Static | ZeroBOX

PE Compile Time

2019-05-30 02:05:37

PDB Path

C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\WindowsPlayer_x86_Master.pdb

PE Imphash

01e20355b5974d2d8443a426ccb6aad1

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000a827 0x0000aa00 6.60334570652
.rdata 0x0000c000 0x000059cc 0x00005a00 4.92282493133
.data 0x00012000 0x000012fc 0x00000800 2.13775652202
.gfids 0x00014000 0x000000b4 0x00000200 1.44825792707
.rsrc 0x00015000 0x0008a0e0 0x0008a200 6.65530138208
.reloc 0x000a0000 0x00000de0 0x00000e00 6.50935774257

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0005c810 0x00042028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x0009e838 0x00000084 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0009ef18 0x000001c8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0009e8c0 0x00000655 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text, with CRLF line terminators

Imports

Library UnityPlayer.dll:
0x40c108 UnityMain
Library KERNEL32.dll:
0x40c00c GetCurrentProcessId
0x40c010 GetCurrentThreadId
0x40c018 InitializeSListHead
0x40c01c IsDebuggerPresent
0x40c028 GetStartupInfoW
0x40c030 GetModuleHandleW
0x40c034 GetCurrentProcess
0x40c038 TerminateProcess
0x40c03c GetLastError
0x40c040 GetModuleFileNameW
0x40c048 TlsAlloc
0x40c04c TlsGetValue
0x40c050 TlsSetValue
0x40c054 TlsFree
0x40c058 FreeLibrary
0x40c05c GetProcAddress
0x40c060 LoadLibraryExW
0x40c064 RtlUnwind
0x40c068 SetLastError
0x40c078 GetStdHandle
0x40c07c WriteFile
0x40c080 MultiByteToWideChar
0x40c084 WideCharToMultiByte
0x40c088 ExitProcess
0x40c08c GetModuleHandleExW
0x40c090 GetACP
0x40c094 HeapFree
0x40c098 HeapAlloc
0x40c09c CloseHandle
0x40c0a0 FindClose
0x40c0a4 FindFirstFileExW
0x40c0a8 FindNextFileW
0x40c0ac IsValidCodePage
0x40c0b0 GetOEMCP
0x40c0b4 GetCPInfo
0x40c0b8 GetCommandLineA
0x40c0bc GetCommandLineW
0x40c0c8 LCMapStringW
0x40c0cc SetStdHandle
0x40c0d0 GetFileType
0x40c0d4 GetStringTypeW
0x40c0d8 GetProcessHeap
0x40c0dc HeapSize
0x40c0e0 HeapReAlloc
0x40c0e4 FlushFileBuffers
0x40c0e8 GetConsoleCP
0x40c0ec GetConsoleMode
0x40c0f0 SetFilePointerEx
0x40c0f4 WriteConsoleW
0x40c0f8 DecodePointer
0x40c0fc CreateFileW
0x40c100 RaiseException
Library ADVAPI32.dll:
0x40c000 SystemFunction036

Exports

Ordinal Address Name
1 0x4127c0 AmdPowerXpressRequestHighPerformance
2 0x4127c4 NvOptimusEnablement
!This program cannot be run in DOS mode.
$RichL
`.rdata
@.data
.gfids
@.rsrc
@.reloc
PPPh A
URPQQh
;t$,v-
UQPXY]Y[
j"^f91j\^u8
j"^f9q
t/j=[f;
taj*Xf
VWj\^j:
WWWPWS
SSVWh
f9:t!V
QQSWj0j@
PPPPPPPP
PPPPPWS
PP9E u:PPVWP
Main Invoked.
Main Returned.
EventRegister
EventSetInformation
EventUnregister
EventWriteTransfer
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
CorExitProcess
GetCurrentPackageId
LCMapStringEx
LocaleNameToLCID
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
InvokeMainViaCRT
"Main Invoked."
FileName
ExitMainViaCRT
"Main Returned."
FileName
Microsoft.CRTProvider
RSDST1
C:\buildslave\unity\build\build\WindowsStandaloneSupport\Variations\win32_nondevelopment_mono\WindowsPlayer_x86_Master.pdb
.text$mn
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$sxdata
.rdata$zETW0
.rdata$zETW1
.rdata$zETW2
.rdata$zETW9
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.edata
.idata$2
.idata$3
.idata$4
.idata$6
.gfids$x
.gfids$y
.rsrc$01
.rsrc$02
WindowsPlayer.exe
AmdPowerXpressRequestHighPerformance
NvOptimusEnablement
UnityMain
UnityPlayer.dll
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
GetLastError
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStdHandle
WriteFile
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
CloseHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
RaiseException
KERNEL32.dll
SystemFunction036
ADVAPI32.dll
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="UnityTechnologies.Unity.UnityPlayer" type="win32"/>
<description>Unity</description>
<dependency>
<dependentAssembly>
<assemblyIdentity
type="win32" name="Microsoft.Windows.Common-Controls"
version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df"
language="*"
/>
</dependentAssembly>
</dependency>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel
level="asInvoker"
uiAccess="false"
</requestedPrivileges>
</security>
</trustInfo>
<!-- From MSDN: Note that Windows XP and Windows Vista ignore this manifest section and it has no impact on them. -->
<compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1">
<application>
<!-- Windows 10 -->
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
<!-- Windows 8.1 -->
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<!-- Windows 8 -->
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<!-- Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
</application>
</compatibility>
<application xmlns="urn:schemas-microsoft-com:asm.v3">
<windowsSettings>
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">True/PM</dpiAware>
</windowsSettings>
</application>
</assembly>
2=3k3|3
5#686?6E6W6a6
7Q7l7x7
8 8F8O8U8
819P9Z9k9
9;:D:I:o:t:
<*<1<g<p<}<
= ='=.=5=<=C=J=R=Z=b=n=w=|=
> >C>S>k>
?2?T?b?
I0Q0c0
3 373?3i3
3 4%4*4c4h4m4
5 5%5*5N5Z5_5d5
6%6E6Q6h7
878E8L8R8d8v8{8
;+;9;q;y;
;.<8<><D<
10191}1
2/2K2{2
4U4g4m4
:9:H:M:^:d:o:w:
11T1e1
303`3}3
:Q;`;r;
;&<-<4<;<U<d<n<{<
<%=@=R?
0+090B0w0
4.464r4
5,5>5I5N5S5n5x5
6$6@6K6P6U6s6}6
8%8*8/8Q8_8n8
::;:B:Y:o:
>!>3>E>f>x>
3-4C4d4
4k5r5|5
606]6o6
8$818H8
:]<)?_?
(0B0Q0_0k0w0
1(131I1]1w1
:!:K:_::;Y;^;
5&5Y5v5
8$9H9S9`9r9
9W:l:u:~:
=!=)=1=9=W=_=
2)3F3V3
4\5g5r5x5
66+6>6]6
93:9:>:D:U:
D2G3X3
5F6K6]6{6
==$=(=,=0=
1$1(1,10141@1D1H1`1d1h1
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
4 4$4(4,4044484<4@4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
40;8;@;D;H;L;P;T;X;\;d;h;l;p;t;x;|;
=P=T=X=\=`=d=h=l=p=t=x=|=
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<|<
= =$=(=<=D=L=T=\=d=l=t=|=
>$>,>4><>D>L>T>\>d>l>t>|>
?$?,?4?<?D?L?T?\?d?l?t?|?
0$0,040<0D0L0T0\0d0l0t0|0
1$1,141<1D1L1T1\1d1l1t1|1
2$2,242<2D2L2T2\2d2l2t2|2
3$3,343<3D3L3T3\3d3l3t3|3
4$4,444<4D4L4T4X>`>h>p>x>
? ?(?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5j?n?r?v?
9$9,949<9D9L9T9\9d9l9t9|9
080X0t0x0
181X1x1
2$2<2@2`2
6(6@6L6P6T6p6t6
Microsoft0
221231160000Z
401224160000Z0
Microsoft0
Microsoft
Microsoft
@advapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
mscoree.dll
@ja-JP
@api-ms-win-appmodel-runtime-l1-1-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l2-1-1
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-kernel32-package-current-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
user32
((((( H
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
VS_VERSION_INFO
StringFileInfo
040904b0
FileVersion
2017.4.28.14917879
ProductVersion
2017.4.28.14917879
Unity Version
2017.4.28f1_e3a0f7dd2097
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Clean
ALYac Trojan.GenericKD.73853211
Cylance Unsafe
Zillya Clean
Sangfor Clean
CrowdStrike Clean
Alibaba Clean
K7GW Clean
K7AntiVirus Clean
huorong Clean
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec Trojan.Gen.MBT
tehtris Clean
ESET-NOD32 Clean
APEX Clean
Avast FileRepMalware [Misc]
Cynet Clean
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Trojan.GenericKD.73853211
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.GenericKD.73853211
Tencent Clean
Sophos Mal/Generic-S
F-Secure Clean
DrWeb Clean
VIPRE Trojan.GenericKD.73853211
TrendMicro Clean
McAfeeD ti!534FD2D6DA5C
Trapmine Clean
CTX exe.trojan.generic
Emsisoft Trojan.GenericKD.73853211 (B)
Ikarus Clean
FireEye Trojan.GenericKD.73853211
Jiangmin Clean
Webroot Clean
Varist Clean
Avira Clean
Fortinet W32/PossibleThreat
Antiy-AVL Clean
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Generic.D466E91B
SUPERAntiSpyware Clean
ZoneAlarm UDS:DangerousObject.Multi.Generic
Microsoft Program:Win32/Wacapew.C!ml
Google Clean
AhnLab-V3 Clean
Acronis Clean
McAfee Artemis!DEC397E36E9F
TACHYON Clean
VBA32 Clean
Malwarebytes Generic.Malware/Suspicious
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R011H09HJ24
Rising Clean
Yandex Clean
SentinelOne Clean
MaxSecure Trojan.Malware.275513770.susgen
GData Trojan.GenericKD.73853211
AVG FileRepMalware [Misc]
DeepInstinct MALICIOUS
alibabacloud Clean
No IRMA results available.