Yes, all of it. Including the bouncing polygons, of course. And since it's placed at the end of ZUN's code inside the executable, the code's already position-independent and fully hackable.