db9a522454ca3699b21332171dccadbc

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2011-Oct-11 22:56:06
Detected languages English - United States
Debug artifacts C:\devel\projects\bink\build\binkw32.pdb
CompanyName RAD Game Tools, Inc.
FileDescription RAD Video Tools
FileVersion 1.99m
LegalCopyright Copyright (C) 1994-2011, RAD Game Tools, Inc.
LegalTrademarks Bink and Smacker are trademarks of RAD Game Tools, Inc.
ProductName Bink and Smacker
ProductVersion 1.99m
Comments Thank you for using Bink and Smacker!

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Suspicious The PE is possibly packed. Unusual section name found: BINKY12
Unusual section name found: BINKY16
Unusual section name found: BINKP8
Unusual section name found: BINK16
Unusual section name found: BINK32
Unusual section name found: BINK
Unusual section name found: RADCODE
Unusual section name found: BINKBSS
Unusual section name found: BINKCONS
Unusual section name found: BINKDATA
Unusual section name found: RADDATA
Unusual section name found: RADCONST
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryA
Can take screenshots:
  • GetDC
  • CreateCompatibleDC
Suspicious VirusTotal score: 1/66 (Scanned on 2021-02-11 20:55:35) APEX: Malicious

Hashes

MD5 db9a522454ca3699b21332171dccadbc
SHA1 e1414e822d6869bf4d7541c116467ad4625cacc4
SHA256 691a706225dcea3e4d2d2d3f23cb7636ac74cc4c4bed40edf1257e4ec8ae7df7
SHA3 96cf0482a645b58948723b2b45afc4d468efdf7b52654dde49e0d8a983892705
SSDeep 6144:mcwfS9T96c4x0sDdrI1tJTGUnIIIiphHeXf+R:mcwfS9Ti0sDdrqTN+v+R
Imports Hash 78e3466788dfc1c9e14436d4fab58728

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xe0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 17
TimeDateStamp 2011-Oct-11 22:56:06
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 9.0
SizeOfCode 0x22400
SizeOfInitializedData 0x14a00
SizeOfUninitializedData 0x8c00
AddressOfEntryPoint 0x000024D0 (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x28000
ImageBase 0x10000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.0
ImageVersion 0.0
SubsystemVersion 5.0
Win32VersionValue 0
SizeOfImage 0x49000
SizeOfHeaders 0x600
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 0d27dd67203cf438416cfec3924d32aa
SHA1 448b8a93fabd8d7e76428c6c4a5b553175bb1d96
SHA256 0467fcbe4e49c564976af61b8b211e33c423cc572181deb6b323ec7589c44e87
SHA3 88e9f52683c939d4d22164e731ac3a143b4b59c112a117c7225e17dcd93a552c
VirtualSize 0x189a
VirtualAddress 0x1000
SizeOfRawData 0x1a00
PointerToRawData 0x600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.30642

BINKY12

MD5 f164724acaaa9f10a5ff9c35c6644704
SHA1 02924c4dae0c0eb853e85a11b601f8d8304fb5e1
SHA256 d1429242591ae7bec180fa0bb3a3046d0281882ff8ed7d34fc2d270530a0f423
SHA3 1cbf9eb052b4bd12b7582e6a7221411f9348aad5d39e884ad5384b5b202eab43
VirtualSize 0x1b0
VirtualAddress 0x3000
SizeOfRawData 0x200
PointerToRawData 0x2000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.41537

BINKY16

MD5 64e199b49ad3f29212171fefdcdbcb50
SHA1 d1bd3ae0347a4e9ecbdef7a81dc73a92bb96489f
SHA256 b615cf970516cb4e02fb6706b32c16624e3330665ff3af9f0f5123a31be7d52b
SHA3 6de4ed3700854769b8d2b1064ae5f000b8d7b43a7886904aee63814bdab47356
VirtualSize 0x8dc
VirtualAddress 0x4000
SizeOfRawData 0xa00
PointerToRawData 0x2200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.89935

BINKP8

MD5 9576e869c9d8bcb5af4cc8144828cb8e
SHA1 c6009bfc29262919a8c15c386e962f7fe0b395cf
SHA256 7e08fb837be68f079869e627d6e0be1d09d55e7a263fd3868d3ce06f41c25f8a
SHA3 bdb39e7b5b3e1837f3227435bf03183b3dd3ac190bb23df477fe433c19e64f40
VirtualSize 0x8fd
VirtualAddress 0x5000
SizeOfRawData 0xa00
PointerToRawData 0x2c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.12805

BINK16

MD5 fbd50d6c551796f818bac35764b91337
SHA1 3e1e17bbf889789b91c969b88ab4b5a9f2fd7afb
SHA256 828b7bd2c6d4ea1f672f758aa498eda3ef9f3dd9b3cb0ab13d6120b78428b46d
SHA3 afd87b1a6893207c4562ba53a606702977e8fede16c00b5a35f3c5f55318ea19
VirtualSize 0x100b
VirtualAddress 0x6000
SizeOfRawData 0x1200
PointerToRawData 0x3600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.03654

BINK32

MD5 78f785aaa2849af16271ee6519c34797
SHA1 768127ebe1f9bb88d8059ed18a195822d5e76c07
SHA256 151f7aad84ca985deb4ffdccc85e4a4733f212b2bf44fe538cb14edb93957790
SHA3 f41ba8192a33653143bbf0576e3784339e54827bb9a9e42ff5da7cb04855448f
VirtualSize 0x134a
VirtualAddress 0x8000
SizeOfRawData 0x1400
PointerToRawData 0x4800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.34555

BINK

MD5 ccaafb0244ad1d2c0126f24445628fa0
SHA1 9e0aa971fb65b9f2bfd3b37c0db58bd7ec5d747d
SHA256 6dd0eeed578216d8af2702307402be4b6b520bf3a86185046286266865bdfb6d
SHA3 146a9a444eca250431e2a939c8c17578451b938c74d548da3ea346dd016b4f2c
VirtualSize 0x1c3e4
VirtualAddress 0xa000
SizeOfRawData 0x1c400
PointerToRawData 0x5c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.59143

RADCODE

MD5 27454a5070e120bdf7292ab91976579e
SHA1 e01b69240ce2da196d8c35edc665a96f9c3cf1ee
SHA256 1d5f796ccfea0510be43e58743b5bd9d7d0f0103b87e15c84974ea614b589754
SHA3 b2568919e42812b0753d83949e0e7b752666fc6570e1b6d4c567ad948ccd5eba
VirtualSize 0x897
VirtualAddress 0x27000
SizeOfRawData 0xa00
PointerToRawData 0x22000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.63802

BINKBSS

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x8ac0
VirtualAddress 0x28000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.rdata

MD5 6c83fd663060338e677705a5dc5756d3
SHA1 bbd3591dc73aa5f6c27a0d6485e1605ed63837b3
SHA256 5f863105f52aaf0f6c031330851144ea3915d4a1275b365c23e411fdd75ff47c
SHA3 95bfa9e67c872471759f5347209c6d49807fd3f6ed0cf76b96d1fa704f56fbde
VirtualSize 0x1985
VirtualAddress 0x31000
SizeOfRawData 0x1a00
PointerToRawData 0x22a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.56969

.data

MD5 e3d82a09e7ecf6ef1df313ee367e4657
SHA1 746f510aebddf113d6ce26e5fe06e59188db6106
SHA256 f41d312c9387688f02a806cdab482f4bf2294d5b62930b0120c473b7e077f2d6
SHA3 6f5101e7ba7440adea3c69394f624eb02cf7d48364b740353aca817c36b951a2
VirtualSize 0x3b00
VirtualAddress 0x33000
SizeOfRawData 0x3c00
PointerToRawData 0x24400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.82304

BINKCONS

MD5 ebddb956df2ab58c994d7fc19fcf104b
SHA1 f64718499d02e4ddb77764ae0a1611303101b487
SHA256 bd0e105e812ade7ee1f2ba40fdd486b5cffe85ca9925e483a719f25675dcd80e
SHA3 ab6b196e932401fde5e36d28b280e52c47166d68008c28854abf2cae4c35be3b
VirtualSize 0x5549
VirtualAddress 0x37000
SizeOfRawData 0x5600
PointerToRawData 0x28000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.25155

BINKDATA

MD5 989d4b75f4287cc794f044ec2debd194
SHA1 48ce112d68dff121e8fe455f551b4cac0f262299
SHA256 e08ae283f3cb3c5e84967ee0a3ddde28b639c1177d30e604b4dacdad1955521f
SHA3 e93ddc2c27c2dc27c35a1649f86461593abbea2b6bedcab31ffe08306c11cfe7
VirtualSize 0x2f00
VirtualAddress 0x3d000
SizeOfRawData 0x3000
PointerToRawData 0x2d600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 6.76725

RADDATA

MD5 0a8b79d3c5f7c415e06d49fff3f2fc05
SHA1 91419b6659137bcaec17a98be6a901e560f74c81
SHA256 ed9c3e8e4c87135732d378d73d006cf54e6d2ce770826c61a03ddbf5b6b4124d
SHA3 a82688813c150d0518c1ec7a073d92c937676458a91e18de516a8106ba534de0
VirtualSize 0x38
VirtualAddress 0x40000
SizeOfRawData 0x200
PointerToRawData 0x30600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.0659144

RADCONST

MD5 1ef301ab0a466602825a629d6afdb0fc
SHA1 0b33f95db83c33a69f7fcba0c2da6536276814b5
SHA256 31a87c2c1dad4a348267682105b1e28dcf74cac2ebadc7a171803f323d31aa9b
SHA3 6732ae2dc019ad1e5d8eab63e89c6a14281a9e6b0cb754c9891c20ba2bbd69f7
VirtualSize 0x9f
VirtualAddress 0x41000
SizeOfRawData 0x200
PointerToRawData 0x30800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.21282

.rsrc

MD5 07885d21385c77b11d89f5837bc14f61
SHA1 445f64598d106bad6e5e812d5bab0b14cfc3b55a
SHA256 c4e243827db6638e214bbdcf380bba9b2fe908386b3577abc8b9bb73650eeb77
SHA3 8a4885ddf7e22dc28769c0c4e1a113135bca24ccdd5249ea357eecd655b0bb74
VirtualSize 0x4c08
VirtualAddress 0x42000
SizeOfRawData 0x4e00
PointerToRawData 0x30a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.40113

.reloc

MD5 dee32260082c93e470e40b0a5eaca511
SHA1 78022fa2d48ea608dd189f869975a21e464ebb0a
SHA256 e67480055e41a5997d0cd7cdc2ee3cce1e576be3f671175b45d027e907057ed8
SHA3 10cf02c38706eb9a414d06c15185f105b5ade3d8c2bb222a38756b0121499a0d
VirtualSize 0x1aac
VirtualAddress 0x47000
SizeOfRawData 0x1c00
PointerToRawData 0x35800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 6.12594

Imports

USER32.dll GetTopWindow
GetWindowLongA
GetActiveWindow
GetWindowThreadProcessId
GetWindow
EndPaint
ClientToScreen
DestroyWindow
SetCursor
ScreenToClient
GetWindowRect
IsIconic
GetClientRect
BeginPaint
GetDC
ShowCursor
UnregisterClassA
CreateWindowExA
PeekMessageA
ReleaseDC
DefWindowProcA
GetCursorPos
GetSystemMetrics
IsWindowVisible
ChangeDisplaySettingsA
GetClassLongA
RegisterClassA
MessageBoxA
GDI32.dll CreateDIBSection
GetDeviceCaps
StretchBlt
GetDIBits
SetPixel
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
SetStretchBltMode
GetPixel
DeleteDC
KERNEL32.dll EnterCriticalSection
RaiseException
ReleaseSemaphore
SetThreadPriority
CreateSemaphoreA
LeaveCriticalSection
InitializeCriticalSection
GetCurrentThread
WaitForSingleObject
SetUnhandledExceptionFilter
TlsGetValue
HeapCreate
HeapFree
GetThreadPriority
CreateMutexA
DeleteCriticalSection
SetThreadAffinityMask
ReleaseMutex
TlsAlloc
ResumeThread
CreateThread
LocalAlloc
TlsSetValue
SetFilePointer
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
SetErrorMode
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleHandleA
Sleep
GetSystemInfo
GetCurrentProcessId
OutputDebugStringA
QueryPerformanceCounter
GetTickCount
GetEnvironmentVariableA
QueryPerformanceFrequency
CreateFileA
InterlockedExchange
ReadFile
GetLastError
CloseHandle
TerminateProcess
GetCurrentProcess
DisableThreadLibraryCalls
HeapAlloc
WINMM.dll waveOutSetVolume
waveOutReset
waveOutRestart
waveOutPause
waveOutWrite
waveOutClose
timeGetTime
timeEndPeriod
timeBeginPeriod
waveOutPrepareHeader
waveOutOpen
waveOutUnprepareHeader
ole32.dll CoCreateInstance
CoInitializeEx
mss32.dll (delay-loaded) _AIL_mem_alloc_lock_info@12
_AIL_release_sample_handle@4
_AIL_minimum_sample_buffer_size@12
_AIL_load_sample_buffer@16
_AIL_sample_user_data@8
_AIL_register_EOB_callback@8
_AIL_digital_latency@4
_AIL_mem_free_lock@4
_AIL_set_sample_user_data@12
_AIL_set_sample_playback_rate@8
_AIL_sample_buffer_available@4
_AIL_stop_sample@4
_AIL_init_sample@8
_AIL_allocate_sample_handle@4
_AIL_resume_sample@4
_AIL_set_sample_buffer_count@8
_AIL_set_sample_volume_pan@12
_AIL_set_sample_channel_levels@20
_AIL_sample_buffer_info@24

Delayed Imports

Attributes 0x1
Name mss32.dll
ModuleHandle 0x36a8c
DelayImportAddressTable 0x36a30
DelayImportNameTable 0x31378
BoundDelayImportTable 0x31604
UnloadDelayImportTable 0
TimeStamp 1970-Jan-01 00:00:00

_BinkBufferBlit@12

Ordinal 1
Address 0xc2c0

_BinkBufferCheckWinPos@12

Ordinal 2
Address 0xafd0

_BinkBufferClear@8

Ordinal 3
Address 0xca70

_BinkBufferClose@4

Ordinal 4
Address 0xc010

_BinkBufferGetDescription@4

Ordinal 5
Address 0xc830

_BinkBufferGetError@0

Ordinal 6
Address 0xca60

_BinkBufferLock@4

Ordinal 7
Address 0xc120

_BinkBufferOpen@16

Ordinal 8
Address 0xb5e0

_BinkBufferSetDirectDraw@8

Ordinal 9
Address 0xa910

_BinkBufferSetHWND@8

Ordinal 10
Address 0xc820

_BinkBufferSetOffset@12

Ordinal 11
Address 0xb080

_BinkBufferSetResolution@12

Ordinal 12
Address 0xae20

_BinkBufferSetScale@12

Ordinal 13
Address 0xc710

_BinkBufferUnlock@4

Ordinal 14
Address 0xc240

_BinkCheckCursor@20

Ordinal 15
Address 0xad40

_BinkClose@4

Ordinal 16
Address 0x11ec0

_BinkCloseTrack@4

Ordinal 17
Address 0x138b0

_BinkControlBackgroundIO@8

Ordinal 18
Address 0x13c40

_BinkControlPlatformFeatures@8

Ordinal 19
Address 0x1d160

_BinkCopyToBuffer@28

Ordinal 20
Address 0x10910

_BinkCopyToBufferRect@44

Ordinal 21
Address 0x10950

_BinkDDSurfaceType@4

Ordinal 22
Address 0xcac0

_BinkDX8SurfaceType@4

Ordinal 23
Address 0xcca0

_BinkDX9SurfaceType@4

Ordinal 24
Address 0xcd90

_BinkDoFrame@4

Ordinal 25
Address 0x118a0

_BinkDoFrameAsync@12

Ordinal 26
Address 0x16ba0

_BinkDoFrameAsyncWait@8

Ordinal 27
Address 0x16d70

_BinkDoFramePlane@8

Ordinal 28
Address 0x11300

_BinkFreeGlobals@0

Ordinal 29
Address 0x11df0

_BinkGetError@0

Ordinal 30
Address 0xd170

_BinkGetFrameBuffersInfo@8

Ordinal 31
Address 0xf2b0

_BinkGetKeyFrame@12

Ordinal 32
Address 0x11a90

_BinkGetPalette@4

Ordinal 33
Address 0x1e4e0

_BinkGetPlatformInfo@8

Ordinal 34
Address 0x12360

_BinkGetRealtime@12

Ordinal 35
Address 0x128d0

_BinkGetRects@8

Ordinal 36
Address 0x12d40

_BinkGetSummary@8

Ordinal 37
Address 0x126f0

_BinkGetTrackData@8

Ordinal 38
Address 0x138f0

_BinkGetTrackID@8

Ordinal 39
Address 0x136a0

_BinkGetTrackMaxSize@8

Ordinal 40
Address 0x13670

_BinkGetTrackType@8

Ordinal 41
Address 0x13650

_BinkGoto@12

Ordinal 42
Address 0x11b70

_BinkIsSoftwareCursor@8

Ordinal 43
Address 0xaa10

_BinkLogoAddress@0

Ordinal 44
Address 0x1000

_BinkNextFrame@4

Ordinal 45
Address 0x11920

_BinkOpen@8

Ordinal 46
Address 0x10710

_BinkOpenDirectSound@4

Ordinal 47
Address 0x15360

_BinkOpenMiles@4

Ordinal 48
Address 0x15b60

_BinkOpenTrack@8

Ordinal 49
Address 0x136c0

_BinkOpenWaveOut@4

Ordinal 50
Address 0x14540

_BinkOpenWithOptions@12

Ordinal 51
Address 0x107b0

_BinkOpenXAudio2@4

Ordinal 52
Address 0x17720

_BinkPause@8

Ordinal 53
Address 0x12560

_BinkRegisterFrameBuffers@8

Ordinal 54
Address 0xf370

_BinkRequestStopAsyncThread@4

Ordinal 55
Address 0x16a20

_BinkRestoreCursor@4

Ordinal 56
Address 0xadf0

_BinkService@4

Ordinal 57
Address 0x13110

_BinkSetError@4

Ordinal 58
Address 0xd130

_BinkSetFileOffset@8

Ordinal 59
Address 0xe550

_BinkSetFrameRate@8

Ordinal 60
Address 0xe530

_BinkSetIO@4

Ordinal 61
Address 0xe580

_BinkSetIOSize@4

Ordinal 62
Address 0xe570

_BinkSetMemory@8

Ordinal 63
Address 0x13bf0

_BinkSetPan@12

Ordinal 64
Address 0x135f0

_BinkSetSimulate@4

Ordinal 65
Address 0xe590

_BinkSetSoundOnOff@8

Ordinal 66
Address 0x13a40

_BinkSetSoundSystem@8

Ordinal 67
Address 0xd660

_BinkSetSoundTrack@8

Ordinal 68
Address 0xe5a0

_BinkSetSpeakerVolumes@20

Ordinal 69
Address 0x13200

_BinkSetVideoOnOff@8

Ordinal 70
Address 0x13a20

_BinkSetVolume@12

Ordinal 71
Address 0x131a0

_BinkSetWillLoop@8

Ordinal 72
Address 0x13c10

_BinkShouldSkip@4

Ordinal 73
Address 0x118c0

_BinkStartAsyncThread@8

Ordinal 74
Address 0x16a00

_BinkWait@4

Ordinal 75
Address 0x123e0

_BinkWaitStopAsyncThread@4

Ordinal 76
Address 0x16a30

_RADTimerRead@0

Ordinal 77
Address 0x15bd0

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x2e8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.45319
MD5 224788054b9f9e08a23e994ca9a2ea64
SHA1 55fccd736dab0ba5ef76de347424cde93896c2b3
SHA256 89f0b649400bf3ee0139a4d49e756c417673043b2dd3406d1d5fc47d3dd019a3
SHA3 5da30dd23496fe1d9d7c13f14d8f9db41cb65fa214c27a4263f338dbe38f7b85

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.87921
MD5 af5690f4a9a59ab0ff543531e3c46d93
SHA1 ba23344c0a6840de37703c3cd58541f4e93f0df3
SHA256 514a4e7a082bcb6baf808493539c3ce04efdf365cef52af98caa2c524bfcecfe
SHA3 7d6d1b6daad287f07e159ef8fe1ebfb193d314472ffa5db486c2c6a80b32facc

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xea8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.547
MD5 dda2662346cf4db128435d587a948071
SHA1 837470dd088a5cc3ea960d4c17d536ade09ece7a
SHA256 35249900143e28433b80ff85cb1c041c1135fbb95feb90e8b7e19f6914b1f6b4
SHA3 03753c25153d8aa30b801477e9b79bdf2b6a645a98c71df50191f3d1e07a490a

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.43362
MD5 b34fc3928fa775c2defbaaca84936c2c
SHA1 cc7b238e16d3c74d31735525875e501fddae3816
SHA256 dbf15a5b11758af41056065dc2b42a39b59c308cfd8ea5ea68685ad6b56cc26c
SHA3 efe1f55c29b30952120edaf9ad762bc4b26e024276b647c28d7bd2c4368b1a7a

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.3384
MD5 cf79ab97333dfa246cee35c4d7254d25
SHA1 9bc4616df66f194ff973582f61a57319e836c5b0
SHA256 af07251ba27414946e01441262444c7443561a21a22b6c1fc2f3cd542ad0d8de
SHA3 317be6ad03df3f6fd7a8a15bcc8c0f47cf2cae79dbb19c3217a25a55626f40e6

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.64299
MD5 233b33f66a00ea5bc01dea92a94d8787
SHA1 dc835ada02bd18201fc1c01206a9285ea58387c2
SHA256 c53fc98a37dcc77ee8ca8c427d0964f048f96d1842cb08312ae69bae4524f019
SHA3 89c5580917729ccd7c0787a63c0d46f66afa32c8782e8e91bc00a879062698b6

3 (#2)

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0x84
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.86243
MD5 40bf0f8d216b14ec74c68a4b074f1b55
SHA1 d50b02ae7ee2ebb36d021c6ee252edf9a7b8d32e
SHA256 fd415e46896ef98640c0cb99037dc015c8dd97308b18a6bff54da1dd054d996e
SHA3 3e571f6cbe7617c6b5e49713865817e6d5e19b46dbfad8233a351bdd9dd39bd8

101

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.83326
Detected Filetype Icon file
MD5 5bf7ee62a4e56abe86703f85267ad6d2
SHA1 377a1f8d2973daf573cc88c90c3e71667831f734
SHA256 e35441f95c8c9b1eb36e993d9f4b786cbab6859033930a84e8a4fa9c3a2fe52b
SHA3 87b4a55b5c21dcc7160683bdf9447043ca7a82b8e2e2f2942afcc2bf90eed71a

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x38c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.45731
MD5 7f9edf957bf681d3138359dc86556ca1
SHA1 2572d0a8388e71a0e69b56a1322e442b9e5f8fa9
SHA256 c0f46e15eb047de64c5efdafa9dbca64c623e83bf753dad72313d589cb098309
SHA3 e3407dea84394d6d73f4e4223574f3fb1207369838ff06cb760945008834fe77

String Table contents

1.99m
Copyright (C) 1994-2011, RAD Game Tools, Inc.

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.9.99.0
ProductVersion 1.9.99.0
FileFlags (EMPTY)
FileOs (EMPTY)
FileType VFT_APP
Language English - United States
CompanyName RAD Game Tools, Inc.
FileDescription RAD Video Tools
FileVersion (#2) 1.99m
LegalCopyright Copyright (C) 1994-2011, RAD Game Tools, Inc.
LegalTrademarks Bink and Smacker are trademarks of RAD Game Tools, Inc.
ProductName Bink and Smacker
ProductVersion (#2) 1.99m
Comments Thank you for using Bink and Smacker!
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2011-Oct-11 22:56:06
Version 0.0
SizeofData 65
AddressOfRawData 0x32944
PointerToRawData 0x24344
Referenced File C:\devel\projects\bink\build\binkw32.pdb

TLS Callbacks

Load Configuration

Size 0x48
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x10033000
SEHandlerTable 0
SEHandlerCount 0

RICH Header

Errors

[*] Warning: Section BINKBSS has a size of 0!