f4601a764c5383fa9c55a36b6fc5d806b470e4955e1334181fe02062c5eedb7f

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2024-Dec-19 17:53:06
Detected languages English - United States
TLS Callbacks 1 callback(s) detected.
Debug artifacts CrashReportClient.pdb
CompanyName Epic Games, Inc.
LegalCopyright Fill out your copyright notice in the Description page of Project Settings.
ProductName CrashReportClient
ProductVersion ++UE4+Release-4.27-CL-0
FileDescription CrashReportClient
InternalName UnrealEngine
OriginalFilename CrashReportClient.exe

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to system / monitoring tools:
  • RUNDLL32.EXE
Contains domain names:
  • adobe.com
  • curl.haxx.se
  • epicsupport.force.com
  • example.com
  • force.com
  • google.com
  • http://msdl.microsoft.com
  • http://msdl.microsoft.com/download/symbols
  • http://ns.adobe.com
  • http://ns.adobe.com/photoshop/1.0/
  • http://ns.adobe.com/xap/1.0/
  • http://ns.adobe.com/xap/1.0/mm/
  • http://ns.adobe.com/xap/1.0/sType/ResourceEvent#
  • http://purl.org
  • http://www.google.com
  • http://www.unicode.org
  • http://www.unicode.org/copyright.html
  • http://www.w3.org
  • http://www.w3.org/1999/02/22-rdf-syntax-ns#
  • https://curl.haxx.se
  • https://curl.haxx.se/docs/http-cookies.html
  • https://epicsupport.force.com
  • https://epicsupport.force.com/unrealengine/s/
  • microsoft.com
  • msdl.microsoft.com
  • ns.adobe.com
  • openssl.org
  • unicode.org
  • www.google.com
  • www.unicode.org
  • www.w3.org
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to AES
Uses constants related to Blowfish
Uses known Diffie-Helman primes
Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .uedbg
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryA
  • LoadLibraryW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
  • CreateToolhelp32Snapshot
Can access the registry:
  • RegEnumValueW
  • RegCloseKey
  • RegDeleteKeyExW
  • RegSetValueExW
  • RegQueryValueExW
  • RegOpenKeyExW
  • RegEnumKeyExW
  • RegDeleteValueW
  • RegCreateKeyExW
  • RegisterHotKey
Possibly launches other programs:
  • CreateProcessW
  • ShellExecuteW
Uses Windows's Native API:
  • ntohl
  • ntohs
Uses Microsoft's cryptographic API:
  • CryptAcquireContextW
  • CryptEnumProvidersW
  • CryptSignHashW
  • CryptDestroyHash
  • CryptCreateHash
  • CryptDecrypt
  • CryptExportKey
  • CryptGetUserKey
  • CryptGetProvParam
  • CryptSetHashParam
  • CryptDestroyKey
  • CryptReleaseContext
Can create temporary files:
  • GetTempPathW
  • CreateFileW
Uses functions commonly found in keyloggers:
  • GetForegroundWindow
  • CallNextHookEx
  • MapVirtualKeyW
  • GetAsyncKeyState
Has Internet access capabilities:
  • WinHttpGetDefaultProxyConfiguration
  • WinHttpGetIEProxyConfigForCurrentUser
Leverages the raw socket API to access the Internet:
  • accept
  • bind
  • closesocket
  • connect
  • ioctlsocket
  • getpeername
  • getsockname
  • getsockopt
  • htonl
  • htons
  • listen
  • ntohl
  • ntohs
  • recv
  • recvfrom
  • select
  • send
  • sendto
  • setsockopt
  • shutdown
  • socket
  • gethostname
  • WSAStartup
  • WSACleanup
  • WSAGetLastError
  • WSAIoctl
  • getaddrinfo
  • freeaddrinfo
  • getnameinfo
  • inet_pton
  • WSASetLastError
  • __WSAFDIsSet
Functions related to the privilege level:
  • OpenProcessToken
  • AdjustTokenPrivileges
Manipulates other processes:
  • Process32NextW
  • Process32FirstW
  • OpenProcess
Can take screenshots:
  • CreateCompatibleDC
  • GetDC
Reads the contents of the clipboard:
  • GetClipboardData
Interacts with the certificate store:
  • CertOpenStore
  • CertOpenSystemStoreW
Safe VirusTotal score: 0/72 (Scanned on 2025-12-22 00:17:37) All the AVs think this file is safe.

Hashes

MD5 8d6d57e31a7ad85742b3bc50642843bb
SHA1 d510338fe7950ae661cfea801d483e87f2405aab
SHA256 f4601a764c5383fa9c55a36b6fc5d806b470e4955e1334181fe02062c5eedb7f
SHA3 5d8064f0343f0fd69fb16e5353252d3c3a41b02aedd1cf78e4ce693fc74bb5c5
SSDeep 393216:fvgblZhtRsbCfHn4fnrhOp5tvLuVXIm2aoCj:fvgDfY6
Imports Hash cadfccbef261d991c9e66e69458f9e20

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x198

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 8
TimeDateStamp 2024-Dec-19 17:53:06
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xc60600
SizeOfInitializedData 0x758000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000C0F58C (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x13be000
SizeOfHeaders 0x400
Checksum 0x129c0e9
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0xb71b00
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 c8e948e2d0eb51ae18dc0abe31d2528c
SHA1 bbd020ca792343c3acc33b4c8550bd666e8d9adf
SHA256 c5c12dcb8d2ccb5d24077485fcacbb2f33988930622904ce0070f975b0229a18
SHA3 8e414794efef0e7ffa377f0b7041a830734e5f11831db58ef109cb05532f29aa
VirtualSize 0xc40227
VirtualAddress 0x1000
SizeOfRawData 0xc40400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.48368

.uedbg

MD5 37291f95d7089c9a56176b27bf9ca68f
SHA1 b3fc969c66e16c654e4866ddeeac303a2ad5ef80
SHA256 073321015b750ad7b31cd353b9aa6a010344d1c51b9b5f265c5043a63b6bea8e
SHA3 eb59d16bfae7689dc51f1531b17f25427d986278e0461ea56c3fe70106928dd7
VirtualSize 0x20020
VirtualAddress 0xc42000
SizeOfRawData 0x20200
PointerToRawData 0xc40800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.08419

.rdata

MD5 8a19804bace1eb1642ebd779f104a98e
SHA1 1683a30f7595c2bb1c494e3edae23ca7c9f4d297
SHA256 b82f306c62fae608c8c54d8871333a879e51236cb87ee040314fc2e2dd56657d
SHA3 76af57d7652b753de9f76902ff6182180b43aaaf57b8959919eab5c58e0c5490
VirtualSize 0x417a44
VirtualAddress 0xc63000
SizeOfRawData 0x417c00
PointerToRawData 0xc60a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.83221

.data

MD5 f5f5c065af818d4d55558b2656ed830b
SHA1 951b8a3015537fc43770c6f29d6bfcfda7e5c8c1
SHA256 8a4bf7a479d3e00340833ca63d5dc8c399f8370832333e0b6d0110e482f31583
SHA3 ec35939d467ae1207c6436332e1e8810c798e0bd892fba04b8056d5cd5461f80
VirtualSize 0x2866a8
VirtualAddress 0x107b000
SizeOfRawData 0x165c00
PointerToRawData 0x1078600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.4478

.pdata

MD5 b84acdfb80c932fe895b85c31cd44371
SHA1 8f1461fc607c90b355c5c79200267159601c88f8
SHA256 9576471a0cf14b7189666d3f59f6b8bb07abd856c598e7e53a6fa9223c67cc65
SHA3 bc2710cb0b5a955ddb9834cbbd7f8d988e9cdfcaed3b7d8d9d01b8d433fa8329
VirtualSize 0x956f4
VirtualAddress 0x1302000
SizeOfRawData 0x95800
PointerToRawData 0x11de200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.5882

_RDATA

MD5 da375b1e728e885e8dc1b4097420571e
SHA1 aabbbf4317bf533ca15caa0551aa92c171458262
SHA256 4c789442fefac42305c7957e429836e4b18558e1057abe94f56fb3dfec98d9f9
SHA3 6f8904c50b3bebec462c287984ccaddaaa736133d6be4f996a5f7931793010ee
VirtualSize 0x2308
VirtualAddress 0x1398000
SizeOfRawData 0x2400
PointerToRawData 0x1273a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.05025

.rsrc

MD5 6e5b0a4c14401e0cbb1c5d5555b58132
SHA1 95e77f1b09ca781dbbbdc50ba7010fb729dc9dd4
SHA256 9b82ce424f32a48404b4a7e074a795054a4d2abe9adebedfe7f8cca0a504ce66
SHA3 6b319f6c13894463618bc6743f5fc8a486b0acdc68131c6cede1cdaf79ebc899
VirtualSize 0x6890
VirtualAddress 0x139b000
SizeOfRawData 0x6a00
PointerToRawData 0x1275e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.22368

.reloc

MD5 43dfcd0e4a59f6278768626f33f9990d
SHA1 df3bfecdf1d7fe5ddb2e85e4af003a17932aaf31
SHA256 889c45b8ce88c92b6e2892eea6957f4473b41298740d78f9a2e64154948ac1b0
SHA3 00f96d482b8d04c2835ce2f6175387a8776324717d7d6605cb93cbcbd5b3a68a
VirtualSize 0x1b4d0
VirtualAddress 0x13a2000
SizeOfRawData 0x1b600
PointerToRawData 0x127c800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.47116

Imports

XINPUT1_3.dll #3
#2
ADVAPI32.dll RegEnumValueW
RegCloseKey
RegDeleteKeyExW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
GetUserNameW
OpenProcessToken
AdjustTokenPrivileges
RegDeleteTreeW
RegSetValueExW
RegQueryValueExW
LookupPrivilegeValueA
RegOpenKeyExW
CryptAcquireContextW
RegEnumKeyExW
RegDeleteValueW
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
RegCreateKeyExW
GDI32.dll GetDeviceCaps
PtInRegion
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
SwapBuffers
SetPixelFormat
ChoosePixelFormat
CreateRoundRectRgn
GetTextMetricsW
CreateFontW
CreateRectRgn
CreateFontIndirectW
CreateBitmap
GetTextExtentPoint32W
USER32.dll ClipCursor
GetWindowLongW
SetWindowLongW
SetWindowRgn
GetDlgItem
SetDlgItemTextW
GetSystemMetrics
SetForegroundWindow
SetWindowTextW
GetWindowRect
WindowFromPoint
ScreenToClient
GetTopWindow
EnumDisplayDevicesW
GetKeyboardLayout
DisableProcessWindowsGhosting
TranslateMessage
DispatchMessageW
GetMessageExtraInfo
SendMessageW
DefWindowProcW
RegisterClassW
UnregisterClassW
GetRawInputDeviceList
GetRawInputDeviceInfoA
GetRawInputData
GetWindowInfo
EnumDisplayMonitors
RegisterClassExW
MoveWindow
MsgWaitForMultipleObjects
SetRect
GetWindowLongPtrW
SetWindowLongPtrW
CreateWindowExW
IsWindow
DestroyWindow
ShowWindow
SetLayeredWindowAttributes
FlashWindowEx
GetWindowPlacement
SetWindowPlacement
IsIconic
IsZoomed
OpenClipboard
CloseClipboard
ReleaseDC
GetDC
GetForegroundWindow
SetActiveWindow
MessageBoxW
UpdateWindow
EnableMenuItem
GetMonitorInfoW
MonitorFromWindow
MonitorFromRect
GetProcessWindowStation
GetUserObjectInformationW
ClientToScreen
GetClipCursor
GetCursorPos
SetCursor
SetClipboardData
GetClipboardData
EmptyClipboard
SetFocus
GetActiveWindow
MonitorFromPoint
SystemParametersInfoW
EnumDisplaySettingsW
CreateIconIndirect
LoadImageW
LoadIconW
LoadCursorFromFileW
LoadCursorW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetClassLongPtrW
SetCursorPos
ShowCursor
AdjustWindowRectEx
GetClientRect
GetSystemMenu
IsWindowEnabled
EnableWindow
ReleaseCapture
SetCapture
GetCapture
MapVirtualKeyW
RegisterTouchWindow
CloseTouchInputHandle
GetTouchInputInfo
GetAsyncKeyState
EndDialog
DialogBoxParamW
SetWindowPos
PostQuitMessage
UnregisterHotKey
RegisterHotKey
PeekMessageW
GetKeyState
RegisterRawInputDevices
GetFocus
CRYPT32.dll CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenSystemStoreW
CertEnumCertificatesInStore
CertCloseStore
CertGetNameStringW
WS2_32.dll accept
bind
closesocket
connect
ioctlsocket
getpeername
getsockname
getsockopt
htonl
htons
listen
ntohl
ntohs
recv
recvfrom
select
send
sendto
setsockopt
shutdown
socket
gethostname
WSAStartup
WSACleanup
WSAGetLastError
WSAIoctl
getaddrinfo
freeaddrinfo
getnameinfo
inet_pton
WSASetLastError
__WSAFDIsSet
WLDAP32.dll #27
#301
#200
#30
#79
#35
#33
#32
#143
#26
#22
#41
#50
#60
#211
#46
Normaliz.dll IdnToAscii
d3d11.dll D3D11CreateDevice
D3DCOMPILER_43.dll D3DCompile
D3DReflect
dbghelp.dll SymGetModuleInfoW64
SymRefreshModuleList
SymSetOptions
SymFunctionTableAccess64
SymGetOptions
MiniDumpWriteDump
SymFromAddr
SymUnloadModule64
SymLoadModuleExW
SymSetSearchPathW
SymInitializeW
SymGetModuleBase64
SymGetLineFromAddr64
SymGetModuleInfo64
StackWalk64
WINMM.dll timeBeginPeriod
KERNEL32.dll CreateEventW
ReleaseSemaphore
ResetEvent
SetEvent
QueryPerformanceFrequency
PeekNamedPipe
SetThreadErrorMode
SetLastError
OutputDebugStringW
GetTempPathW
SetFileTime
SetFilePointer
SetFileAttributesW
SetEndOfFile
RemoveDirectoryW
GetLongPathNameW
GetFullPathNameW
GetFinalPathNameByHandleW
GetFileSizeEx
GetFileAttributesExW
FlushFileBuffers
FindNextFileW
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetEnvironmentVariableW
VerSetConditionMask
RtlCaptureStackBackTrace
ReadFile
GetProcessTimes
GetExitCodeProcess
SwitchToThread
CreateThread
GetCurrentThread
OpenThread
SetThreadPriority
SuspendThread
ResumeThread
CreateProcessW
Sleep
TerminateProcess
GetThreadContext
WriteFile
CreateSemaphoreA
LocalFree
GlobalMemoryStatusEx
GetSystemInfo
VerifyVersionInfoA
GetModuleHandleA
GetSystemDirectoryA
ExpandEnvironmentStringsA
WaitForMultipleObjects
WaitForSingleObjectEx
SleepEx
InitializeCriticalSectionEx
GetTickCount64
FormatMessageA
ReadConsoleW
ReadConsoleA
SetConsoleMode
GetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
RtlVirtualUnwind
GetOverlappedResult
MultiByteToWideChar
CreateFiber
DeleteFiber
SwitchToFiber
InitializeCriticalSectionAndSpinCount
GetDateFormatEx
GetTimeFormatEx
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
ResolveLocaleName
GetCurrencyFormatEx
GetSystemTime
GetSystemTimeAsFileTime
GetNumberFormatEx
LocaleNameToLCID
LCIDToLocaleName
GetUserGeoID
GetGeoInfoW
GetDynamicTimeZoneInformation
GetLocalTime
GetVersionExW
GetLogicalProcessorInformationEx
GetNativeSystemInfo
VirtualAlloc
VirtualFree
GetLocaleInfoEx
GetACP
GetEnvironmentVariableA
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
LoadResource
LockResource
SizeofResource
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
LoadLibraryA
InitializeSListHead
IsDebuggerPresent
VirtualUnlock
GetStartupInfoW
GetLargePageMinimum
FlsSetValue
FlsAlloc
GetModuleHandleExA
SetErrorMode
MulDiv
SetConsoleWindowInfo
SetConsoleTextAttribute
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
AttachConsole
FreeConsole
AllocConsole
GlobalLock
GlobalUnlock
GlobalAlloc
GetVersion
GetProcessHandleCount
CreateWaitableTimerW
SetWaitableTimer
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
DebugBreak
FindResourceW
WideCharToMultiByte
K32GetProcessMemoryInfo
GetConsoleWindow
SetConsoleCtrlHandler
GetUserDefaultLocaleName
GetUserPreferredUILanguages
GetSystemPowerStatus
SystemTimeToFileTime
FileTimeToSystemTime
VerifyVersionInfoW
GetComputerNameW
MoveFileW
ReOpenFile
QueryFullProcessImageNameW
FormatMessageW
SetThreadAffinityMask
InitializeCriticalSection
SetCriticalSectionSpinCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentThreadId
GetStdHandle
GetCommandLineW
FindClose
FindFirstFileW
GetFileType
OpenProcess
WriteConsoleW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InitializeSRWLock
AcquireSRWLockShared
ReleaseSRWLockShared
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
HeapSetInformation
SetHandleInformation
CreatePipe
CreateFileW
GetFileAttributesW
CloseHandle
RaiseException
GetLastError
WaitForSingleObject
GetCurrentProcess
GetCurrentProcessId
GetProcessId
K32EnumProcessModulesEx
K32GetModuleFileNameExW
LoadLibraryW
COMDLG32.dll ChooseFontW
SHELL32.dll SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHCreateItemFromParsingName
SHGetKnownFolderPath
ole32.dll RegisterDragDrop
ReleaseStgMedium
CoCreateInstance
CoUninitialize
CoCreateGuid
RevokeDragDrop
CoInitialize
OleUninitialize
CoTaskMemFree
OleInitialize
OLEAUT32.dll SafeArrayCreateVector
SysAllocString
VariantCopy
SafeArrayPutElement
SysFreeString
IPHLPAPI.DLL GetAdaptersAddresses
SETUPAPI.dll SetupDiGetClassDevsExW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiOpenDevRegKey
CM_Get_Device_IDW
dwmapi.dll DwmSetWindowAttribute
DwmGetCompositionTimingInfo
DwmExtendFrameIntoClientArea
DwmIsCompositionEnabled
IMM32.dll ImmGetDescriptionW
ImmGetIMEFileNameW
ImmGetProperty
ImmCreateContext
ImmDestroyContext
ImmGetContext
ImmReleaseContext
ImmAssociateContext
ImmGetCompositionStringW
ImmNotifyIME
ImmSetCompositionWindow
ImmSetCandidateWindow
UIAutomationCore.DLL UiaRaiseAutomationPropertyChangedEvent
UiaClientsAreListening
UiaRaiseAutomationEvent
UiaReturnRawElementProvider
UiaHostProviderFromHwnd
WINHTTP.dll WinHttpGetDefaultProxyConfiguration
WinHttpGetIEProxyConfigForCurrentUser
OPENGL32.dll glScissor
glStencilFunc
glStencilMask
glStencilOp
glPolygonMode
glTexImage2D
glTexParameteri
glTexSubImage2D
glViewport
glPixelStorei
glGenTextures
glEnable
glDisable
glDeleteTextures
glBlendFunc
glBindTexture
wglCreateContext
wglDeleteContext
wglGetProcAddress
wglMakeCurrent
glAlphaFunc
glTexEnvi
MSVCP140.dll _Mtx_init_in_situ
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_unlock
_Cnd_init_in_situ
_Cnd_destroy_in_situ
_Cnd_wait
_Cnd_broadcast
?_Throw_C_error@std@@YAXH@Z
?_Xlength_error@std@@YAXPEBD@Z
?uncaught_exception@std@@YA_NXZ
?_Xout_of_range@std@@YAXPEBD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?seekp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@V?$fpos@U_Mbstatet@@@2@@Z
?tellp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ
_Thrd_yield
VERSION.dll GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
dbgeng.dll DebugCreate
bcrypt.dll BCryptGenRandom
VCRUNTIME140.dll __intrinsic_setjmp
__current_exception_context
__current_exception
__RTDynamicCast
__std_type_info_name
__std_type_info_compare
__RTtypeid
__CxxFrameHandler3
strchr
longjmp
__std_exception_destroy
__std_exception_copy
__std_terminate
memchr
_set_purecall_handler
__C_specific_handler
wcsrchr
strstr
wcschr
_CxxThrowException
_purecall
memcpy
memmove
memset
wcsstr
memcmp
strrchr
VCRUNTIME140_1.dll __CxxFrameHandler4
api-ms-win-crt-convert-l1-1-0.dll _wcstoui64
_wcstoi64
_strtoi64
strtol
atof
_wtoi64
strtoul
strtod
wcstod
atoi
wcstoul
strtoll
_wtof
_wtoi
api-ms-win-crt-utility-l1-1-0.dll srand
div
qsort
rand
bsearch
api-ms-win-crt-stdio-l1-1-0.dll _open
__stdio_common_vfprintf
fputs
fwrite
fread
ferror
fclose
__stdio_common_vsnprintf_s
_setmode
_fileno
_close
_write
setbuf
clearerr
_read
__p__commode
feof
fseek
ftell
__stdio_common_vsprintf
fgets
__stdio_common_vswprintf
_lseeki64
__stdio_common_vsscanf
_wfopen
fopen
fflush
__stdio_common_vfwprintf
__acrt_iob_func
_set_fmode
fputc
api-ms-win-crt-string-l1-1-0.dll isalpha
strpbrk
wcsncmp
isalnum
isxdigit
wcsncpy
_strdup
strcspn
_strnicmp
_stricmp
iswdigit
isdigit
iswspace
isupper
islower
isgraph
strcmp
strncmp
isspace
strncpy
iswalnum
strncat
toupper
strspn
isprint
iswpunct
iswlower
iswxdigit
iswalpha
tolower
api-ms-win-crt-heap-l1-1-0.dll realloc
_heapchk
_set_new_mode
_aligned_free
_aligned_malloc
_get_heap_handle
malloc
calloc
free
api-ms-win-crt-math-l1-1-0.dll _dtest
fmod
ceilf
logf
truncf
__setusermatherr
trunc
_dsign
ceil
pow
floorf
modf
round
_isnan
log
asin
frexp
powf
_finite
floor
cosf
sinf
atan
atan2
tan
sqrt
sin
cos
api-ms-win-crt-runtime-l1-1-0.dll _crt_atexit
strerror_s
_errno
_cexit
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_initialize_onexit_table
_exit
_seh_filter_exe
abort
_set_app_type
raise
terminate
_register_thread_local_exe_atexit_callback
_getpid
strerror
_configure_narrow_argv
_get_narrow_winmain_command_line
_initterm
signal
_beginthreadex
_initialize_narrow_environment
exit
_c_exit
__sys_nerr
_initterm_e
api-ms-win-crt-environment-l1-1-0.dll _putenv
getenv
api-ms-win-crt-conio-l1-1-0.dll _cputs
api-ms-win-crt-time-l1-1-0.dll _tzset
__tzname
__timezone
_gmtime64
_time64
_gmtime64_s
api-ms-win-crt-filesystem-l1-1-0.dll _fstat64i32
_stat64
_stat64i32
_fstat64
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale

Delayed Imports

png_access_version_number

Ordinal 1
Address 0x7e330

png_benign_error

Ordinal 2
Address 0x827e0

png_build_grayscale_palette

Ordinal 3
Address 0x8aa50

png_calloc

Ordinal 4
Address 0x8ba30

png_chunk_benign_error

Ordinal 5
Address 0x82a70

png_chunk_error

Ordinal 6
Address 0x82800

png_chunk_warning

Ordinal 7
Address 0x829e0

png_convert_from_struct_tm

Ordinal 8
Address 0x80ef0

png_convert_from_time_t

Ordinal 9
Address 0x80f20

png_convert_to_rfc1123

Ordinal 10
Address 0x7e170

png_create_info_struct

Ordinal 11
Address 0x7db10

png_create_read_struct

Ordinal 12
Address 0x82c00

png_create_read_struct_2

Ordinal 13
Address 0x82c20

png_create_write_struct

Ordinal 14
Address 0x80f90

png_create_write_struct_2

Ordinal 15
Address 0x80fb0

png_data_freer

Ordinal 16
Address 0x7dcc0

png_destroy_info_struct

Ordinal 17
Address 0x7dbb0

png_destroy_read_struct

Ordinal 18
Address 0x83eb0

png_destroy_write_struct

Ordinal 19
Address 0x816d0

png_error

Ordinal 20
Address 0x82630

png_free

Ordinal 21
Address 0x8bb30

png_free_data

Ordinal 22
Address 0x7dd00

png_free_default

Ordinal 23
Address 0x8bb60

png_get_IHDR

Ordinal 24
Address 0x8e0d0

png_get_PLTE

Ordinal 25
Address 0x8e460

png_get_bKGD

Ordinal 26
Address 0x8dd70

png_get_bit_depth

Ordinal 27
Address 0x8d7c0

png_get_cHRM

Ordinal 28
Address 0x8dda0

png_get_cHRM_fixed

Ordinal 29
Address 0x8ded0

png_get_channels

Ordinal 30
Address 0x8dd40

png_get_chunk_cache_max

Ordinal 31
Address 0x8e640

png_get_chunk_malloc_max

Ordinal 32
Address 0x8e650

png_get_color_type

Ordinal 33
Address 0x8d7d0

png_get_compression_buffer_size

Ordinal 34
Address 0x8e610

png_get_compression_type

Ordinal 35
Address 0x8d800

png_get_copyright

Ordinal 36
Address 0x7e290

png_get_current_pass_number

Ordinal 37
Address 0x8b6b0

png_get_current_row_number

Ordinal 38
Address 0x8b690

png_get_error_ptr

Ordinal 39
Address 0x82bf0

png_get_filter_type

Ordinal 40
Address 0x8d7e0

png_get_gAMA

Ordinal 41
Address 0x8dfb0

png_get_gAMA_fixed

Ordinal 42
Address 0x8df80

png_get_hIST

Ordinal 43
Address 0x8e0a0

png_get_header_ver

Ordinal 44
Address 0x7e2a0

png_get_header_version

Ordinal 45
Address 0x7e2b0

png_get_iCCP

Ordinal 46
Address 0x8e010

png_get_image_height

Ordinal 47
Address 0x8d7b0

png_get_image_width

Ordinal 48
Address 0x8d7a0

png_get_int_32

Ordinal 49
Address 0x979c0

png_get_interlace_type

Ordinal 50
Address 0x8d7f0

png_get_io_chunk_name

Ordinal 51
Address 0x8e680

png_get_io_chunk_type

Ordinal 52
Address 0x8e670

png_get_io_ptr

Ordinal 53
Address 0x7e150

png_get_io_state

Ordinal 54
Address 0x8e660

png_get_libpng_ver

Ordinal 55
Address 0x7e2a0

png_get_mem_ptr

Ordinal 56
Address 0x8bc20

png_get_oFFs

Ordinal 57
Address 0x8e1c0

png_get_pCAL

Ordinal 58
Address 0x8e210

png_get_pHYs

Ordinal 59
Address 0x8e400

png_get_pHYs_dpi

Ordinal 60
Address 0x8dc90

png_get_pixel_aspect_ratio

Ordinal 61
Address 0x8d8a0

png_get_pixel_aspect_ratio_fixed

Ordinal 62
Address 0x8d8e0

png_get_pixels_per_inch

Ordinal 63
Address 0x8da10

png_get_pixels_per_meter

Ordinal 64
Address 0x8d870

png_get_rgb_to_gray_status

Ordinal 65
Address 0x8e5f0

png_get_rowbytes

Ordinal 66
Address 0x8d760

png_get_rows

Ordinal 67
Address 0x8d780

png_get_sBIT

Ordinal 68
Address 0x8e490

png_get_sCAL

Ordinal 69
Address 0x8e350

png_get_sCAL_fixed

Ordinal 70
Address 0x8e2c0

png_get_sCAL_s

Ordinal 71
Address 0x8e3c0

png_get_sPLT

Ordinal 72
Address 0x8e070

png_get_sRGB

Ordinal 73
Address 0x8dfe0

png_get_signature

Ordinal 74
Address 0x8dd50

png_get_tIME

Ordinal 75
Address 0x8e500

png_get_tRNS

Ordinal 76
Address 0x8e530

png_get_text

Ordinal 77
Address 0x8e4c0

png_get_uint_16

Ordinal 78
Address 0x979d0

png_get_uint_31

Ordinal 79
Address 0x979a0

png_get_uint_32

Ordinal 80
Address 0x979c0

png_get_unknown_chunks

Ordinal 81
Address 0x8e5c0

png_get_user_chunk_ptr

Ordinal 82
Address 0x8e600

png_get_user_height_max

Ordinal 83
Address 0x8e630

png_get_user_transform_ptr

Ordinal 84
Address 0x8b680

png_get_user_width_max

Ordinal 85
Address 0x8e620

png_get_valid

Ordinal 86
Address 0x8d740

png_get_x_offset_inches

Ordinal 87
Address 0x8dc10

png_get_x_offset_inches_fixed

Ordinal 88
Address 0x8db90

png_get_x_offset_microns

Ordinal 89
Address 0x8d950

png_get_x_offset_pixels

Ordinal 90
Address 0x8d9b0

png_get_x_pixels_per_inch

Ordinal 91
Address 0x8da90

png_get_x_pixels_per_meter

Ordinal 92
Address 0x8d810

png_get_y_offset_inches

Ordinal 93
Address 0x8dc50

png_get_y_offset_inches_fixed

Ordinal 94
Address 0x8dbd0

png_get_y_offset_microns

Ordinal 95
Address 0x8d980

png_get_y_offset_pixels

Ordinal 96
Address 0x8d9e0

png_get_y_pixels_per_inch

Ordinal 97
Address 0x8db10

png_get_y_pixels_per_meter

Ordinal 98
Address 0x8d840

png_handle_as_unknown

Ordinal 99
Address 0x7e2c0

png_info_init_3

Ordinal 100
Address 0x7db60

png_init_io

Ordinal 101
Address 0x7e160

png_longjmp

Ordinal 102
Address 0x82b90

png_malloc

Ordinal 103
Address 0x8bab0

png_malloc_default

Ordinal 104
Address 0x8bb10

png_malloc_warn

Ordinal 105
Address 0x8bb80

png_permit_mng_features

Ordinal 106
Address 0x8d430

png_read_end

Ordinal 107
Address 0x83a00

png_read_image

Ordinal 108
Address 0x83910

png_read_info

Ordinal 109
Address 0x82f90

png_read_png

Ordinal 110
Address 0x842d0

png_read_row

Ordinal 111
Address 0x833b0

png_read_rows

Ordinal 112
Address 0x83840

png_read_update_info

Ordinal 113
Address 0x83340

png_reset_zstream

Ordinal 114
Address 0x7e310

png_save_int_32

Ordinal 115
Address 0x8e690

png_save_uint_16

Ordinal 116
Address 0x8e6b0

png_save_uint_32

Ordinal 117
Address 0x8e690

png_set_IHDR

Ordinal 118
Address 0x8c0b0

png_set_PLTE

Ordinal 119
Address 0x8c870

png_set_add_alpha

Ordinal 120
Address 0x8ad00

png_set_bKGD

Ordinal 121
Address 0x8bc30

png_set_background

Ordinal 122
Address 0x84700

png_set_background_fixed

Ordinal 123
Address 0x84690

png_set_benign_errors

Ordinal 124
Address 0x8d710

png_set_bgr

Ordinal 125
Address 0x8abf0

png_set_cHRM

Ordinal 126
Address 0x8bd40

png_set_cHRM_fixed

Ordinal 127
Address 0x8bc60

png_set_chunk_cache_max

Ordinal 128
Address 0x8d6f0

png_set_chunk_malloc_max

Ordinal 129
Address 0x8d700

png_set_compression_buffer_size

Ordinal 130
Address 0x8d630

png_set_compression_level

Ordinal 131
Address 0x82340

png_set_compression_mem_level

Ordinal 132
Address 0x82360

png_set_compression_method

Ordinal 133
Address 0x82410

png_set_compression_strategy

Ordinal 134
Address 0x82380

png_set_compression_window_bits

Ordinal 135
Address 0x823a0

png_set_crc_action

Ordinal 136
Address 0x845a0

png_set_error_fn

Ordinal 137
Address 0x82bd0

png_set_expand

Ordinal 138
Address 0x85450

png_set_expand_16

Ordinal 139
Address 0x854b0

png_set_expand_gray_1_2_4_to_8

Ordinal 140
Address 0x85470

png_set_filler

Ordinal 141
Address 0x8aca0

png_set_filter

Ordinal 142
Address 0x81980

png_set_filter_heuristics

Ordinal 143
Address 0x81bc0

png_set_filter_heuristics_fixed

Ordinal 144
Address 0x82110

png_set_flush

Ordinal 145
Address 0x815c0

png_set_gAMA

Ordinal 146
Address 0x8bf70

png_set_gAMA_fixed

Ordinal 147
Address 0x8bf40

png_set_gamma

Ordinal 148
Address 0x853a0

png_set_gamma_fixed

Ordinal 149
Address 0x85320

png_set_gray_to_rgb

Ordinal 150
Address 0x854e0

png_set_hIST

Ordinal 151
Address 0x8bfc0

png_set_iCCP

Ordinal 152
Address 0x8ca10

png_set_interlace_handling

Ordinal 153
Address 0x8ac80

png_set_invalid

Ordinal 154
Address 0x8d6b0

png_set_invert_alpha

Ordinal 155
Address 0x8ad90

png_set_invert_mono

Ordinal 156
Address 0x8ada0

png_set_keep_unknown_chunks

Ordinal 157
Address 0x8d450

png_set_longjmp_fn

Ordinal 158
Address 0x82b70

png_set_mem_fn

Ordinal 159
Address 0x8bc00

png_set_oFFs

Ordinal 160
Address 0x8c1b0

png_set_pCAL

Ordinal 161
Address 0x8c1e0

png_set_pHYs

Ordinal 162
Address 0x8c840

png_set_packing

Ordinal 163
Address 0x8ac20

png_set_packswap

Ordinal 164
Address 0x8ac40

png_set_palette_to_rgb

Ordinal 165
Address 0x85450

png_set_quantize

Ordinal 166
Address 0x847d0

png_set_read_fn

Ordinal 167
Address 0x8b850

png_set_read_status_fn

Ordinal 168
Address 0x842c0

png_set_read_user_chunk_fn

Ordinal 169
Address 0x8d5c0

png_set_read_user_transform_fn

Ordinal 170
Address 0x85710

png_set_rgb_to_gray

Ordinal 171
Address 0x855f0

png_set_rgb_to_gray_fixed

Ordinal 172
Address 0x85500

png_set_rows

Ordinal 173
Address 0x8d5e0

png_set_sBIT

Ordinal 174
Address 0x8c940

png_set_sCAL

Ordinal 175
Address 0x8c670

png_set_sCAL_fixed

Ordinal 176
Address 0x8c770

png_set_sCAL_s

Ordinal 177
Address 0x8c4b0

png_set_sPLT

Ordinal 178
Address 0x8d050

png_set_sRGB

Ordinal 179
Address 0x8c960

png_set_sRGB_gAMA_and_cHRM

Ordinal 180
Address 0x8c980

png_set_shift

Ordinal 181
Address 0x8ac60

png_set_sig_bytes

Ordinal 182
Address 0x7d9a0

png_set_strip_16

Ordinal 183
Address 0x847a0

png_set_strip_alpha

Ordinal 184
Address 0x847c0

png_set_swap

Ordinal 185
Address 0x8ac00

png_set_swap_alpha

Ordinal 186
Address 0x8ad80

png_set_tIME

Ordinal 187
Address 0x8cf20

png_set_tRNS

Ordinal 188
Address 0x8cf40

png_set_tRNS_to_alpha

Ordinal 189
Address 0x85490

png_set_text

Ordinal 190
Address 0x8cb60

png_set_unknown_chunk_location

Ordinal 191
Address 0x8d400

png_set_unknown_chunks

Ordinal 192
Address 0x8d250

png_set_user_limits

Ordinal 193
Address 0x8d6d0

png_set_user_transform_info

Ordinal 194
Address 0x8b660

png_set_write_fn

Ordinal 195
Address 0x8b770

png_set_write_status_fn

Ordinal 196
Address 0x82450

png_set_write_user_transform_fn

Ordinal 197
Address 0x82460

png_sig_cmp

Ordinal 198
Address 0x7d9d0

png_start_read_image

Ordinal 199
Address 0x83390

png_warning

Ordinal 200
Address 0x826c0

png_write_chunk

Ordinal 201
Address 0x8e740

png_write_chunk_data

Ordinal 202
Address 0x8e900

png_write_chunk_end

Ordinal 203
Address 0x8e950

png_write_chunk_start

Ordinal 204
Address 0x8e850

png_write_end

Ordinal 205
Address 0x80d40

png_write_flush

Ordinal 206
Address 0x815e0

png_write_image

Ordinal 207
Address 0x81550

png_write_info

Ordinal 208
Address 0x80940

png_write_info_before_PLTE

Ordinal 209
Address 0x806f0

png_write_png

Ordinal 210
Address 0x82480

png_write_row

Ordinal 211
Address 0x812d0

png_write_rows

Ordinal 212
Address 0x81290

png_write_sig

Ordinal 213
Address 0x8e6c0

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x7cc
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.47242
Detected Filetype PNG graphic file
MD5 bbc79abe5bf55b2147f03652d77f400a
SHA1 02d3ed8d564dc353386d9b9a189786fd759d25d6
SHA256 16197bc88f2ec77ad2690fae280bf3584c54c7d7b018d8fa4086b7c00fd4effc
SHA3 bd3ecc69926e52944fedbd98a52b5d52520473285bb296f7e2ffccbc5701a9c8

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x98f
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.91141
Detected Filetype PNG graphic file
MD5 bef45cf74ce0e6af1083e7ad651daa2f
SHA1 f2b6ff7137a11ced55a45484597b71def44492d1
SHA256 b6f068b2ff5f3831494b913e9bfff69349c88087205579a6b9a96c167e524e60
SHA3 13913a986a0d6d489bc9c049310f3d9cc2e543d8ab9bffac1b92c87b672eab2d

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x9e7
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.00143
Detected Filetype PNG graphic file
MD5 5308d41a3c949ba0599038317e2c042e
SHA1 4f62cd9108deb0a2b2af1a83a5d9d04ce3f149a9
SHA256 c10cdd1b627ee53548140c4a255032d39dfb0039413b5c1b9765a1fa0d3f27a9
SHA3 eedc41d70787700439e368b8be2ad33f0ed514fff34eb12649aa8dbb6580d493

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xbdd
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.22958
Detected Filetype PNG graphic file
MD5 e592ecd29b8047d0a19d511e1bfa77d4
SHA1 25d32e28490be0bf188f6b1c184a996cb466c63e
SHA256 bd35429f29158026133e8d2d7b0a5d295913934c6bd8c4d8f2c1457bb824ad11
SHA3 072f081abda262627317d936fdfed74e284231e5cd6d38f95131558b2382ac54

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xcac
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.34056
Detected Filetype PNG graphic file
MD5 2d7063768024087fc9677df50060499e
SHA1 286ce58ffccdfcba5ad60d11af2db07f987d0a48
SHA256 521e6a42b587f6e9b964ba2a14c93bfadd94f1f06a2560ed09a7e7dd5043c61e
SHA3 e1724a3a38c17996aea1e777df540d48d98e6c21b1d78d92c318e7f9e50533ee

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0xdcb
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.41581
Detected Filetype PNG graphic file
MD5 7bf36c29bcb6b5839d85c9c836216593
SHA1 86e7a55cacd17d1bda55a1a1de5a03adcba06c2b
SHA256 7a96ab7db1fa191a6bd087497c2f55239d7cda01dcc226e742daa80c5bc37de2
SHA3 72655fed7cd84d2c2de3957446a52a6a22dff86ca62a37d4e8586e86a1e613f0

7

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x1b13
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.73886
Detected Filetype PNG graphic file
MD5 1f48923337871ba25cf266bba17429cc
SHA1 279f47235e20eedee5daa535ea611e0aed1157d0
SHA256 2399dfb472a6c753447b847fbb144235145ca6507a60941b5295389c6fc45639
SHA3 06825c34eb7fe14d622735aa986a3e26247e95d5493a5b22eb3884f51b155493

123

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x68
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.93324
Detected Filetype Icon file
MD5 26e4bbdda9f8e58b060feaa53c3083e2
SHA1 bd724469fc43a9a58679a7016c303a5693fe9f94
SHA256 74c73b469e08909c1b539a80c66cb442d04b3c29cd03e8a533a3c349c5cc84c4
SHA3 49df4b8afdcf81a2097c2608740540f7e25ce3aa86c892702db1183998142c1b

1 (#2)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x350
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.41435
MD5 bb418c1c6bd95838fd492381b3de7397
SHA1 acac4ee4d53146d9658ac69e529ec5335777b65e
SHA256 3866e786050fad246cabdcfdc352d90229099bcbcd996a168165eee7309360d6
SHA3 428f5269cfbbe1b922047e700a3b70861fad54485dd85e2ce36904bb14756fd9

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x5c7
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.31889
MD5 282697ea0ae41feb4b948f00e9cfda3f
SHA1 5bf0038fd44bd2522568125459acdf21dafa4ff8
SHA256 1a173902c6a37b2ef669698599b37eebf2da5df98111cf559d1a0603f52022ce
SHA3 cf45de6c80e6df215423d803bd73dd4d2c7efeb96529020a9a6db0da62fc554b

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 4.27.2.0
ProductVersion 4.27.2.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_DLL
Language English - United States
CompanyName Epic Games, Inc.
LegalCopyright Fill out your copyright notice in the Description page of Project Settings.
ProductName CrashReportClient
ProductVersion (#2) ++UE4+Release-4.27-CL-0
FileDescription CrashReportClient
InternalName UnrealEngine
OriginalFilename CrashReportClient.exe
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2024-Dec-19 17:53:06
Version 0.0
SizeofData 46
AddressOfRawData 0xfc4c40
PointerToRawData 0xfc2640
Referenced File CrashReportClient.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2024-Dec-19 17:53:06
Version 0.0
SizeofData 20
AddressOfRawData 0xfc4c70
PointerToRawData 0xfc2670

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2024-Dec-19 17:53:06
Version 0.0
SizeofData 1056
AddressOfRawData 0xfc4c84
PointerToRawData 0xfc2684

TLS Callbacks

StartAddressOfRawData 0x140fc50d0
EndAddressOfRawData 0x140fc51dd
AddressOfIndex 0x1413008a8
AddressOfCallbacks 0x140c6abe8
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_16BYTES
Callbacks 0x0000000140C0EE0C

Load Configuration

Size 0x138
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1411d9cd8

RICH Header

XOR Key 0xe3f35f8a
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 24
C++ objects (29395) 1
253 (28518) 9
C objects (30034) 10
ASM objects (30034) 12
C++ objects (30034) 30
Imports (30034) 6
C objects (29395) 8
C objects (CVTCIL) (29395) 1
Imports (29395) 40
173 (VS2010 build 30319) 1
Imports (21202) 4
Imports (VS2017 v14.15 compiler 26715) 2
C++ objects (VS2017 v15.9.5-6 compiler 27026) 73
C objects (VS 2015/2017/2019 runtime 29913) 56
C objects (CVTCIL) (VS2015/2017 runtime 25711) 1
C objects (VS2017 v15.8.9 compiler 26732) 6
Imports (VS2015/2017 runtime 25711) 14
C objects (VS2015 UPD3.1 build 24215) 112
C objects (24234) 556
Imports (VS2010 build 30319) 3
Total imports 871
C++ objects (VS2015 UPD3.1 build 24215) 344
C++ objects (VS2017 v15.9.11 compiler 27030) 11
C++ objects (VS2017 v15.9.16-18 compiler 27034) 5
Unmarked objects (#2) 79
C++ objects (30151) 69
Exports (30151) 1
Resource objects (30151) 1
151 1
Linker (30151) 1

Errors

Leave a comment

No comments yet.