827c8b3a6bd95162eba593908aa52bb1e770adab73be6b1c266e2720fca23d23

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Apr-21 22:53:07
Detected languages English - United States
Japanese - Japan
TLS Callbacks 1 callback(s) detected.
Debug artifacts C:\CoopGame\ECStest\NewFrameWork\x64\Release\Application.pdb

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Info Interesting strings found in the binary: Contains domain names:
  • Output.xyz
  • blogspot.com
  • cameraPosition.xyz
  • chilliant.blogspot.com
  • color.xyz
  • diffuseColor.xyz
  • emissive.xyz
  • http://chilliant.blogspot.com
  • http://chilliant.blogspot.com/2012/08/srgb-approximations-for-hlsl.html
  • https://curl.se
  • lightAmbientColor.xyz
  • lightColor.xyz
  • lightDirection.xyz
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses known Mersenne Twister constants
Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .msvcjmc
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
  • LoadLibraryExA
Uses Microsoft's cryptographic API:
  • CryptStringToBinaryA
  • CryptDecodeObjectEx
  • CryptQueryObject
  • CryptGetHashParam
  • CryptEncrypt
  • CryptImportKey
  • CryptDestroyKey
  • CryptDestroyHash
  • CryptHashData
  • CryptAcquireContextA
  • CryptReleaseContext
  • CryptCreateHash
Uses functions commonly found in keyloggers:
  • GetAsyncKeyState
  • GetForegroundWindow
Leverages the raw socket API to access the Internet:
  • gethostname
  • ioctlsocket
  • sendto
  • recvfrom
  • freeaddrinfo
  • getaddrinfo
  • listen
  • htonl
  • select
  • __WSAFDIsSet
  • WSAIoctl
  • WSASetLastError
  • setsockopt
  • recv
  • getsockname
  • getpeername
  • connect
  • bind
  • accept
  • WSACleanup
  • WSAStartup
  • ntohs
  • socket
  • htons
  • WSAGetLastError
  • closesocket
  • WSAEventSelect
  • WSAEnumNetworkEvents
  • WSACreateEvent
  • WSACloseEvent
  • send
  • getsockopt
Reads the contents of the clipboard:
  • GetClipboardData
Interacts with the certificate store:
  • CertOpenStore
  • CertAddCertificateContextToStore
Suspicious VirusTotal score: 1/72 (Scanned on 2026-04-24 03:38:12) Rising: Trojan.Kryptik@AI.80 (RDML:uyd52RIQqzaJ2D+N8z8iCg)

Hashes

MD5 b1aa7a7c633df94aa91f21976b96a250
SHA1 1ee95e16a6236ec0899639a100d83753b01b8d80
SHA256 827c8b3a6bd95162eba593908aa52bb1e770adab73be6b1c266e2720fca23d23
SHA3 4fff07c33719847b73dec7a451f21c13888c2823755fc158650aa0bf7353e4f5
SSDeep 393216:ugu+aZ4TTMJv5k1VdBuIATYRbb3RaEfiL0v6ifeF8VvJgOAtX/Tseip0T+gc2eX:7Q
Imports Hash d182e3615c4478255daebe419ba25e48

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x130

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2026-Apr-21 22:53:07
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x83c400
SizeOfInitializedData 0x8c3200
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000007EB304 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x1104000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 3667941e4d194c179c3687448b576bd6
SHA1 752529a55f5de1d722c71a3c04203db3f5b3868b
SHA256 c825b15166671b8838851847f68696ec872c9ecfa681f5edfafd7598ae7ed7ff
SHA3 b1b01ec8c30e771ddbcf057ea9d7021faf69ca4c21eead5008b2c98fea430aaf
VirtualSize 0x83c203
VirtualAddress 0x1000
SizeOfRawData 0x83c400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.45141

.rdata

MD5 525c4738abdf089d95f850f64e1c772d
SHA1 d4d483f9c44eccd83a09e73c8cead0da6682decc
SHA256 e07beebefb6f3b383c9a71df88c50f0ee0f186fac2abadb30fd7dfa6f67f79b5
SHA3 a717bb1161c3d41198fbd4c1d0458126bd35d586421100373e03f1637556afd4
VirtualSize 0x2dd580
VirtualAddress 0x83e000
SizeOfRawData 0x2dd600
PointerToRawData 0x83c800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.11969

.data

MD5 34bda462ab8fbed4381300fdcd3980a8
SHA1 aabe7f56765a6e75ca312211c5cd7a57ed6ab7e7
SHA256 8a5f6abe0b985de66f253fb8713b22715264aef120a5d6b91d8756705ba9bebd
SHA3 70a4223039b23fe8db2c450d92aa73f10d1c074caf3d825bb3d75301f41bb30a
VirtualSize 0x51ce28
VirtualAddress 0xb1c000
SizeOfRawData 0x4d0e00
PointerToRawData 0xb19e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.00507

.pdata

MD5 916bd4e2debb3353cd3d9d9f80c86279
SHA1 ba99386bf2b91af58df85e90ee342c5e678a0af5
SHA256 8591499e129f8f29e4c7727c6404ac958f42549eb81da58f27d74313bac2fc7c
SHA3 8656852d231cd8d0e522439cdc0f5d54cdf37ea144128dc109e8e5162a693772
VirtualSize 0x7167c
VirtualAddress 0x1039000
SizeOfRawData 0x71800
PointerToRawData 0xfeac00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.36118

.msvcjmc

MD5 f64c19e42726db5b3445d61b1748ac57
SHA1 e4f99b88c48bcd6db3e2360576901e809eef8b5a
SHA256 ea5e5b469d2547a49bd77488caf49327fbcea3346f73c90d58dac50a119014eb
SHA3 06145ecdf8791f090564dad445f6ecb26f3e0291c02728d67a9114d123a6e472
VirtualSize 0x189f7
VirtualAddress 0x10ab000
SizeOfRawData 0x18a00
PointerToRawData 0x105c400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.00132905

.rsrc

MD5 0969205bbc29e63113ccca58fc864e8d
SHA1 ce3f95905a17500bd5ca128c4b758fff33de4941
SHA256 440970d58f07b6157771ea7bee9821a7d00df1dbf67eb1cb46672a72488743de
SHA3 28f1b729b655c2f8e551a39aeaaf44af9477af3f101ea0cb249a2a890a641b4e
VirtualSize 0x17218
VirtualAddress 0x10c4000
SizeOfRawData 0x17400
PointerToRawData 0x1074e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.02327

.reloc

MD5 16d957c6c59db5acf80abc51c0d8be29
SHA1 a332e3babf736c3708ee9a10191cec677e0cc1fd
SHA256 ee85722b6d776e12b3ac568723baa55bb403adafb8e0703838e9c97db4746834
SHA3 a2a34b3cfbdd3eee526337e70d3f107d9a75cc02525108e3aa53ec13628c20e0
VirtualSize 0x2742c
VirtualAddress 0x10dc000
SizeOfRawData 0x27600
PointerToRawData 0x108c200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.46497

Imports

WS2_32.dll gethostname
ioctlsocket
sendto
recvfrom
freeaddrinfo
getaddrinfo
listen
htonl
select
__WSAFDIsSet
WSAIoctl
WSASetLastError
setsockopt
recv
getsockname
getpeername
connect
bind
accept
WSACleanup
WSAStartup
ntohs
socket
htons
WSAGetLastError
closesocket
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockopt
CRYPT32.dll CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CryptStringToBinaryA
CertFreeCertificateContext
PFXImportCertStore
CryptDecodeObjectEx
CertFindCertificateInStore
CertAddCertificateContextToStore
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
Secur32.dll InitSecurityInterfaceA
KERNEL32.dll ReleaseSRWLockShared
GetLocaleInfoEx
FormatMessageA
AcquireSRWLockShared
RtlCaptureContext
RtlLookupFunctionEntry
TryAcquireSRWLockExclusive
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
SetDllDirectoryW
GetModuleFileNameA
GetLastError
WaitForSingleObject
CloseHandle
MultiByteToWideChar
GetModuleHandleW
GlobalLock
WideCharToMultiByte
GlobalUnlock
GlobalAlloc
GlobalFree
GetLocaleInfoA
QueryPerformanceFrequency
QueryPerformanceCounter
LoadLibraryA
GetProcAddress
GetModuleHandleA
VerSetConditionMask
GetFileAttributesW
CreateFileW
ReadFile
SleepConditionVariableSRW
SetFilePointerEx
GetFileInformationByHandleEx
SetFilePointer
InitOnceExecuteOnce
SetEvent
WaitForMultipleObjectsEx
CreateEventExW
WaitForSingleObjectEx
RaiseException
GetCurrentThread
IsDebuggerPresent
CreateSemaphoreA
ReleaseSemaphore
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
SetLastError
InitializeCriticalSectionEx
SleepEx
FormatMessageW
GetTickCount
Sleep
GetFullPathNameW
MoveFileExA
CreateThread
GetEnvironmentVariableA
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
VerifyVersionInfoW
CreateFileA
GetFileSizeEx
LocalFree
GetSystemTimeAsFileTime
RtlVirtualUnwind
AreFileApisANSI
TryAcquireSRWLockShared
GetCurrentThreadId
WakeAllConditionVariable
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetFinalPathNameByHandleW
GetFileAttributesExW
FindNextFileW
FindFirstFileExW
FindFirstFileW
FindClose
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
LoadLibraryExA
InitializeSListHead
VirtualQuery
VirtualProtect
FreeLibrary
GetSystemInfo
GetCurrentProcessId
USER32.dll IsWindowUnicode
ReleaseCapture
SetCapture
GetCapture
TrackMouseEvent
GetMessageExtraInfo
GetKeyState
SetCursor
GetKeyboardLayout
SetClipboardData
EmptyClipboard
CloseClipboard
GetClipboardData
OpenClipboard
GetWindowRect
PostQuitMessage
RemovePropW
DefWindowProcW
SetPropW
GetPropW
DispatchMessageW
TranslateMessage
PeekMessageW
DestroyWindow
GetAsyncKeyState
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
MessageBoxA
MoveWindow
LoadCursorW
LoadIconW
ShowCursor
ScreenToClient
GetForegroundWindow
SetCursorPos
ClientToScreen
GetClientRect
GetCursorPos
SetWindowTextA
GDI32.dll GetStockObject
COMDLG32.dll GetSaveFileNameA
GetOpenFileNameA
ADVAPI32.dll CryptGetHashParam
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptAcquireContextA
CryptReleaseContext
CryptCreateHash
ole32.dll CoCreateInstance
CoInitializeEx
CoUninitialize
PropVariantClear
WINMM.dll timeGetTime
timeBeginPeriod
MSVCP140.dll ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ
?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z
?peek@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Random_device@std@@YAIXZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?_Xbad_alloc@std@@YAXXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
_Mtx_trylock
_Thrd_yield
_Cnd_signal
_Cnd_broadcast
_Cnd_wait
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Xlength_error@std@@YAXPEBD@Z
?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Incref@facet@locale@std@@UEAAXXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
??1_Locinfo@std@@QEAA@XZ
??1_Lockit@std@@QEAA@XZ
??0_Locinfo@std@@QEAA@PEBD@Z
??0_Lockit@std@@QEAA@H@Z
??1facet@locale@std@@MEAA@XZ
??0facet@locale@std@@IEAA@_K@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?id@?$ctype@D@std@@2V0locale@2@A
?_Id_cnt@id@locale@std@@0HA
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?good@ios_base@std@@QEBA_NXZ
?uncaught_exceptions@std@@YAHXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z
?tolower@?$ctype@D@std@@QEBADD@Z
_Strxfrm
?tolower@?$ctype@D@std@@QEBAPEBDPEADPEBD@Z
?_Getcoll@_Locinfo@std@@QEBA?AU_Collvec@@XZ
_Strcoll
?id@?$collate@D@std@@2V0locale@2@A
?_Xout_of_range@std@@YAXPEBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
?_Xbad_function_call@std@@YAXXZ
_Xtime_get_ticks
_Query_perf_counter
_Query_perf_frequency
?_Syserror_map@std@@YAPEBDH@Z
?_Winerror_map@std@@YAHH@Z
_Thrd_hardware_concurrency
??7ios_base@std@@QEBA_NXZ
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
_Thrd_id
_Mtx_unlock
?_Throw_Cpp_error@std@@YAXH@Z
_Mtx_lock
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
_Thrd_join
_Cnd_do_broadcast_at_thread_exit
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??Bios_base@std@@QEBA_NXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?always_noconv@codecvt_base@std@@QEBA_NXZ
?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
MSVCP140_ATOMIC_WAIT.dll __std_atomic_wait_get_remaining_timeout
__std_atomic_wait_direct
__std_atomic_notify_all_direct
__std_atomic_notify_one_direct
__std_atomic_wait_get_deadline
d3d11.dll D3D11CreateDevice
dxgi.dll CreateDXGIFactory1
RPCRT4.dll UuidToStringA
UuidCreate
UuidFromStringA
XINPUT1_4.dll #2
IMM32.dll ImmSetCompositionWindow
ImmSetCandidateWindow
ImmReleaseContext
ImmGetContext
D3DCOMPILER_47.dll D3DReflect
D3DCompile
D3DPreprocess
bcrypt.dll BCryptGenRandom
VCRUNTIME140_1.dll __CxxFrameHandler4
VCRUNTIME140.dll __current_exception_context
__RTDynamicCast
strchr
__current_exception
memchr
strrchr
__std_terminate
__std_exception_copy
__std_exception_destroy
_purecall
__std_type_info_compare
__std_type_info_hash
__std_type_info_name
_CxxThrowException
__C_specific_handler
strstr
memcpy
memset
memcmp
memmove
api-ms-win-crt-runtime-l1-1-0.dll __sys_nerr
__sys_errlist
_invalid_parameter_noinfo_noreturn
abort
terminate
_errno
_invalid_parameter_noinfo
_register_thread_local_exe_atexit_callback
_beginthreadex
_c_exit
_exit
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
exit
_set_app_type
_initterm_e
_get_narrow_winmain_command_line
_initterm
_invoke_watson
api-ms-win-crt-heap-l1-1-0.dll malloc
_aligned_free
_aligned_malloc
free
realloc
_callnewh
calloc
_set_new_mode
api-ms-win-crt-locale-l1-1-0.dll setlocale
___lc_codepage_func
localeconv
_configthreadlocale
api-ms-win-crt-stdio-l1-1-0.dll fopen
_set_fmode
_open
fgets
ftell
_wfopen
__p__commode
_wfopen_s
fputs
_fileno
_close
__stdio_common_vsprintf_s
fflush
fseek
setvbuf
_lseeki64
_write
fsetpos
__acrt_iob_func
__stdio_common_vsscanf
_fseeki64
_read
fgetpos
fwrite
__stdio_common_vsprintf
fclose
_get_stream_buffer_pointers
__stdio_common_vfprintf
feof
fputc
ungetc
fgetc
fread
api-ms-win-crt-math-l1-1-0.dll log10f
sinf
cosf
sqrtf
ceilf
floorf
roundf
_fdclass
_fdopen
modff
lroundf
atan2f
_dsign
ldexp
__setusermatherr
pow
round
asinf
acosf
expf
log
_dclass
logf
fmodf
tanf
powf
api-ms-win-crt-convert-l1-1-0.dll strtoll
strtoull
mbstowcs
strtod
wcstombs
atoi
atof
strtol
api-ms-win-crt-filesystem-l1-1-0.dll _stat64
_unlink
_lock_file
_unlock_file
_fstat64
_fullpath
api-ms-win-crt-utility-l1-1-0.dll rand
qsort
api-ms-win-crt-string-l1-1-0.dll strncpy_s
strncmp
toupper
strlen
tolower
strcspn
strcmp
isalnum
_strdup
strcpy
wcslen
wcsncmp
wcsncpy
wcscpy
strpbrk
strncpy
strcpy_s
strspn
api-ms-win-crt-time-l1-1-0.dll _gmtime64
strftime
_time64
api-ms-win-crt-multibyte-l1-1-0.dll _mbschr
_mbsnbcpy
_mbsnbcmp
assimp-vc142-mt.dll (delay-loaded) ??1Importer@Assimp@@QEAA@XZ
aiGetMaterialFloatArray
aiGetMaterialColor
?ReadFile@Importer@Assimp@@QEAAPEBUaiScene@@PEBDI@Z
??0Importer@Assimp@@QEAA@XZ
aiGetMaterialString
?SetPropertyInteger@Importer@Assimp@@QEAA_NPEBDH@Z

Delayed Imports

Attributes 0x1
Name assimp-vc142-mt.dll
ModuleHandle 0xfecd90
DelayImportAddressTable 0xfecd48
DelayImportNameTable 0xb17180
BoundDelayImportTable 0xb172b0
UnloadDelayImportTable 0
TimeStamp 1970-Jan-01 00:00:00

1

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x115a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.40514
Detected Filetype PNG graphic file
MD5 80effeaf0f7f73030c8c163b1d372a73
SHA1 2fe13eb3e7bca557f85fc8f9b9cae0bcc471b2b8
SHA256 fb2d880da70a3656bd101b0abef32bf9fa1cd534f722390a89726d6688a9b69a
SHA3 09fc211cee1c94a133ffcd534ee37fbf0cbc1361fd7597fdae82672b1a5ed951

2

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.26975
MD5 f1116353e3532f47558905b9bf055ccd
SHA1 c811f9279167c9403f4ace49d15ea4903e111a4c
SHA256 8449d82e04180f53b51638f4be40711c0ec460a6d8974814281ca3ad023a6f7c
SHA3 8b370bb368464c8ef4b224957a67081802a791c011f3a79505fcbb00750bf58d

3

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.1346
MD5 556efe1176ce501c76135e739a4e351f
SHA1 8111ff3a50a39de110c9e7ec763b6e8ff7ee0ef2
SHA256 4d473837de08a8436ca2395d0c5f32c21520932efdeddc1901a10af5392f88d9
SHA3 5ee61c09e5a367b13359b017f3154d6b35c0ba5c7ca0b56adde22d7aa36b8507

4

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x568
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.398
MD5 837e52eb38d74315e357d8f125c4df81
SHA1 03c8def2cd7c7cb2ed4104ecddfe81b6ddd4e658
SHA256 98174f3472ca0f9554ba63205b25c32599203ed666ed11fe97b0ea8e139bfcbb
SHA3 e311783462de1ba36b6ee0703350bf7e2e1d4bdd64e4290fbc2ac4d4be1fb838

5

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x90b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.34276
Detected Filetype PNG graphic file
MD5 6ddb2971171f0cbb5a7a1e24daf9c058
SHA1 a92c044ebf614033ebcecb80ab7da6db5b0f47ba
SHA256 29f3cf41dd19aae1f411e6682ad4076909714abcec3c7604da2865d8781f4435
SHA3 4e91d648365b090fd3d80a8178669937da27063df98faebc1f0e9b2bcc9fd26e

6

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.68124
MD5 020378554aef476bca9321efd923987b
SHA1 bf562d60d3cfcd46edc694b514067f794f889b4d
SHA256 f12c4d9291ec41fe83d9f607e7e5e97c9ad91d4b6ce630362c90a7bbb6a33f87
SHA3 5bdea54b791bb08ed05c13760559a65dc1094e9359b70070333f561218217d3c

7

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.80715
MD5 ee6aab0d2a2a3b593c956cf42f77ae3a
SHA1 80eea6b72d811395a7ae8faa087f6c4e023113c1
SHA256 5d3accd3fffb51a126c51b31c8c702eb82d7d263adc40f79cef611505b657b2e
SHA3 10af8fd3eb86072414476d7292ca23b3cc81a97950e0b2de7c174c7fdc0b2829

8

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.82161
MD5 754e2bdcacf6a45aeae73a4fe1e18874
SHA1 4201cb1e3adbad8d330ed3b4a5dbd93be8d7a23a
SHA256 26109c3d569485c1a47d9387a1c01c8ba80e5f72c5b3e68349e1fb445f3c8a91
SHA3 2b9b049adf2fa9fad570f5e40eaa1b32f374d686a03f2b3ca42dbd584e169a2e

9

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.9458
MD5 049adcf7dae1847bdc61e2839c33815f
SHA1 63ed6cc6be6dfc49080de6a75c19fdda47bb6e4d
SHA256 6b75bee5cf9b91b5365172e6cec8710325aea24bfd15eb71343b1e4e048f5558
SHA3 20ce7114961ea521dc59b71b0cad68fc3896c90b7813b067e75a3174dd19a79b

10

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x115a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.40514
Detected Filetype PNG graphic file
MD5 80effeaf0f7f73030c8c163b1d372a73
SHA1 2fe13eb3e7bca557f85fc8f9b9cae0bcc471b2b8
SHA256 fb2d880da70a3656bd101b0abef32bf9fa1cd534f722390a89726d6688a9b69a
SHA3 09fc211cee1c94a133ffcd534ee37fbf0cbc1361fd7597fdae82672b1a5ed951

11

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.26975
MD5 f1116353e3532f47558905b9bf055ccd
SHA1 c811f9279167c9403f4ace49d15ea4903e111a4c
SHA256 8449d82e04180f53b51638f4be40711c0ec460a6d8974814281ca3ad023a6f7c
SHA3 8b370bb368464c8ef4b224957a67081802a791c011f3a79505fcbb00750bf58d

12

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.1346
MD5 556efe1176ce501c76135e739a4e351f
SHA1 8111ff3a50a39de110c9e7ec763b6e8ff7ee0ef2
SHA256 4d473837de08a8436ca2395d0c5f32c21520932efdeddc1901a10af5392f88d9
SHA3 5ee61c09e5a367b13359b017f3154d6b35c0ba5c7ca0b56adde22d7aa36b8507

13

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x568
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.398
MD5 837e52eb38d74315e357d8f125c4df81
SHA1 03c8def2cd7c7cb2ed4104ecddfe81b6ddd4e658
SHA256 98174f3472ca0f9554ba63205b25c32599203ed666ed11fe97b0ea8e139bfcbb
SHA3 e311783462de1ba36b6ee0703350bf7e2e1d4bdd64e4290fbc2ac4d4be1fb838

14

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x90b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.34276
Detected Filetype PNG graphic file
MD5 6ddb2971171f0cbb5a7a1e24daf9c058
SHA1 a92c044ebf614033ebcecb80ab7da6db5b0f47ba
SHA256 29f3cf41dd19aae1f411e6682ad4076909714abcec3c7604da2865d8781f4435
SHA3 4e91d648365b090fd3d80a8178669937da27063df98faebc1f0e9b2bcc9fd26e

15

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.68124
MD5 020378554aef476bca9321efd923987b
SHA1 bf562d60d3cfcd46edc694b514067f794f889b4d
SHA256 f12c4d9291ec41fe83d9f607e7e5e97c9ad91d4b6ce630362c90a7bbb6a33f87
SHA3 5bdea54b791bb08ed05c13760559a65dc1094e9359b70070333f561218217d3c

16

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.80715
MD5 ee6aab0d2a2a3b593c956cf42f77ae3a
SHA1 80eea6b72d811395a7ae8faa087f6c4e023113c1
SHA256 5d3accd3fffb51a126c51b31c8c702eb82d7d263adc40f79cef611505b657b2e
SHA3 10af8fd3eb86072414476d7292ca23b3cc81a97950e0b2de7c174c7fdc0b2829

17

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.82161
MD5 754e2bdcacf6a45aeae73a4fe1e18874
SHA1 4201cb1e3adbad8d330ed3b4a5dbd93be8d7a23a
SHA256 26109c3d569485c1a47d9387a1c01c8ba80e5f72c5b3e68349e1fb445f3c8a91
SHA3 2b9b049adf2fa9fad570f5e40eaa1b32f374d686a03f2b3ca42dbd584e169a2e

18

Type RT_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.9458
MD5 049adcf7dae1847bdc61e2839c33815f
SHA1 63ed6cc6be6dfc49080de6a75c19fdda47bb6e4d
SHA256 6b75bee5cf9b91b5365172e6cec8710325aea24bfd15eb71343b1e4e048f5558
SHA3 20ce7114961ea521dc59b71b0cad68fc3896c90b7813b067e75a3174dd19a79b

109

Type RT_MENU
Language Japanese - Japan
Codepage UNKNOWN
Size 0x62
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.74933
MD5 3e4c613d35661b15872dd197cf22951b
SHA1 61a2fe684bb88d44c010588a6baeb113596c6655
SHA256 8e84fa889208ea041485268ad21ba2c008cbab9f1a9e162b38977788cfca122e
SHA3 aa72a0f5114eaacc6a55eedb832c4c656f2d0e209ba8b6971592f39866104370

103

Type RT_DIALOG
Language Japanese - Japan
Codepage UNKNOWN
Size 0x140
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.44554
MD5 ecf2316484913643da22207ba4a324d7
SHA1 a999e8f9f1506484ff3e5c457f22b3ee12860a8c
SHA256 cc322170fe3f75f35d7b79f6e2494059ca5860cca6331822f93dee9f4a6a146e
SHA3 a9044b75d9abbe8bbad2e1f49b1424b8a025a1592dbbe09ad6ee13378f1175fc

7 (#2)

Type RT_STRING
Language Japanese - Japan
Codepage UNKNOWN
Size 0x4c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.15348
MD5 3eb96bf03cfe035901f65610218c69fd
SHA1 98e22428db394721259897279134d4f4960bd230
SHA256 6da734029cacc827f3b977118bf40d84d9ba1245d26a30dfd6a4ce11d165d4c1
SHA3 bde0a0aba25a71100b18f0e2f803d040df83a7c4a664662a70181412b16ab5a3

109 (#2)

Type RT_ACCELERATOR
Language Japanese - Japan
Codepage UNKNOWN
Size 0x10
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.79879
MD5 3d2b1af3424dbcd504f73918619c7d99
SHA1 10d6ed54ea742211a14a05414883f6c00c03080a
SHA256 c2f0c188d6c493d7827bf83fb89c704815796445a0178bb2ae79658d96703a3c
SHA3 b8c5f28d2c132e5bc304e4dc1b314a3f32a2e48675c06828a2a8a014ea05e7fb

108

Type RT_GROUP_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x84
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.85121
Detected Filetype Icon file
MD5 761371fb444ffe3cba9630fa53a07e52
SHA1 09e05edf4a7a8d5b314e96d9aae9250fd86ea068
SHA256 ca27366c72f3cad07bc9e39d6626a6a059cb939d6985475e49dd8e5b93cbbe86
SHA3 32af3f3ea06c3d9cc09fb775f4610d3b91f2af87cb8a700b5d1b0ab04f95b0ce

32512

Type RT_GROUP_ICON
Language Japanese - Japan
Codepage UNKNOWN
Size 0x84
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.80887
Detected Filetype Icon file
MD5 3c05e220887a3ece785e94ba01ef2365
SHA1 58b72f9ecac3827e770a073030bf1c48de0e31f1
SHA256 b89482d2dfd349ed0465241aa76507fd25a49dfafed3c7233afd53a3ff36f6a7
SHA3 2cd355b6a0b659201c97af9c629791d1d7e083c8a4dca9ab93ce5582cae117ae

1 (#2)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

String Table contents

Application
APPLICATION

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-Apr-21 22:53:07
Version 0.0
SizeofData 85
AddressOfRawData 0xaa751c
PointerToRawData 0xaa5d1c
Referenced File C:\CoopGame\ECStest\NewFrameWork\x64\Release\Application.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2026-Apr-21 22:53:07
Version 0.0
SizeofData 20
AddressOfRawData 0xaa7574
PointerToRawData 0xaa5d74

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2026-Apr-21 22:53:07
Version 0.0
SizeofData 1112
AddressOfRawData 0xaa7588
PointerToRawData 0xaa5d88

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2026-Apr-21 22:53:07
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

StartAddressOfRawData 0x140aa7a00
EndAddressOfRawData 0x140aa8de8
AddressOfIndex 0x140fed608
AddressOfCallbacks 0x140840a48
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_16BYTES
Callbacks 0x00000001407EAD94

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140b1d700

RICH Header

XOR Key 0x15d50f1f
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 22
253 (35207) 6
ASM objects (35207) 5
C objects (35207) 11
C++ objects (33145) 1
C++ objects (35214) 71
Imports (35207) 10
C++ objects (35207) 50
C objects (33145) 2
Imports (33145) 39
C objects (35217) 136
C++ objects (34809) 14
C++ objects (30154) 23
Total imports 577
C++ objects (LTCG) (35217) 1119
Resource objects (35217) 1
151 1
Linker (35217) 1

Errors

Leave a comment

No comments yet.