX: Malicious

Hashes

MD5 4c13bccad371792258133cb5f57bd559
SHA1 f60ca52f10430d1c782cb0af6735a3c2ce781a92
SHA256 108009d9a369b9bc68a07168ec288ee8d1a86979e8257bf03983855bbd219436
SHA3 074968de4f7ed824d5c8a2e31f5c46def01e37f9e6d68c712dd83e8b83ce012d
SSDeep 196608:B8Hr1VwCRkYj4cfDefaCJDO5wFZq+KYsZwQFbHw:awCRk+f7efa+DO5wLYZwQNw
Imports Hash 7a1ac21113e4ef93781f8bc882072b8b

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x170

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 8
TimeDateStamp 2022-Jan-12 02:02:09
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_NET_RUN_FROM_SWAP

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xd39000
SizeOfInitializedData 0x42bbe00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000003EA1B0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion A.0
ImageVersion 0.0
SubsystemVersion A.0
Win32VersionValue 0
SizeOfImage 0x5033000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x400000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 8a78ce2dc0d50079406a4c3e0170beab
SHA1 3d654c14e6500f972c1d2414e34a73f8e7105433
SHA256 5e75de84bef7b6846ae8ae563be98480fc9754da78896b843aad52f94fe9db4d
SHA3 734ec86312dbc768bbd64cae7cba949f32deb2814012501da537368513714944
VirtualSize 0xd39000
VirtualAddress 0x1000
SizeOfRawData 0xd39000
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.4262

.rdata

MD5 2fe3d274fa0bb9da1f7c35337446644f
SHA1 6dea1aba94ae367df9e9cb5c5597e141b91b8703
SHA256 1ef36c8bb55b8533c0da242574684f1e4ca3bb9955eb94551b9046202bc3fcdb
SHA3 3cb202e2a05f5e38224e9e941af001a686fb0894361a828cb93100c51e79980f
VirtualSize 0x30e000
VirtualAddress 0xd3a000
SizeOfRawData 0x30d600
PointerToRawData 0xd39400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.4277

.data

MD5 50784b27ae36b58731155defdf942b94
SHA1 17ead4136eaf608a20e313cfc90ba9dcdd4a586c
SHA256 c4867564bdeddf9b22136023d2baa86bb47f31dfe15ad02f5b1ece2d3aa30d48
SHA3 6a31e86292176d875f16241a196f243666f3fd97894aed8d156ed7fbd23d84a6
VirtualSize 0x3ed1000
VirtualAddress 0x1048000
SizeOfRawData 0x1b2e00
PointerToRawData 0x1046a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.78686

.pdata

MD5 c32f3f2b5424157c3e8e45d974cef2f1
SHA1 d16833286f514fc15b536cc0b24ab90d275f3c0a
SHA256 b8ef402303aff098c88ff2ac2611428b575f5764c66941125a9a6f1612da0fa2
SHA3 c623e588d5d2ee70c424922c3f603a65aac15f2d14f499d62b1ac15fb1f88fae
VirtualSize 0x98000
VirtualAddress 0x4f19000
SizeOfRawData 0x97800
PointerToRawData 0x11f9800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.66692

_RDATA

MD5 8e1b2d1562e4cd96c6b119e1f9c1de75
SHA1 27167ceab546178f226f39d694f95955564d1802
SHA256 11a725247e8647b8dd91791df9370da4ed58b0cd658ca02f7fe9bfe2e844a331
SHA3 f4d7cd186fa8224dfdc65d8fc5e50b24dee8e66471e72261c4b95b93bde39317
VirtualSize 0x4000
VirtualAddress 0x4fb1000
SizeOfRawData 0x3200
PointerToRawData 0x1291000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.27363

.rsrc

MD5 01305269af90a1fd9925a8b47b235a47
SHA1 01d9b26aed3cf1623f605406ee04f9d72863bfcd
SHA256 55577b508229594e69de415600ad3c484611adfdd35cd5775946d2ef7e716041
SHA3 26dd50a3444af16cbd182d0c032adc8aa100748bdeb7edbcd56f9e49bbb13943
VirtualSize 0x14000
VirtualAddress 0x4fb5000
SizeOfRawData 0x13c00
PointerToRawData 0x1294200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.54085

.reloc

MD5 4ad76832d1892be79b3bdbbf3fe3c38e
SHA1 cb2d2d52de212227fa130df0cb53e57b69eee36a
SHA256 e1536d5f669970de4831e47040dce495a185f5fa434a64c9733d240e97e32ce4
SHA3 fbc49236e3ad019427cbc698086b819b24f9af4788c87129c461c8b38bf19540
VirtualSize 0x30000
VirtualAddress 0x4fc9000
SizeOfRawData 0x2fc00
PointerToRawData 0x12a7e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.43351

.bind

MD5 f1d5e158fed591f23eea2a6c99b58d41
SHA1 bf65e0794d804ea2b155d802d53663432adb2e0c
SHA256 5b973d10261438cad5bd851d469923a63d8aded51fa75f61d6437a88cdf086a2
SHA3 ca4c745c99470f5c0ab8dd03ef7794e061ff687000e1010976139412f28edf2a
VirtualSize 0x3a000
VirtualAddress 0x4ff9000
SizeOfRawData 0x3a000
PointerToRawData 0x12d7a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 7.96307

Imports

KERNEL32.dll LeaveCriticalSection
EnterCriticalSection
SetEnvironmentVariableW
CreateEventA
ResetEvent
SetEvent
LoadLibraryA
FindClose
FindNextFileA
FindFirstFileExA
GetFileAttributesExA
SetThreadExecutionState
GetPrivateProfileStringA
WritePrivateProfileStringA
InitializeCriticalSection
WaitForSingleObject
LocalFree
CloseHandle
GetDiskFreeSpaceExW
GetFileAttributesW
CreateFileW
SetEndOfFile
SetFilePointer
WriteFile
ReadFile
CreateDirectoryW
CreateDirectoryA
DebugBreak
IsDebuggerPresent
ExitProcess
GetModuleFileNameW
GetLargePageMinimum
VirtualAlloc
VirtualFree
SetUnhandledExceptionFilter
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryW
RaiseException
MultiByteToWideChar
SetErrorMode
GetUserDefaultLocaleName
OutputDebugStringA
GetSystemInfo
FormatMessageA
GetLastError
VerifyVersionInfoW
VerSetConditionMask
GetModuleHandleA
GetModuleFileNameA
GetFullPathNameW
CreateProcessW
InitializeCriticalSectionEx
CreateProcessA
GetModuleHandleExA
GetStdHandle
GetCurrentProcessId
OutputDebugStringW
LocalAlloc
GetSystemDirectoryW
ReleaseMutex
CreateMutexA
CreateFiber
ConvertThreadToFiber
ConvertFiberToThread
SwitchToFiber
DeleteFiber
AllocConsole
WriteConsoleA
SetConsoleTitleA
SetEnvironmentVariableA
GetEnvironmentVariableA
CreateSemaphoreA
UnmapViewOfFile
CreateFileA
ReleaseSemaphore
CreateFileMappingA
CreateWaitableTimerA
GetFileSize
MapViewOfFile
GetFileTime
SetFileTime
GetFileAttributesA
SetWaitableTimer
GetThreadId
GetCurrentThread
DuplicateHandle
ResumeThread
MoveFileExA
TryEnterCriticalSection
CreateJobObjectA
QueryFullProcessImageNameA
AssignProcessToJobObject
SetInformationJobObject
GetSystemTime
TzSpecificLocalTimeToSystemTime
GetTimeZoneInformation
GetSystemTimeAsFileTime
CreateThread
DeleteCriticalSection
DeviceIoControl
DeleteFileA
VirtualProtect
VirtualQuery
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
GetVersionExA
SleepEx
GetTickCount
ExpandEnvironmentStringsA
WaitForMultipleObjects
PeekNamedPipe
SetLastError
lstrcmpA
FileTimeToSystemTime
GetModuleHandleW
Sleep
GetConsoleWindow
GetFileType
TerminateThread
GetThreadContext
FreeConsole
SetThreadContext
QueryPerformanceFrequency
SetThreadAffinityMask
SetThreadPriority
WaitForMultipleObjectsEx
LoadLibraryExW
USER32.dll GetAncestor
MoveWindow
AdjustWindowRect
DefWindowProcA
CreateWindowExA
GetForegroundWindow
TranslateMessage
ClipCursor
SendMessageA
SetCapture
LoadIconA
GetClientRect
PeekMessageA
RegisterRawInputDevices
GetKeyboardLayout
GetRawInputData
PostQuitMessage
GetParent
MapVirtualKeyExA
GetCapture
SetProcessDpiAwarenessContext
TrackMouseEvent
ReleaseCapture
ShowCursor
InvalidateRect
SetCursorPos
GetCursorPos
BeginPaint
EndPaint
VkKeyScanA
MapVirtualKeyA
MonitorFromWindow
EnumDisplayMonitors
GetMonitorInfoA
EnumDisplaySettingsA
MessageBoxA
UnregisterDeviceNotification
RegisterDeviceNotificationW
SetWindowLongPtrW
CallWindowProcW
IsWindow
SetThreadDpiAwarenessContext
PtInRect
SetWindowPlacement
GetWindowLongA
GetWindowPlacement
RegisterHotKey
ClientToScreen
SetWindowLongA
ScreenToClient
DestroyWindow
RegisterClassExA
GetCursorInfo
SetWindowPos
LoadCursorA
GetWindowRect
DispatchMessageA
UnregisterHotKey
EnumDisplayDevicesA
MessageBoxW
ShowWindow
GetWindowThreadProcessId
LoadKeyboardLayoutA
GetWindowLongPtrW
VERSION.dll VerQueryValueA
GetFileVersionInfoA
XINPUT1_4.dll #2
#3
dxgi.dll CreateDXGIFactory1
d3d11.dll D3D11CreateDevice
D3DCOMPILER_47.dll D3DReflect
MSVCP140.dll ?_MP_Add@std@@YAXQEA_K_K@Z
?_MP_Rem@std@@YAXQEA_K_K@Z
?_MP_Mul@std@@YAXQEA_K_K1@Z
?_MP_Get@std@@YA_KQEA_K@Z
_Mtx_init_in_situ
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_unlock
?_Throw_C_error@std@@YAXH@Z
?_Xlength_error@std@@YAXPEBD@Z
IPHLPAPI.DLL GetAdaptersInfo
VCRUNTIME140.dll set_unexpected
_set_purecall_handler
__std_terminate
__CxxFrameHandler3
_purecall
strstr
strchr
strrchr
wcschr
memset
wcsrchr
wcsstr
_CxxThrowException
__intrinsic_setjmp
memcpy
memcmp
memmove
longjmp
__C_specific_handler
__std_type_info_destroy_list
memchr
api-ms-win-crt-stdio-l1-1-0.dll _telli64
_read
_mktemp_s
ferror
_lseeki64
_filelengthi64
rewind
_open
_close
fseek
fputc
_fileno
_get_osfhandle
_fseeki64
fread
_fsopen
__stdio_common_vfprintf_s
ftell
_wfsopen
__stdio_common_vswprintf_s
fputs
__stdio_common_vsscanf
fflush
_set_fmode
__stdio_common_vsprintf
freopen
fopen
fclose
fgets
setvbuf
__p__commode
__stdio_common_vfprintf
_ftelli64
__stdio_common_vsprintf_s
fwrite
fopen_s
getc
__acrt_iob_func
_setmaxstdio
feof
api-ms-win-crt-runtime-l1-1-0.dll _initialize_onexit_table
_register_onexit_function
abort
terminate
_register_thread_local_exe_atexit_callback
_set_abort_behavior
_c_exit
exit
set_terminate
_exit
_set_invalid_parameter_handler
_execute_onexit_table
_configure_narrow_argv
_invalid_parameter_noinfo_noreturn
_initterm
_crt_atexit
_get_narrow_winmain_command_line
_set_app_type
_controlfp
__sys_nerr
_initialize_narrow_environment
strerror
_errno
_beginthreadex
_endthreadex
_seh_filter_dll
_getpid
_initterm_e
_seh_filter_exe
_cexit
_crt_at_quick_exit
_invalid_parameter_noinfo
api-ms-win-crt-string-l1-1-0.dll strcoll
strtok
wcsncpy_s
isdigit
_strlwr
_strupr
_strdup
_strnicmp
_stricmp
strncmp
tolower
isspace
islower
isupper
strncat
wcsnlen
wcscpy_s
_wcsnicmp
isprint
wcsncat_s
wcsncpy
_wcsupr
strncpy
strcpy_s
_wcsdup
strncpy_s
wcstok
strcmp
_wcsicmp
wcscat_s
ispunct
strpbrk
iscntrl
isxdigit
isgraph
strspn
isalnum
toupper
isalpha
api-ms-win-crt-utility-l1-1-0.dll rand
srand
qsort
bsearch
api-ms-win-crt-heap-l1-1-0.dll _set_new_mode
_aligned_realloc
calloc
realloc
_aligned_malloc
_aligned_free
malloc
free
api-ms-win-crt-convert-l1-1-0.dll strtof
_itoa
atoi
strtod
wcstombs
wcsrtombs
_strtoi64
mbstowcs
atof
strtol
strtoul
api-ms-win-crt-environment-l1-1-0.dll _putenv
getenv
api-ms-win-crt-math-l1-1-0.dll modf
atanf
frexp
cbrtf
roundf
tanhf
cosf
coshf
pow
sin
cos
atan2f
log10
_finite
exp
log10f
log
ldexp
logf
sinf
sinhf
tanf
asinf
_fdclass
exp2f
fmodf
powf
fmod
acosf
__setusermatherr
_fdtest
expf
modff
api-ms-win-crt-time-l1-1-0.dll _localtime64_s
_gmtime64
strftime
_time64
_localtime64
api-ms-win-crt-filesystem-l1-1-0.dll _stat64
_splitpath_s
_fstat64
_splitpath
api-ms-win-crt-locale-l1-1-0.dll localeconv
_configthreadlocale
libScePad.dll scePadSetLightBar
scePadSetVibration
scePadGetControllerType
scePadSetParticularMode
scePadSetVibrationMode
scePadResetLightBar
scePadOpen
scePadRead
scePadInit
WLDAP32.dll #79
#143
#60
#27
#50
#200
#33
#32
#26
#46
#30
#211
#35
#22
#41
#301
WSOCK32.dll inet_ntoa
WSAGetLastError
send
getsockname
gethostbyaddr
inet_addr
gethostname
htonl
__WSAFDIsSet
setsockopt
WSAStartup
sendto
gethostbyname
listen
shutdown
select
closesocket
bind
accept
WSACleanup
ntohs
ntohl
WSASetLastError
getsockopt
recv
recvfrom
connect
socket
htons
getpeername
libSceJobManager.dll ??0JobManager@Job@sce@@QEAA@XZ
?initialize@JobManager@Job@sce@@QEAAHPEAX_KIIPEBUConfigParams@123@@Z
?shutdown@JobManager@Job@sce@@QEAAHXZ
?calculateRequiredMemorySize@JobManager@Job@sce@@SA_KPEBUMemorySizeQueryParams@123@@Z
?setPersistentThreadCount@JobManager@Job@sce@@QEAAHI@Z
?getSequenceFactoryInterface@JobManager@Job@sce@@QEAAPEAVSequenceFactoryInterface@23@W4Priority@123@@Z
??1JobManager@Job@sce@@QEAA@XZ
bink2w64.dll BinkOpenDirectSound
BinkShouldSkip
BinkOpen
BinkDoFramePlane
BinkWait
BinkClose
BinkUtilMalloc
BinkGetGPUDataBuffersInfo
BinkRegisterGPUDataBuffers
BinkUtilFree
BinkPause
BinkNextFrame
BinkSetMemory
BinkSetSoundSystem
libSceGnm.dll ?getChannel@DataFormat@Gnm@sce@@QEBA?AW4TextureChannel@23@I@Z
?getDepth@Texture@Gnm@sce@@QEBAIXZ
?getHeight@Texture@Gnm@sce@@QEBAIXZ
?getWidth@Texture@Gnm@sce@@QEBAIXZ
?getLastMipLevel@Texture@Gnm@sce@@QEBAIXZ
?getDepthMinus1@Texture@Gnm@sce@@QEBAIXZ
?getHeightMinus1@Texture@Gnm@sce@@QEBAIXZ
?getWidthMinus1@Texture@Gnm@sce@@QEBAIXZ
?getTextureType@Texture@Gnm@sce@@QEBA?AW4TextureType@23@XZ
?getTextureChannelType@DataFormat@Gnm@sce@@QEBA?AW4TextureChannelType@23@XZ
?getSurfaceFormat@DataFormat@Gnm@sce@@QEBA?AW4SurfaceFormat@23@XZ
?getTotalArraySliceCount@Texture@Gnm@sce@@QEBAIXZ
?getLastArraySliceIndex@Texture@Gnm@sce@@QEBAIXZ
?getTileMode@Texture@Gnm@sce@@QEBA?AW4TileMode@23@XZ
?init@TextureSpec@Gnm@sce@@QEAAXXZ
?getDataFormat@Texture@Gnm@sce@@QEBA?AVDataFormat@23@XZ
?initAs2d@Texture@Gnm@sce@@QEAA?AVSizeAlign@23@IIIVDataFormat@23@W4TileMode@23@W4NumFragments@23@@Z
?getSizeAlign@Texture@Gnm@sce@@QEBA?AVSizeAlign@23@XZ
?initAsCubemap@Texture@Gnm@sce@@QEAA?AVSizeAlign@23@IIIVDataFormat@23@W4TileMode@23@@Z
?initAs2dArray@Texture@Gnm@sce@@QEAA?AVSizeAlign@23@IIIIVDataFormat@23@W4TileMode@23@W4NumFragments@23@_N@Z
?getBitsPerElement@DataFormat@Gnm@sce@@QEBAIXZ
?initAs3d@Texture@Gnm@sce@@QEAA?AVSizeAlign@23@IIIIVDataFormat@23@W4TileMode@23@@Z
?build@DataFormat@Gnm@sce@@SA?AV123@W4SurfaceFormat@23@W4TextureChannelType@23@W4TextureChannel@23@222@Z
?init@Texture@Gnm@sce@@QEAAHPEBVTextureSpec@23@@Z
libSceGpuAddress.dll ?getMicroTileModeForSurfaceType@GpuAddress@sce@@YAHW4GpuMode@Gnm@2@PEAW4MicroTileMode@42@W4SurfaceType@12@@Z
?detileSurface@GpuAddress@sce@@YAHPEAXPEBXPEBVTilingParameters@12@@Z
?getArrayModeForSurfaceType@GpuAddress@sce@@YAHW4GpuMode@Gnm@2@PEAW4ArrayMode@42@W4SurfaceType@12@I@Z
?tileSurface@GpuAddress@sce@@YAHPEAXPEBXPEBVTilingParameters@12@@Z
?initFromTexture@TilingParameters@GpuAddress@sce@@QEAAHPEBVTexture@Gnm@3@II@Z
?computeSurfaceTileMode@GpuAddress@sce@@YAHW4GpuMode@Gnm@2@PEAW4TileMode@42@W4ArrayMode@42@TSurfaceFlags@12@VDataFormat@42@IW4MicroTileMode@42@@Z
?getFlagsForSurfaceType@GpuAddress@sce@@YAHW4GpuMode@Gnm@2@PEATSurfaceFlags@12@W4SurfaceType@12@W4SurfaceMipmapMode@12@@Z
?computeTextureSurfaceOffsetAndSize@GpuAddress@sce@@YAHPEA_K0PEBVTexture@Gnm@2@II@Z
WS2_32.dll getaddrinfo
freeaddrinfo
getnameinfo
inet_pton
steam_api64.dll SteamInternal_ContextInit
SteamInternal_FindOrCreateUserInterface
SteamAPI_UnregisterCallback
SteamAPI_Shutdown
SteamAPI_GetHSteamUser
SteamAPI_RegisterCallback
SteamAPI_RestartAppIfNecessary
SteamAPI_Init
SteamAPI_RunCallbacks
GDI32.dll SetBkColor
ExtTextOutA
ADVAPI32.dll OpenProcessToken
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ImpersonateSelf
LookupPrivilegeValueA
SHELL32.dll SHGetKnownFolderPath
ole32.dll CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
PropVariantClear
CoTaskMemAlloc
CoInitializeEx
OLEAUT32.dll VariantClear
VariantInit
api-ms-win-crt-multibyte-l1-1-0.dll _mbschr
_mbsnbcpy
SETUPAPI.dll SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
SetupDiGetDeviceInstanceIdW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
RPCRT4.dll UuidCreate

Delayed Imports

NVSDK_NGX_D3D11_AllocateParameters

Ordinal 1
Address 0x3dd6f0

NVSDK_NGX_D3D11_CreateFeature

Ordinal 2
Address 0x3dd750

NVSDK_NGX_D3D11_DestroyParameters

Ordinal 3
Address 0x3dd7c0

NVSDK_NGX_D3D11_EvaluateFeature

Ordinal 4
Address 0x3dd820

NVSDK_NGX_D3D11_EvaluateFeature_C

Ordinal 5
Address 0x3dd890

NVSDK_NGX_D3D11_GetCapabilityParameters

Ordinal 6
Address 0x3dd8d0

NVSDK_NGX_D3D11_GetParameters

Ordinal 7
Address 0x3dd930

NVSDK_NGX_D3D11_GetScratchBufferSize

Ordinal 8
Address 0x3dd980

NVSDK_NGX_D3D11_ReleaseFeature

Ordinal 9
Address 0x3ddc10

NVSDK_NGX_D3D11_Shutdown

Ordinal 10
Address 0x3ddc60

NVSDK_NGX_D3D11_Shutdown1

Ordinal 11
Address 0x3ddc70

NVSDK_NGX_Parameter_GetD

Ordinal 12
Address 0x3dc7c0

NVSDK_NGX_Parameter_GetD3d11Resource

Ordinal 13
Address 0x3dc820

NVSDK_NGX_Parameter_GetD3d12Resource

Ordinal 14
Address 0x3dc880

NVSDK_NGX_Parameter_GetF

Ordinal 15
Address 0x3dc8e0

NVSDK_NGX_Parameter_GetI

Ordinal 16
Address 0x3dc940

NVSDK_NGX_Parameter_GetUI

Ordinal 17
Address 0x3dc9a0

NVSDK_NGX_Parameter_GetULL

Ordinal 18
Address 0x3dca00

NVSDK_NGX_Parameter_GetVoidPointer

Ordinal 19
Address 0x3dca60

NVSDK_NGX_Parameter_SetD

Ordinal 20
Address 0x3dcac0

NVSDK_NGX_Parameter_SetD3d11Resource

Ordinal 21
Address 0x3dcb10

NVSDK_NGX_Parameter_SetD3d12Resource

Ordinal 22
Address 0x3dcb70

NVSDK_NGX_Parameter_SetF

Ordinal 23
Address 0x3dcbd0

NVSDK_NGX_Parameter_SetI

Ordinal 24
Address 0x3dcc20

NVSDK_NGX_Parameter_SetUI

Ordinal 25
Address 0x3dcc80

NVSDK_NGX_Parameter_SetULL

Ordinal 26
Address 0x3dcce0

NVSDK_NGX_Parameter_SetVoidPointer

Ordinal 27
Address 0x3dcd40

agsCheckDriverVersion

Ordinal 28
Address 0x3ddfe0

agsDeInitialize

Ordinal 29
Address 0x3dc220

agsDriverExtensionsDX11_BeginUAVOverlap

Ordinal 30
Address 0x3dadb0

agsDriverExtensionsDX11_CreateDevice

Ordinal 31
Address 0x3dae30

agsDriverExtensionsDX11_CreateFromDevice

Ordinal 32
Address 0x3db1f0

agsDriverExtensionsDX11_Destroy

Ordinal 33
Address 0x3db280

agsDriverExtensionsDX11_DestroyDevice

Ordinal 34
Address 0x3db2a0

agsDriverExtensionsDX11_EndUAVOverlap

Ordinal 35
Address 0x3db390

agsDriverExtensionsDX11_GetMaxClipRects

Ordinal 36
Address 0x3db410

agsDriverExtensionsDX11_IASetPrimitiveTopology

Ordinal 37
Address 0x3db460

agsDriverExtensionsDX11_MultiDrawIndexedInstancedIndirect

Ordinal 38
Address 0x3db4c0

agsDriverExtensionsDX11_MultiDrawIndexedInstancedIndirectCountIndirect

Ordinal 39
Address 0x3db590

agsDriverExtensionsDX11_MultiDrawInstancedIndirect

Ordinal 40
Address 0x3db690

agsDriverExtensionsDX11_MultiDrawInstancedIndirectCountIndirect

Ordinal 41
Address 0x3db760

agsDriverExtensionsDX11_NumPendingAsyncCompileJobs

Ordinal 42
Address 0x3db860

agsDriverExtensionsDX11_SetClipRects

Ordinal 43
Address 0x3db8b0

agsDriverExtensionsDX11_SetDepthBounds

Ordinal 44
Address 0x3dba40

agsDriverExtensionsDX11_SetDiskShaderCacheEnabled

Ordinal 45
Address 0x3dbae0

agsDriverExtensionsDX11_SetMaxAsyncCompileThreadCount

Ordinal 46
Address 0x3dbb30

agsDriverExtensionsDX11_SetViewBroadcastMasks

Ordinal 47
Address 0x3dbb70

agsDriverExtensionsDX11_WriteBreadcrumb

Ordinal 48
Address 0x3dbbc0

agsGetVersionNumber

Ordinal 49
Address 0x3dc360

agsInitialize

Ordinal 50
Address 0x3dc370

agsSetDisplayMode

Ordinal 51
Address 0x3e03e0

g_pAKPluginList

Ordinal 52
Address 0x239b708

1

Type WEVT_TEMPLATE
Language English - United States
Codepage UNKNOWN
Size 0x15c2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.7527
MD5 aba854287e3c478f980d31fc16d0a97f
SHA1 ebcd8ad783a8dec69aba8e5f500c721ec6580fee
SHA256 f8ccd5ec391a85411b871bcb3cd6365ae55edc31937b2c2a27212336541d4a66
SHA3 54eb937d6955c73c56eda73861c1fee6c1eef7ccc72dd618ea130fbda2666c91

1 (#2)

Type RT_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x10ac
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 0.80445
MD5 7892d7f0b94bc602aa8b72307e99c22e
SHA1 e000140daa9483c7ef56dd76b0c996600ae26132
SHA256 409233c26e204e5bb745b8e9546e67d13f98c2d4b84f447adb98978bb6679952
SHA3 9717bcd44816945b83ec11636ee6010da8af718f1fe1b264e78b3f9efe255b67

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xa7be
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.97023
Detected Filetype PNG graphic file
MD5 3394eafda09c65ce6a536627f8b2f1e2
SHA1 e0b87c7219af6add0f8be85cec1d90d94bddf997
SHA256 da8cdd8364e8efef3abecc2e9e6c67f1b653de9a041ca389af22da738f46c7e8
SHA3 e5378088ef5e4c9bcd4cf4e3377fb49de61a33f71befddab37ccc14162c0965b

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x668
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.19648
MD5 407e2bc52090a8b66efd7bf380d5e6c4
SHA1 4bcbe1e8784c37d0d6ccb24a5ad5eb95395e2bf2
SHA256 9becb88873d41eb094cb7a3c3ff7c35851bad407c0d601993a99e55870e93867
SHA3 09625ee2b4ae3b437cb9463dfd19f334575ce273df59aabcf32757431aca0764

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x2e8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.61108
MD5 5f765cb1cc97c800e9d005a4bcbd72d9
SHA1 6fb02d91c2100cc6094fd4e6cfcc08e773b543e4
SHA256 4085d8eee95e991653d3f1a2800cbdb13b1de5ae949365ca0f86c3e861091cf3
SHA3 3314977939abfef6431446fabf109a6342c38ebe94d237d733981ec8ae0c76a7

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.41681
MD5 69a4b51cbf99850a4b8574a80eaa7918
SHA1 2073a1f3492d234144ac792a777458bde207b809
SHA256 d72cf103aae8772edd4b098fe118588565b23fd8437204654b5dba2315fad1de
SHA3 d0c1631ae0eccafb7989ead2429f69eb557b39d932d79f67683d4e59aa32422e

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.41566
MD5 9362f0c1aa205d7e6c2e2d51f68f66ef
SHA1 15e3fb643f15c17ab2751d09f6cf6a54ceecda60
SHA256 dc54f71d1ab25064df2fdaad2448477b92eb14eeb1884e09ff4003aaf8dc4862
SHA3 e1aa43b7e45a4a35d78e3555db8f9390657d5b32b4c998a895f1085dddb19fbb

7

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.21371
MD5 d75c5898dd736a694be74cbb014ed51f
SHA1 ea2888ea590cbbcbdaa57560036d103355fc721c
SHA256 58615387c88ba9c094ea38326fc3a8db89019a4cfef9e62bb7ab44092f1f1fd1
SHA3 816a7a33a9e7395a0195ef6ec1dd3c47e580e8e9dfefa087e07105f676bb5b23

8

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x568
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.96619
MD5 476aeeca34b15330d9aaab59bfb4680d
SHA1 d3f09ff35a3a8ab9a2f7081b07a7d98fbacdf2b0
SHA256 38a06b704fbac39e1c53c2c0eb47555140e65f7c7349d98dab428b7f8732437d
SHA3 4ecfa9d11f1cd8d95feacbeee3b5f5d30a2119ff26a128fa750f8de8fac92e55

9

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.26348
MD5 7717368d697a425e3149ec695fa52e16
SHA1 4b2f0988aa831b2890f9d9b9c684b58b2aee1b54
SHA256 1dda555e6d7e3830e18cc0652bd1f91cf3dfb1a691c8d1d724f0ec17797b1041
SHA3 972cca28fae1ebc107acf5588821686c5191f349bff74258abb523e2145d1818

10

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.59556
MD5 e93af34eb0c7242d2e42ca14a86560c9
SHA1 8f27151c80d9e36ab87dff6261bcc6176530ae24
SHA256 b7b37d791998399ae76b4bffcccfb3f55bfc9ff28e044c303edde0c4c169184f
SHA3 388eab3dc3433edf56794dd076648781c5cfc26db4412d81cc94043551c1a172

11

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.151
MD5 c71235b47730e7b5f7cdb424ae6f32e7
SHA1 6f4452cc72ae05bfc61769f86d1a6d0af40d7f11
SHA256 c3f239866d80b1555d895c3bbfe78560ad4bc32fe9fe960322329788007ef96a
SHA3 082e683e2e953216433476bd6e9bafc36ded21d0e3af89927189999fdf091582

101

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0xe2
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.23367
MD5 437dc074c9197aa14ef193a4fb3beb9e
SHA1 01d87db583beed9296efc413c6f3b965bda6da61
SHA256 cfe18e9ca9c2322941b79b287efb4c04334873b7a375f3ccc15ee09dfa092bb7
SHA3 4612a99d8a5a2732f8124a2d285e71f2ff8b3412c8a94dc181fdd7f8f83c98ee

1002

Type RT_GROUP_CURSOR
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.0815
Detected Filetype Cursor file
MD5 ea85ef03bf202985c4fb9fe7780b51d4
SHA1 03bb2ce594521c0f8f39989508bda00533bdfd01
SHA256 f451c1dc0342b32a48d6026b049c186cc315d2665614449d6939c4b570eb1b38
SHA3 696c7d44d35f690effe72356f8c6770cd0dbd86b3568bb9f4c682f37705a087f
Preview

32512

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x92
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.93777
Detected Filetype Icon file
MD5 fd5170c6e9bbcfc55f9ac513a8f006b3
SHA1 2d1dfd9ce0ebbe05b703be18b895f6461fee01e4
SHA256 3af8e54d23df3c413205e3e5f903de63f54014b7308a0862bc614783c297b590
SHA3 c26a5ee66ed37f2f587ef8b5a0beef787f994a07a7643ca08bcd26c41aac8b0f

1 (#3)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x2fc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.43705
MD5 291d033375a50c6a809da7afffd2281e
SHA1 7bf23477e43df8e92efcc90ef1ae1d5ecea8a139
SHA256 f8022b0257978885a936bc05358ae09c1470f73c8d6b0af33aa1ecd2812d855a
SHA3 d6056073f7cc41bb764c38f7c6f081b9503cee078b648fa7e1968980ab4edc9d

1 (#4)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.438.9704
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName Santa Monica Studio
FileDescription God of War
FileVersion (#2) 0,0,0,0
InternalName int8
LegalCopyright Copyright (C) 2021 Santa Monica Studio
OriginalFilename GoW
ProductName GoW
ProductVersion (#2) GoW-4389704-Tue Jan 11 17:32:27 2022
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2022-Jan-12 02:02:09
Version 0.0
SizeofData 115
AddressOfRawData 0xf39c74
PointerToRawData 0xf39074
Referenced File Z:\export\jenkins\workspace\int8-build-stream-pcv2\obj\v141\x64\PC\PlatinumSteam\GameP.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2022-Jan-12 02:02:09
Version 0.0
SizeofData 20
AddressOfRawData 0xf39ce8
PointerToRawData 0xf390e8

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2022-Jan-12 02:02:09
Version 0.0
SizeofData 992
AddressOfRawData 0xf39cfc
PointerToRawData 0xf390fc

TLS Callbacks

StartAddressOfRawData 0x140f3a100
EndAddressOfRawData 0x140f3b300
AddressOfIndex 0x141214f90
AddressOfCallbacks 0x140d40638
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_16BYTES
Callbacks 0x00000001403EA714

Load Configuration

Size 0x100
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x141048208

RICH Header

XOR Key 0x47772019
Unmarked objects 0
Imports (VS 2015/2017 runtime 26706) 4
199 (41118) 12
C++ objects (VS 2015/2017 runtime 26706) 27
C objects (VS 2015/2017 runtime 26706) 10
ASM objects (VS 2015/2017 runtime 26706) 15
C++ objects (26213) 2
C objects (VS2008 SP1 build 30729) 1
C++ objects (VS2008 SP1 build 30729) 1
C++ objects (VS2015 UPD3 build 24210) 7
C++ objects (27044) 6
263 (26213) 1
C objects (26213) 1
262 (26213) 1
Imports (29918) 2
Imports (VS2017 v15.9.11 compiler 27030) 4
Imports (VS2008 SP1 build 30729) 26
C++ objects (VS2015 UPD3.1 build 24215) 21
Imports (27041) 2
Imports (26213) 37
Imports (27038) 2
Total imports 572
265 (27045) 1521
Exports (27045) 1
Resource objects (27045) 1
151 2
Linker (27045) 1

Errors

<-- -->