7d318c7964fa30454b9c734a71c366c46973ca935219c67fca4ec4b515cb349f

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Apr-29 21:14:21
Detected languages English - United States
TLS Callbacks 1 callback(s) detected.
Debug artifacts BlurAutoClicker.pdb
CompanyName BlurAutoClicker
FileDescription BlurAutoClicker
FileVersion 3.5.0
ProductName BlurAutoClicker
ProductVersion 3.5.0

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: May have dropper capabilities:
  • CurrentVersion\Run
Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • api.github.com
  • birthpopuptypesapplyImagebeinguppernoteseveryshowsmeansextramatchtrackknownearlybegansuperpapernorthlearngivennamedendedTermspartsGroupbrandusingwomanfalsereadyaudiotakeswhile.com
  • console.info
  • developer.microsoft.com
  • genretrucklooksValueFrame.net
  • github.com
  • http://dummy.testC
  • http://www.C
  • http://www.a
  • http://www.css
  • http://www.hortcut
  • http://www.icon
  • http://www.interpretation
  • http://www.language
  • http://www.style
  • http://www.text-decoration
  • http://www.w3.org
  • http://www.w3.org/shortcut
  • http://www.wencodeURIComponent
  • http://www.years
  • https://api.github.com
  • https://api.github.com/repos/Blur009/Blur-AutoClicker/releases/latest
  • https://developer.microsoft.com
  • https://developer.microsoft.com/en-us/microsoft-edge/webview2
  • https://docs.rs
  • https://github.com
  • https://www.World
  • https://www.recent
  • microsoft.com
  • openssl.org
  • thing.org
  • www.w3.org
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to RC5 or RC6
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryExA
  • LoadLibraryW
  • LoadLibraryExW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Can access the registry:
  • RegGetValueW
  • RegQueryValueExW
  • RegOpenKeyExW
  • RegSetValueExW
  • RegCloseKey
  • RegDeleteValueW
Possibly launches other programs:
  • CreateProcessW
  • ShellExecuteW
Uses Windows's Native API:
  • NtReadFile
  • NtCancelIoFileEx
  • NtWriteFile
  • NtCreateNamedPipeFile
  • NtDeviceIoControlFile
  • NtCreateFile
  • NtOpenFile
  • NtSetTimerResolution
Can create temporary files:
  • GetTempPathW
  • CreateFileW
Uses functions commonly found in keyloggers:
  • MapVirtualKeyW
  • GetAsyncKeyState
  • GetForegroundWindow
Leverages the raw socket API to access the Internet:
  • WSAStartup
  • freeaddrinfo
  • getpeername
  • getsockname
  • getaddrinfo
  • connect
  • send
  • WSASend
  • WSACleanup
  • WSAIoctl
  • shutdown
  • WSAGetLastError
  • getsockopt
  • closesocket
  • setsockopt
  • bind
  • ioctlsocket
  • WSASocketW
  • recv
Can take screenshots:
  • GetDC
  • BitBlt
  • CreateCompatibleDC
Interacts with the certificate store:
  • CertOpenStore
  • CertAddEncodedCertificateToStore
  • CertAddCertificateContextToStore
Suspicious VirusTotal score: 1/70 (Scanned on 2026-05-02 13:18:28) Trapmine: suspicious.low.ml.score

Hashes

MD5 a21cda62f36bec3a13f276942c83ef74
SHA1 43918287af6f5e0e6086b57892e4d71fda1bfede
SHA256 7d318c7964fa30454b9c734a71c366c46973ca935219c67fca4ec4b515cb349f
SHA3 ebb67894269db5eec6bb0b4a9dc4129ecf678983a738cda889a6aa38bba953f0
SSDeep 196608:+SP/8WPT7qc9K8p2q3IFiNyci6zmJuPJ9Ilt:+SP/8WPT7qTMzm4PJu
Imports Hash 79519281f659ff76e1f8682b5db09845

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xe8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2026-Apr-29 21:14:21
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x94c600
SizeOfInitializedData 0x3eba00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000922FD0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xd3c000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 e6aa973a0be8708b960c9f7d4007985d
SHA1 57f5d207cc39145c7343298875c40f767e6c21dd
SHA256 9bbe4b517b0ecf8d8e159ce8cb066ae10687bcacf5575c7585bb02e2c93e87b6
SHA3 55472647abae76bda61b9af6788b3b5b3d1fab99311f19814a3327d8a6f927d6
VirtualSize 0x94c510
VirtualAddress 0x1000
SizeOfRawData 0x94c600
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.23991

.rdata

MD5 caedf83d4f9922a14c18f3ece504bee2
SHA1 2407fa6965082fb48e11eac94cc7bdfbda28c336
SHA256 6a626c47c023bbcb67037096e69ff298c19072952f5aeb58522f836b4828e009
SHA3 aba3e4b06640fbb926077495565454196a38c79df4f78f6545e15931569077d0
VirtualSize 0x379aa6
VirtualAddress 0x94e000
SizeOfRawData 0x379c00
PointerToRawData 0x94ca00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.28554

.data

MD5 c3ebfbb0b8c33685b90cce7269c22896
SHA1 30bac013aacca6e028e5ba72cfbe931fd1a2b096
SHA256 a2b6867a699960dec6a510d12bff2863726cb2cb24c18260983d74e041756b6e
SHA3 bd7f1a94cc532229b2062315302c9eb568259442213c969a02fefc14f24797e2
VirtualSize 0x5998
VirtualAddress 0xcc8000
SizeOfRawData 0x2e00
PointerToRawData 0xcc6600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.25267

.pdata

MD5 7be26d4124f7b9953218515996896bf9
SHA1 3698b863477eefef7a4c5107755e1854f5909f02
SHA256 c5973e35c7d03e108d65b49d06e79ed109d6dc6cd2bc6a6741584a1d9b08c7d8
SHA3 5345e460fb8f726d0a77eb498f4c2012b4f06c77df09ccb0a2103eea50c2654f
VirtualSize 0x6204c
VirtualAddress 0xcce000
SizeOfRawData 0x62200
PointerToRawData 0xcc9400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.57098

.rsrc

MD5 52c04a7f0488de13738056e38d9b9d5e
SHA1 8d367b3b54f3f980dc028fd0f301ce043a124d55
SHA256 5a0ff27780065aa5dcbec932aad2b80d69f3b5715d56b39bf8c8a9568492ece6
SHA3 234e721aef1d991b3064e544d2e4de17daadd2d25df614f0b1274a69f74cee87
VirtualSize 0x2438
VirtualAddress 0xd31000
SizeOfRawData 0x2600
PointerToRawData 0xd2b600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.43539

.reloc

MD5 d7982616e0f73447cbf0fa0ee523c0ec
SHA1 98fc776070774224d8a244f7e433feb8fc6593b4
SHA256 8d6f1b18ac40be43944ec6ce23495b78449ef7aef96817824ecc23ca0e837687
SHA3 fda15961a809691687f62c6ff59c8442186986432c07ce9aaed6bb2325913793
VirtualSize 0x7a18
VirtualAddress 0xd34000
SizeOfRawData 0x7c00
PointerToRawData 0xd2dc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.41752

Imports

bcryptprimitives.dll ProcessPrng
kernel32.dll GetModuleHandleA
HeapReAlloc
SwitchToThread
GetCurrentThreadId
GetModuleHandleW
GetCurrentProcessId
GetUserDefaultUILanguage
LCIDToLocaleName
GetCurrentThread
QueryThreadCycleTime
GetSystemTimePreciseAsFileTime
Sleep
LoadLibraryA
SetEnvironmentVariableW
GetCommandLineW
GetEnvironmentVariableW
GetCurrentDirectoryW
AddVectoredExceptionHandler
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetProcAddress
LoadLibraryExA
RtlVirtualUnwind
RtlCaptureContext
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
FormatMessageW
GetLastError
FindNextFileW
GetTempPathW
HeapAlloc
CloseHandle
HeapFree
IsDebuggerPresent
GetProcessHeap
GetFileAttributesW
CreateWaitableTimerExW
GetConsoleOutputCP
GetConsoleMode
LoadLibraryW
WriteConsoleW
DeviceIoControl
DeleteFileW
CreateSymbolicLinkW
GetFinalPathNameByHandleW
CreateMutexA
FindFirstFileExW
IsProcessorFeaturePresent
CreateDirectoryW
ReleaseSRWLockExclusive
CompareStringOrdinal
WaitForSingleObject
SleepEx
SetLastError
CreateProcessW
SetHandleInformation
RtlLookupFunctionEntry
GetSystemDirectoryW
GetWindowsDirectoryW
GetCurrentProcess
DuplicateHandle
SetThreadStackGuarantee
ExitProcess
GetSystemInfo
WideCharToMultiByte
WaitForSingleObjectEx
ReleaseMutex
MultiByteToWideChar
SetWaitableTimer
GetModuleFileNameW
GetFileInformationByHandleEx
GetFileInformationByHandle
SetFileInformationByHandle
SetFileTime
TerminateProcess
RtlPcToFileHeader
RaiseException
GetFullPathNameW
WriteFileEx
ReadFileEx
EncodePointer
CreateFileW
CancelIoEx
TlsAlloc
TlsGetValue
TlsSetValue
SetFileCompletionNotificationModes
CreateIoCompletionPort
GetQueuedCompletionStatusEx
TlsFree
SleepConditionVariableSRW
AcquireSRWLockExclusive
WriteFile
ReadFile
PostQueuedCompletionStatus
WakeAllConditionVariable
GetOverlappedResult
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlUnwindEx
lstrlenW
FindClose
OutputDebugStringA
OutputDebugStringW
LoadLibraryExW
FreeLibrary
CreateThread
DeleteCriticalSection
GetStdHandle
InitializeCriticalSectionAndSpinCount
advapi32.dll SystemFunction036
EventWriteTransfer
RegGetValueW
EventRegister
EventSetInformation
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegDeleteValueW
EventUnregister
oleaut32.dll SysStringLen
GetErrorInfo
SysFreeString
SetErrorInfo
ntdll.dll NtReadFile
NtCancelIoFileEx
NtWriteFile
NtCreateNamedPipeFile
NtDeviceIoControlFile
NtCreateFile
NtOpenFile
RtlGetVersion
NtSetTimerResolution
RtlNtStatusToDosError
api-ms-win-core-synch-l1-2-0.dll WaitOnAddress
WakeByAddressAll
WakeByAddressSingle
user32.dll TrackMouseEvent
SetCapture
SystemParametersInfoW
ReleaseCapture
GetKeyboardLayout
CloseTouchInputHandle
ToUnicodeEx
GetKeyState
GetSystemMenu
ClipCursor
GetClipCursor
ShowCursor
LoadCursorW
MsgWaitForMultipleObjectsEx
MapVirtualKeyExW
SetCursor
GetRawInputData
SetCursorPos
ValidateRect
MapVirtualKeyW
GetMenu
GetWindowTextLengthW
DestroyMenu
RemoveMenu
DestroyIcon
GetWindowTextW
CreateIcon
EnableMenuItem
CheckMenuItem
CreatePopupMenu
CreateMenu
SetMenu
DrawMenuBar
SetMenuItemInfoW
SetWindowTextW
AppendMenuW
InsertMenuW
SystemParametersInfoA
FillRect
IsProcessDPIAware
GetKeyboardState
GetDC
TrackPopupMenu
PostQuitMessage
DrawTextW
ReleaseDC
GetWindowDC
OffsetRect
MapWindowPoints
GetMenuBarInfo
DestroyWindow
DestroyAcceleratorTable
InvalidateRect
GetSystemMetrics
GetMonitorInfoW
MonitorFromRect
SetPropW
RegisterWindowMessageA
ClientToScreen
GetWindowLongW
ScreenToClient
SetWindowRgn
DefWindowProcW
SetWindowLongPtrW
PostThreadMessageW
PeekMessageW
DispatchMessageW
GetMessageW
FindWindowExW
GetAsyncKeyState
PostMessageW
ShowWindow
GetParent
IsWindowEnabled
EnableWindow
MonitorFromPoint
EnumDisplayMonitors
MonitorFromWindow
IsIconic
IsWindowVisible
RedrawWindow
GetCursorPos
SendMessageW
EnumChildWindows
UpdateWindow
SetWindowLongW
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowPos
CreateWindowExW
RegisterClassExW
TranslateAcceleratorW
GetWindowRect
GetClientRect
RegisterRawInputDevices
RegisterClassW
GetWindowLongPtrW
ChangeWindowMessageFilterEx
AdjustWindowRect
GetMenuItemInfoW
KillTimer
CreateAcceleratorTableW
SetTimer
GetWindow
GetForegroundWindow
GetUpdateRect
ChangeDisplaySettingsExW
SetFocus
SetWindowPlacement
SetParent
InvalidateRgn
GetTouchInputInfo
GetWindowPlacement
SetWindowDisplayAffinity
SendInput
SetForegroundWindow
GetActiveWindow
RegisterTouchWindow
IsWindow
AdjustWindowRectEx
DrawIconEx
FlashWindowEx
comctl32.dll RemoveWindowSubclass
DefSubclassProc
TaskDialogIndirect
SetWindowSubclass
ole32.dll CoTaskMemAlloc
CoCreateFreeThreadedMarshaler
OleInitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
CoInitializeEx
CoUninitialize
RegisterDragDrop
RevokeDragDrop
shell32.dll ILFree
SHOpenFolderAndSelectItems
SHAppBarMessage
ILCreateFromPathW
DragFinish
Shell_NotifyIconW
SHGetKnownFolderPath
Shell_NotifyIconGetRect
ShellExecuteExW
DragQueryFileW
ShellExecuteW
gdi32.dll BitBlt
CombineRgn
SetBkMode
CreateRectRgn
DeleteDC
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
GetDeviceCaps
SetTextColor
CreateSolidBrush
dwmapi.dll DwmGetWindowAttribute
DwmSetWindowAttribute
DwmEnableBlurBehindWindow
shlwapi.dll SHCreateMemStream
crypt32.dll CertEnumCertificatesInStore
CertFreeCertificateChain
CertDuplicateCertificateChain
CertDuplicateStore
CertVerifyCertificateChainPolicy
CertOpenStore
CertDuplicateCertificateContext
CertAddEncodedCertificateToStore
CertCreateCertificateChainEngine
CertCloseStore
CertFreeCertificateContext
CertGetCertificateChain
CertFreeCertificateChainEngine
CertAddCertificateContextToStore
CertSetCertificateContextProperty
bcrypt.dll BCryptGenRandom
ws2_32.dll WSAStartup
freeaddrinfo
getpeername
getsockname
getaddrinfo
connect
send
WSASend
WSACleanup
WSAIoctl
shutdown
WSAGetLastError
getsockopt
closesocket
setsockopt
bind
ioctlsocket
WSASocketW
recv
secur32.dll AcceptSecurityContext
FreeCredentialsHandle
QueryContextAttributesW
AcquireCredentialsHandleA
ApplyControlToken
EncryptMessage
InitializeSecurityContextW
DecryptMessage
DeleteSecurityContext
FreeContextBuffer
api-ms-win-crt-math-l1-1-0.dll log
roundf
__setusermatherr
sin
cos
pow
trunc
floor
round
api-ms-win-crt-string-l1-1-0.dll wcslen
strlen
strcmp
_wcsicmp
wcscmp
strcpy_s
wcsncmp
api-ms-win-crt-convert-l1-1-0.dll wcstol
_wtoi
_ultow_s
api-ms-win-crt-runtime-l1-1-0.dll _initialize_onexit_table
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
_register_onexit_function
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_configure_narrow_argv
abort
_set_app_type
_seh_filter_exe
_crt_atexit
terminate
__p___argc
_initialize_narrow_environment
api-ms-win-crt-stdio-l1-1-0.dll __p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll _set_new_mode
malloc
_callnewh
free
calloc

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1f9e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.87476
Detected Filetype PNG graphic file
MD5 e7cb4b618f71af54372d3d6413e6371d
SHA1 e52a937015edaa0f86d26d85e9bd7f3217648b71
SHA256 727e8b404c7c88479d682700feb782ec0d54ab328e4dbb4490804c903b62e510
SHA3 e7d7c52cad6df3340c292c08e36ad7df5839fc78ab982ed26146568dd82f8fe9

32512

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.51664
Detected Filetype Icon file
MD5 5a333b18bad1856623b7dac01d9797e3
SHA1 6825dd3e21df344215fbf1dfd32dc2ccf9a2e5c9
SHA256 d007af99b070c22daff5b380e96e48679f3731a547762b8778de05efd313d975
SHA3 60ed2e90fec9a093c4867093f4e3d8db10a3363f9514aaced2e682a1b3211692

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x200
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.2448
MD5 8f0942d01b590702de0b92d4014026db
SHA1 5c9fea4d581306f480f7a2edf633a4c9b8f8e183
SHA256 927f003a6038e7a8939850ca9739425d19563b573b6a51812a06b39e4b0fb854
SHA3 917d00be1c26def325b0bc5460c054ac8f75d67d978c09b3336e7519d6a46a61

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x14e
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.96056
MD5 01e4c8c046a47771f13cd120b53303e7
SHA1 2a4224d31c916a5cff4f2636a3cb47fdd84a5cc9
SHA256 b1cb832f790c153aa0e9a66f76e75460263cf1d41971d2dbcc9a4d87ec18b7d8
SHA3 680120ec819e7ba66519d9a8a3e446973c4cb28aa0146c91cceaa8c8fadc90ae

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 3.5.0.0
ProductVersion 3.5.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
CompanyName BlurAutoClicker
FileDescription BlurAutoClicker
FileVersion (#2) 3.5.0
ProductName BlurAutoClicker
ProductVersion (#2) 3.5.0
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-Apr-29 21:14:21
Version 0.0
SizeofData 44
AddressOfRawData 0xb2b974
PointerToRawData 0xb2a374
Referenced File BlurAutoClicker.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2026-Apr-29 21:14:21
Version 0.0
SizeofData 20
AddressOfRawData 0xb2b9a0
PointerToRawData 0xb2a3a0

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2026-Apr-29 21:14:21
Version 0.0
SizeofData 1048
AddressOfRawData 0xb2b9b4
PointerToRawData 0xb2a3b4

TLS Callbacks

StartAddressOfRawData 0x140b2be18
EndAddressOfRawData 0x140b2c054
AddressOfIndex 0x140ccd284
AddressOfCallbacks 0x14094eda8
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_8BYTES
Callbacks 0x00000001407A2C80

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140ccac40

RICH Header

XOR Key 0xedf8da82
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 15
ASM objects (35207) 9
C objects (35207) 13
C++ objects (35207) 47
C objects (35225) 12
Total imports 408
Unmarked objects (#2) 295
Resource objects (35225) 1
Linker (35225) 1

Errors

Leave a comment

No comments yet.