624cc588661ff2d08552e13f73f3ed1d

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2024-May-17 06:58:08
Debug artifacts D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdb
Comments www.vintagestory.at
CompanyName Tyron Madlener (Anego Studios)
FileDescription Vintage Story Client
FileVersion 1.20.0
InternalName Vintagestory.dll
LegalCopyright Copyright © 2016-2024 Anego Studios
OriginalFilename Vintagestory.dll
ProductName Vintage Story
ProductVersion 1.20.0
Assembly Version 1.0.0.0

Plugin Output

Info Interesting strings found in the binary: Contains domain names:
  • go.microsoft.com
  • https://aka.ms
  • https://go.microsoft.com
  • https://go.microsoft.com/fwlink/?linkid
  • microsoft.com
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryExW
  • LoadLibraryA
Can access the registry:
  • RegOpenKeyExW
  • RegGetValueW
  • RegCloseKey
Possibly launches other programs:
  • ShellExecuteW
Info The PE is digitally signed. Signer: Tyron Madlener
Issuer: SSL.com Code Signing Intermediate CA ECC R2
Safe VirusTotal score: 0/72 (Scanned on 2024-11-10 07:31:27) All the AVs think this file is safe.

Hashes

MD5 624cc588661ff2d08552e13f73f3ed1d
SHA1 9c0ae01c45fce23f7b0727fdae9a078a6baccc26
SHA256 64b15d00d1f7b54ac8e8c49611c0b612d58f9f3d4f457c432e8fe94ab3dfb435
SHA3 4a4aad380783d0693412ed2d84ffa82ac999f9301c19093fcd579245f960266b
SSDeep 3072:v7LW6Pr46prwG2k5GlI1JWE9QVsxyvJyn4NTfQf1VZlAWhr46UQs59L+tOsgE8Cv:vXWJ5kICW3Jyn4if1VZCiIz5kIfw
Imports Hash 72bc4dfff8905033c11dea0c671a7919

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xf0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2024-May-17 06:58:08
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x19a00
SizeOfInitializedData 0x23400
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000000140E0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x42000
SizeOfHeaders 0x400
Checksum 0x49bd6
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x180000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 81e655244a7161e07ad47ad730ab5579
SHA1 803934a1c97e6de597ea65b80763bd0a79a4c6b9
SHA256 e3b6087c33ac2182730dc0cb413371b9eb81a6cb1280cbfa3f0c53e45de4b1b4
SHA3 e02bd56e4620b4843de6954916582b00c74430a57ad23a4aa9e25cce8e57744a
VirtualSize 0x1996c
VirtualAddress 0x1000
SizeOfRawData 0x19a00
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.3716

.rdata

MD5 47797c3547ba374df080f4464b372a5c
SHA1 b3fd75035705aa3f9e24d1537d51910b36c24e04
SHA256 aacd095a73b334c30c2913f4e9ea5748ac0f9e80a69f521637ea523d50a0f887
SHA3 15d1bf7f2eb69fe04adbba69a54fa43d6b573a1356bf40bb0cdc6698a8080d29
VirtualSize 0x9dda
VirtualAddress 0x1b000
SizeOfRawData 0x9e00
PointerToRawData 0x19e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.53817

.data

MD5 5cc7477898628106b4b2ca6e07b716f6
SHA1 b702edd6a8573987c642d7035de8d49f9de72951
SHA256 e2434600d36f1ff9379df44367c6c2c79fbf66e7a5d7af1a223811bcd4e049cd
SHA3 bff8219c09aaf137b3171e7fa7432ee078eda78841644aa3ee17defd3bf869bb
VirtualSize 0x15c8
VirtualAddress 0x25000
SizeOfRawData 0xa00
PointerToRawData 0x23c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.60748

.pdata

MD5 3db1cb20418d86114c0169ee0656e546
SHA1 49c717ce3013ecd4cc6bcb9444c430bf3debe3e0
SHA256 3bf69b8c66cb941ed2598af0779659968b4c9a382f5c7ac3cf1632a40d93097a
SHA3 5dc7ff3ddbcfea485c13391ea874144f17f28b71af779037031b875a9651c1d4
VirtualSize 0x15cc
VirtualAddress 0x27000
SizeOfRawData 0x1600
PointerToRawData 0x24600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.17821

_RDATA

MD5 ec44dd57375fe515f2a9aae0488f7dcb
SHA1 9e9d673db9389b26fc3052a11ccbc0fb2fa06c03
SHA256 5a7f28fd244e52ee2987af22b4e03d2cecaaf59f5fffba814f629c6cec34f7e9
SHA3 dbc81e92bb588aefc152f627ee37b52925d18d25a9bf349718db7d3129f98fdb
VirtualSize 0x1f4
VirtualAddress 0x29000
SizeOfRawData 0x200
PointerToRawData 0x25c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.16046

.reloc

MD5 f512d13936eb390f71a1d7d1e5abb919
SHA1 740eead0e5944d8d01f922f1f5e031f2e1df6d24
SHA256 7de36d5da7f4f2480ac5a826913c7f1b0e33f32f4c939b48c749fef82b6ef702
SHA3 5b34ca1df88a2fc67c21ed988a7a8b619cbaae75196487fc75e3fb0855f4115f
VirtualSize 0x348
VirtualAddress 0x2a000
SizeOfRawData 0x400
PointerToRawData 0x25e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 4.85564

.rsrc

MD5 57d7ad874c8926b786a5590c60e1f393
SHA1 00a8872ccb632ea9525d1b75a58af0bcde60d644
SHA256 f144754a1e53e164f63db34fb1f7dac1cd823cc70fd9b7ccba3b9a29c08c3479
SHA3 958880cfafa81bfce2eeff847049c4249a8065659655a67657e975db086b476e
VirtualSize 0x16248
VirtualAddress 0x2b000
SizeOfRawData 0x16400
PointerToRawData 0x26200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.41259

Imports

KERNEL32.dll FindNextFileW
GetCurrentProcess
GetModuleHandleExW
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
GetEnvironmentVariableW
FindClose
MultiByteToWideChar
GetLastError
GetFileAttributesExW
GetFullPathNameW
GetProcAddress
DeleteCriticalSection
WideCharToMultiByte
IsWow64Process
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EnterCriticalSection
FindFirstFileExW
OutputDebugStringW
LoadLibraryA
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetLastError
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LCMapStringEx
DecodePointer
EncodePointer
InitializeCriticalSectionEx
GetStringTypeW
USER32.dll MessageBoxW
SHELL32.dll ShellExecuteW
ADVAPI32.dll RegOpenKeyExW
RegGetValueW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
RegCloseKey
api-ms-win-crt-runtime-l1-1-0.dll _register_onexit_function
_invalid_parameter_noinfo_noreturn
__p___argc
__p___wargv
exit
_initterm_e
_initterm
_get_initial_wide_environment
_initialize_wide_environment
_configure_wide_argv
_c_exit
terminate
_set_app_type
_seh_filter_exe
_cexit
_register_thread_local_exe_atexit_callback
_errno
_exit
abort
_crt_atexit
_initialize_onexit_table
api-ms-win-crt-stdio-l1-1-0.dll __stdio_common_vfwprintf
__stdio_common_vsprintf_s
setvbuf
__stdio_common_vswprintf
_set_fmode
__acrt_iob_func
fputwc
fputws
__stdio_common_vsnwprintf_s
_wfsopen
fflush
__p__commode
api-ms-win-crt-heap-l1-1-0.dll _set_new_mode
_callnewh
free
malloc
calloc
api-ms-win-crt-string-l1-1-0.dll wcsnlen
strcpy_s
_wcsdup
strcspn
wcsncmp
toupper
api-ms-win-crt-convert-l1-1-0.dll wcstoul
_wtoi
api-ms-win-crt-locale-l1-1-0.dll __pctype_func
_unlock_locales
_lock_locales
___lc_locale_name_func
___lc_codepage_func
___mb_cur_max_func
_configthreadlocale
setlocale
localeconv
api-ms-win-crt-math-l1-1-0.dll __setusermatherr
frexp
api-ms-win-crt-time-l1-1-0.dll _gmtime64_s
wcsftime
_time64

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.63747
MD5 430855c6406a3b725c03a4c95de9578c
SHA1 d5e196df6e682527a94456c2d942679080c83186
SHA256 dc19a1ac69618af090d827316a9aad77b3cb1c0c16cfa49d6744827d638b5dad
SHA3 d87973b814531f564ba09e2bbe1f3431f6d1f99e5901230dcf076ae77037e5d1

2

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.78657
MD5 7c82168af9d8bffe9480fdfb74758533
SHA1 e211859eaa089ff76b60a0205dad7ee3d95e9e0c
SHA256 a20736bf194b20b275fc0e1dad3d37967ef0a2eb342d6a32c7db914142d9787f
SHA3 903f6b3d9f4ee316638b2525e71ea142b42d4802b68fcb278c8bdd8ae5ad159c

3

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.22796
MD5 c291d905c0aad8604cb3d2573cb38284
SHA1 161f876ed10d7c639bd2bf10ed60665301cb90a9
SHA256 6294e396e5f5d78e6f8b2b49182c8e47127cc40d873f0092b1981a1686b3ecd2
SHA3 09054862a188fa2767da12843935cfc4d60434d8eafe5039eadc960c639473f5

32512

Type RT_GROUP_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x30
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.56083
Detected Filetype Icon file
MD5 83a28bf7f102d3ecd5436a5a4bf80e26
SHA1 6ec4c4a4d8d777cdce817893e3506a8893a4e568
SHA256 bc02ff6b88eaea24e83d4464a5513282bdac9147706c65e788ec5e7c842e4f3a
SHA3 5524804e3200035bbfe195f5fe4c2e05d49a5bd8adbd5c5f3edba5299269cd7b

1 (#2)

Type RT_VERSION
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x3a4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.35213
MD5 1fce4a99796e652ec3c3c82c38e2a98c
SHA1 1fb9e01904a06fca82dbeb78ed9e860296b27bc8
SHA256 d9082f2b1cac7286a9c6f5f209cfa42578669bd2a49a4281b7ecce6632a52179
SHA3 5ec068336b3c9d9d82e732f270bc051e90564dc2d99e9a0baaebc6b3688f60ad

1 (#3)

Type RT_MANIFEST
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.20.0.0
ProductVersion 1.20.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments www.vintagestory.at
CompanyName Tyron Madlener (Anego Studios)
FileDescription Vintage Story Client
FileVersion (#2) 1.20.0
InternalName Vintagestory.dll
LegalCopyright Copyright © 2016-2024 Anego Studios
OriginalFilename Vintagestory.dll
ProductName Vintage Story
ProductVersion (#2) 1.20.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2024-May-17 18:05:40
Version 0.0
SizeofData 109
AddressOfRawData 0x21460
PointerToRawData 0x20260
Referenced File D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\apphost\standalone\apphost.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2024-May-17 18:05:40
Version 0.0
SizeofData 20
AddressOfRawData 0x214d0
PointerToRawData 0x202d0

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2024-May-17 18:05:40
Version 0.0
SizeofData 984
AddressOfRawData 0x214e4
PointerToRawData 0x202e4

TLS Callbacks

StartAddressOfRawData 0x140021908
EndAddressOfRawData 0x140021918
AddressOfIndex 0x1400265b0
AddressOfCallbacks 0x14001b4e8
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_8BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140025040
GuardCFCheckFunctionPointer 5368820752
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

XOR Key 0xfc4fc1c3
Unmarked objects 0
Unmarked objects (#2) 1
C objects (33218) 12
ASM objects (33218) 18
C++ objects (33218) 80
Imports (VS2008 SP1 build 30729) 16
Imports (30795) 9
Total imports 164
C++ objects (LTCG) (33523) 10
Linker (33523) 1

Errors