764acd9ed5e0eb9363cb905bbef0cec7b4816083231d252f03968f7d7661fa9b

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Apr-23 04:28:05
Detected languages English - United States
Russian - Russia
Debug artifacts D:\!Projects_c++\GitPixelRotation\Build\PR_Release.pdb

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Suspicious Strings found in the binary may indicate undesirable behavior: Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • http://www.microsoft.com
  • http://www.microsoft.com/whdc/ddk/debugging/
  • http://www.w3.org
  • http://www.w3.org/1999/xlink
  • http://www.w3.org/2000/svg
  • https://discord.gg
  • inkscape.org
  • microsoft.com
  • paintStack.top
  • www.inkscape.org
  • www.microsoft.com
  • www.w3.org
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Uses constants related to AES
Uses known Mersenne Twister constants
Suspicious The PE is possibly packed. Unusual section name found: .vlizer
Section .vlizer is both writable and executable.
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryW
  • GetProcAddress
Can access the registry:
  • RegisterHotKey
  • RegSetValueExW
  • RegQueryValueExW
  • RegOpenKeyExW
  • RegEnumValueW
  • RegEnumKeyW
  • RegDeleteValueW
  • RegDeleteKeyW
  • RegCreateKeyExW
  • RegCloseKey
Uses Windows's Native API:
  • NtQueryDirectoryObject
  • NtOpenDirectoryObject
Can create temporary files:
  • CreateFileW
  • GetTempPathW
Uses functions commonly found in keyloggers:
  • CallNextHookEx
  • MapVirtualKeyW
  • GetAsyncKeyState
Leverages the raw socket API to access the Internet:
  • getsockopt
  • sendto
  • inet_pton
  • recvfrom
  • closesocket
  • recv
  • htons
  • htonl
  • WSAGetLastError
  • bind
  • setsockopt
  • connect
  • shutdown
  • socket
  • WSAStartup
  • inet_addr
  • WSACleanup
  • send
Enumerates local disk drives:
  • GetDriveTypeW
  • GetLogicalDriveStringsW
Can take screenshots:
  • GetDC
  • CreateCompatibleDC
  • BitBlt
Malicious VirusTotal score: 6/70 (Scanned on 2026-05-01 18:52:33) APEX: Malicious
Bkav: W64.AIDetectMalware
CrowdStrike: win/malicious_confidence_70% (D)
Cylance: Unsafe
Gridinsoft: Trojan.Heur!.03014023
Symantec: ML.Attribute.HighConfidence

Hashes

MD5 8704039f61f7ff3c10755a27327d4267
SHA1 5961b14b1d70c9f4d32c03391075d6644020f9d6
SHA256 764acd9ed5e0eb9363cb905bbef0cec7b4816083231d252f03968f7d7661fa9b
SHA3 f9d3d5d8939302647ed3b4076171a153252cd0f4a0161a77d15f16831507503a
SSDeep 196608:+4vvEkeIt3ZtRttu3AGI1Y1IyquT6uImKBgrpJVw7FLCnjMKHniB2iysNVcUsNNk:+OvEkTtJvtRU+BurXKolaxm4KIv3sI
Imports Hash 6e1e9b83b79616f8f714332342721796

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x130

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 7
TimeDateStamp 2026-Apr-23 04:28:05
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x60d600
SizeOfInitializedData 0x7bc200
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000004DB33C (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x2049000
SizeOfHeaders 0x400
Checksum 0x12ffa30
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 80fa774df548ff3be5cabe9ce8ba2853
SHA1 e8e92a7f5ab211a7c4aa5aac0406d227ea573b2e
SHA256 a28460dbfdc970d5d3029f644bac5f2c4cf13e6c90009d09c99dad1bd149d818
SHA3 cd6e053d4b27c9b6ac24e55acc16f401e3846a036ef1a5b4f8f4ee992f8d937a
VirtualSize 0x60d555
VirtualAddress 0x1000
SizeOfRawData 0x60d600
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.50594

.rdata

MD5 646c997ae969c7934883efc539d3931b
SHA1 fab0c523133651e8c7b532d028afd4cb241c870b
SHA256 8848781ca2857e452989c1d471ae39429a8c6fac843f67048551d260d3f04ce3
SHA3 1958a08af3c6a683ed64d35f64a4235a8cfaa6ef0d4fe699e8ae7ba8716fc753
VirtualSize 0x268eb8
VirtualAddress 0x60f000
SizeOfRawData 0x269000
PointerToRawData 0x60da00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.8638

.data

MD5 57ae3b2fa355dc03fe889f0bb97081e9
SHA1 7036253527d01ba4c390ba8e7a1e65a405903609
SHA256 ba1cfb88bb86347a200334b41bf10254ce1367bdcdf43bef92ce7dc189c0b68a
SHA3 a76230ee44cc6f2cc15fbe7689f8a6c7d4a02bbd72592f5bf2191969b025066c
VirtualSize 0x4a400
VirtualAddress 0x878000
SizeOfRawData 0x16200
PointerToRawData 0x876a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.36395

.pdata

MD5 6c84aae501e6a74b2be56c3c8e8fa270
SHA1 3fe28fdee42c698fdafe8c686d040e9719e84594
SHA256 0271de0bd5731bc6c3cdcb3f74bd820b49bc991d9f0dc26075e4837abc343914
SHA3 5881ccfca201e2d2af5de1d0b7a3b613e113a43f99e749c25c6b230db1956f30
VirtualSize 0x612b4
VirtualAddress 0x8c3000
SizeOfRawData 0x61400
PointerToRawData 0x88cc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.0431

.rsrc

MD5 b959c97092c9679b53d533599c31a746
SHA1 7c6ea2e3b8eda78217fc891aba9905e9782a3da6
SHA256 b1ccb402788cf42802054e7279c5babab33249b7605471c6c4faae10b45a2966
SHA3 0fc327d4ae29448b58e6f8e47b72502d3e83e695f8c3ef0156cbe51532ec50be
VirtualSize 0x48e260
VirtualAddress 0x925000
SizeOfRawData 0x48e400
PointerToRawData 0x8ee000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.96362

.reloc

MD5 4f7ad9e92cbd6a4a90063e70a0c4983e
SHA1 99d69607456488ff6747b502a9489308e8363792
SHA256 81f91d30ba7c10526aef7ac4b61397ba0dcf5a8ac607307b0230fcd87c583ba4
SHA3 693fb129db511c4af1bb978c639ac4193b02f7f2fad185bdefd84853872af2e0
VirtualSize 0x19560
VirtualAddress 0xdb4000
SizeOfRawData 0x19600
PointerToRawData 0xd7c400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.447

.vlizer

MD5 4f7104f0fb4f6f3503295109688aeb17
SHA1 ad4472bd81bd1ee820f8b0a7a1f808bb76af7e53
SHA256 4988ece249afe3a8f8d130563c957ebf8915ef4fc0a14fb788a81438da1bf45b
SHA3 2cd5e8a779311db14239dd91f93a0f0ae315ad4d2d01d05a06d047d3dae401bd
VirtualSize 0x127b000
VirtualAddress 0xdce000
SizeOfRawData 0x560559
PointerToRawData 0xd95a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.99997

Imports

KERNEL32.dll GetDriveTypeW
GetLogicalDriveStringsW
LocalAlloc
CompareStringEx
GetTickCount64
GetModuleHandleW
DeleteCriticalSection
FindResourceW
LoadResource
CloseHandle
LockResource
CreateFileW
InitializeCriticalSectionEx
DeviceIoControl
SizeofResource
WideCharToMultiByte
GetLastError
MultiByteToWideChar
FindClose
FindFirstFileW
QueryPerformanceCounter
QueryPerformanceFrequency
MoveFileExA
GetSystemTimeAsFileTime
Sleep
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WakeAllConditionVariable
SleepConditionVariableSRW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetFileInformationByHandleEx
AreFileApisANSI
GetFileAttributesExW
CreateDirectoryW
GetLocaleInfoEx
FormatMessageA
GlobalFree
GlobalHandle
GlobalSize
GlobalLock
GlobalUnlock
GlobalAlloc
SetLastError
ReadConsoleOutputCharacterA
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterW
WriteConsoleW
WriteConsoleA
AttachConsole
FreeConsole
GetStdHandle
MulDiv
IsBadStringPtrA
IsBadReadPtr
WaitForMultipleObjects
LoadLibraryW
GetProcAddress
FreeLibrary
GetCommandLineW
CreateEventW
SetEvent
ExpandEnvironmentStringsW
ReplaceFileW
CopyFileW
GetFileType
SetCurrentDirectoryW
GetACP
GetCPInfo
IsValidCodePage
GetModuleFileNameW
GetNativeSystemInfo
GetVersionExW
TerminateProcess
GetCurrentProcessId
IsDebuggerPresent
GetEnvironmentVariableW
TlsFree
TlsSetValue
TlsAlloc
GetCurrentThreadId
GetCurrentThread
ExitProcess
GetCurrentProcess
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
OutputDebugStringW
WaitForSingleObject
FormatMessageW
LocalFree
GetTempPathW
GetTempFileNameW
GetLongPathNameW
GetFileAttributesW
SetErrorMode
USER32.dll BeginPaint
GetWindowDC
SetMenuItemInfoW
InsertMenuItemW
SetMenuInfo
RemoveMenu
ModifyMenuW
AppendMenuW
InsertMenuW
GetSubMenu
DestroyMenu
CreatePopupMenu
CreateMenu
GetMenuState
ValidateRect
GetMessageW
GetClassNameW
MessageBeep
GetWindowTextW
IsRectEmpty
ValidateRgn
TranslateAcceleratorW
DestroyAcceleratorTable
CreateAcceleratorTableW
GetCaretBlinkTime
GetDoubleClickTime
SetRectEmpty
SetRect
DrawStateW
HideCaret
GetWindowTextLengthW
keybd_event
IsMenu
EndPaint
FindWindowExW
ChildWindowFromPoint
DestroyCursor
DrawIconEx
SetWindowRgn
DestroyIcon
MonitorFromWindow
OffsetRect
CopyRect
DrawFocusRect
DrawFrameControl
GetDlgItem
CreateDialogParamW
SystemParametersInfoW
GetScrollInfo
SetScrollInfo
IsDialogMessageW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetWindow
SetParent
GetParent
GetWindowLongW
PtInRect
InflateRect
FillRect
GetSysColor
ChildWindowFromPointEx
WindowFromPoint
MapWindowPoints
ScreenToClient
ClientToScreen
GetCursorPos
DrawEdge
UnionRect
GetDesktopWindow
GetComboBoxInfo
SetCursorPos
GetClientRect
EnableScrollBar
ScrollWindow
RedrawWindow
InvalidateRect
GetUpdateRgn
UpdateWindow
GetMenuItemInfoW
TrackPopupMenu
GetMenuItemCount
IsWindowEnabled
EnableWindow
CheckMenuItem
SetCapture
GetCapture
MapVirtualKeyW
VkKeyScanW
GetFocus
GetActiveWindow
SetFocus
IsWindowVisible
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
GetMenuItemID
GetSysColorBrush
CheckMenuRadioItem
RegisterClipboardFormatW
AnimateWindow
IsWindow
GetClipboardFormatNameW
CallWindowProcW
PostQuitMessage
GetMessageTime
NotifyWinEvent
ChangeDisplaySettingsExW
MonitorFromPoint
GetMessagePos
SendMessageW
ReleaseCapture
GetSystemMetrics
UnregisterHotKey
RegisterHotKey
ShutdownBlockReasonCreate
wsprintfW
TranslateMessage
GetMenuBarInfo
GetWindowRect
IsClipboardFormatAvailable
SetMenu
ShutdownBlockReasonDestroy
GetDC
EnumDisplayMonitors
UnregisterClassW
GetAsyncKeyState
GetMonitorInfoW
EnumDisplaySettingsW
ReleaseDC
RegisterWindowMessageW
SetWindowLongPtrW
GetWindowLongPtrW
SetWindowLongW
SetWindowTextW
SetForegroundWindow
EnableMenuItem
GetSystemMenu
MessageBoxA
DrawTextW
DestroyWindow
MessageBoxW
PostThreadMessageW
PostMessageW
RegisterClassW
CreateWindowExW
BringWindowToTop
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
DefWindowProcW
DdeFreeStringHandle
SetTimer
KillTimer
SetCursor
LoadCursorW
DdeInitializeW
DdeUninitialize
DdeConnect
DdeDisconnect
DdePostAdvise
DdeNameService
DdeClientTransaction
DdeCreateDataHandle
DdeGetData
DdeFreeDataHandle
DdeGetLastError
DdeCreateStringHandleW
DdeQueryStringW
DrawMenuBar
LoadBitmapW
LoadIconW
LoadImageW
GetIconInfo
CreateIconIndirect
GetKeyState
GetProcessDefaultLayout
ShowWindow
SetLayeredWindowAttributes
FlashWindowEx
MoveWindow
SetWindowPos
GetWindowPlacement
IsIconic
IsZoomed
CreateDialogIndirectParamW
GetDialogBaseUnits
GDI32.dll Arc
DeleteObject
DeleteDC
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
MaskBlt
ExtFloodFill
GetRegionData
ExtCreateRegion
GetTextExtentPoint32W
GetStockObject
GetOutlineTextMetricsW
CreateFontIndirectW
SetTextColor
SetBkMode
Ellipse
GetClipBox
GetGraphicsMode
GetWindowExtEx
GetViewportExtEx
GetPixel
OffsetRgn
EnumFontFamiliesExW
EndPage
StartPage
EndDoc
StartDocW
SetAbortProc
PlayEnhMetaFile
GetEnhMetaFileHeader
GetEnhMetaFileW
DeleteEnhMetaFile
CreateEnhMetaFileW
CloseEnhMetaFile
SetViewportOrgEx
CreateDCW
GetSystemPaletteEntries
CreateICW
GetTextExtentExPointW
GetCharABCWidthsW
MoveToEx
LineTo
GetBkColor
CreateSolidBrush
GdiFlush
SetBrushOrgEx
GetObjectW
GetTextMetricsW
SelectPalette
RealizePalette
GetDeviceCaps
ExcludeClipRect
CreateRectRgn
SetBkColor
CreateCompatibleBitmap
CreateBitmapIndirect
CreateBitmap
GetObjectType
PtInRegion
GetRgnBox
EqualRgn
ExtCreatePen
CreatePen
GetPaletteEntries
GetNearestPaletteIndex
SetDIBColorTable
GetDIBColorTable
GetDIBits
CreatePalette
CreateDIBitmap
RectInRegion
CreateRectRgnIndirect
CombineRgn
CreatePatternBrush
CreateHatchBrush
SetWindowOrgEx
SetWindowExtEx
SetViewportExtEx
PolyBezier
Polyline
Polygon
LPtoDP
DPtoLP
CreatePolygonRgn
ExtTextOutW
ModifyWorldTransform
SetWorldTransform
GetWorldTransform
SetStretchBltMode
SetROP2
StretchDIBits
StretchBlt
SetPolyFillMode
SetPixel
GetLayout
SetLayout
SetMapMode
SetGraphicsMode
ExtSelectClipRgn
SelectClipRgn
RoundRect
Rectangle
PolyPolygon
Pie
ole32.dll CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
OleInitialize
OleIsCurrentClipboard
OleFlushClipboard
OleGetClipboard
OleSetClipboard
OleUninitialize
DoDragDrop
ReleaseStgMedium
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
CoTaskMemAlloc
CoTaskMemFree
OLEAUT32.dll VariantInit
SysFreeString
SysAllocStringByteLen
SysAllocString
VariantCopy
SysStringLen
SafeArrayUnlock
SafeArrayLock
VarBstrFromCy
SafeArrayGetVartype
SafeArrayDestroy
SafeArrayCreate
VariantChangeType
SystemTimeToVariantTime
VariantClear
bcrypt.dll BCryptGenRandom
WS2_32.dll getsockopt
sendto
inet_pton
recvfrom
closesocket
recv
htons
htonl
WSAGetLastError
bind
setsockopt
connect
shutdown
socket
WSAStartup
inet_addr
WSACleanup
send
COMCTL32.dll ImageList_GetImageCount
ImageList_Draw
ImageList_GetIconSize
#16
ImageList_Create
ImageList_Destroy
ImageList_Add
ImageList_SetBkColor
ImageList_Replace
ImageList_GetImageInfo
#17
RPCRT4.dll UuidToStringW
RpcStringFreeW
OLEACC.dll LresultFromObject
CreateStdAccessibleObject
UxTheme.dll GetCurrentThemeName
IsThemePartDefined
GetThemeSysColor
GetThemeInt
GetThemePartSize
IsAppThemed
IsThemeActive
SetWindowTheme
GetThemeMargins
GetThemeFont
DrawThemeParentBackground
GetThemeColor
IsThemeBackgroundPartiallyTransparent
GetThemeBackgroundContentRect
GetThemeSysFont
DrawThemeBackground
OpenThemeData
CloseThemeData
GetThemeBackgroundExtent
MSVCP140.dll ?_Winerror_map@std@@YAHH@Z
?_Xbad_function_call@std@@YAXXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Syserror_map@std@@YAPEBDH@Z
_Mtx_lock
_Cnd_do_broadcast_at_thread_exit
_Thrd_id
_Query_perf_counter
_Thrd_join
_Mtx_unlock
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z
?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z
?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?_Getcat@?$time_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?put@?$time_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@QEBA?AV?$ostreambuf_iterator@DU?$char_traits@D@std@@@2@V32@AEAVios_base@2@DPEBUtm@@PEBD3@Z
?_Xout_of_range@std@@YAXPEBD@Z
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
?width@ios_base@std@@QEAA_J_J@Z
?width@ios_base@std@@QEBA_JXZ
?flags@ios_base@std@@QEBAHXZ
?good@ios_base@std@@QEBA_NXZ
?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?widen@?$ctype@_W@std@@QEBA_WD@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?id@?$ctype@_W@std@@2V0locale@2@A
?__ExceptionPtrCreate@@YAXPEAX@Z
?__ExceptionPtrDestroy@@YAXPEAX@Z
?__ExceptionPtrCopy@@YAXPEAXPEBX@Z
?__ExceptionPtrAssign@@YAXPEAXPEBX@Z
?__ExceptionPtrToBool@@YA_NPEBX@Z
?__ExceptionPtrCurrentException@@YAXPEAX@Z
?__ExceptionPtrRethrow@@YAXPEBX@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAJ@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAN@Z
?seekpos@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA?AV?$fpos@U_Mbstatet@@@2@V32@H@Z
?seekoff@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA?AV?$fpos@U_Mbstatet@@@2@_JHH@Z
?underflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?pbackfail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHH@Z
?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A
?_Xbad_alloc@std@@YAXXZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?uncaught_exceptions@std@@YAHXZ
?id@?$time_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@2V0locale@2@A
?_Throw_Cpp_error@std@@YAXH@Z
??0_Lockit@std@@QEAA@H@Z
?_Id_cnt@id@locale@std@@0HA
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?uncaught_exception@std@@YA_NXZ
??1_Lockit@std@@QEAA@XZ
_Query_perf_frequency
?_Xlength_error@std@@YAXPEBD@Z
?_Random_device@std@@YAIXZ
SHLWAPI.dll SHAutoComplete
ntdll.dll RtlVirtualUnwind
NtQueryDirectoryObject
RtlInitUnicodeString
NtOpenDirectoryObject
RtlLookupFunctionEntry
RtlCaptureContext
MSIMG32.dll AlphaBlend
GradientFill
VCRUNTIME140_1.dll __CxxFrameHandler4
VCRUNTIME140.dll __intrinsic_setjmp
__current_exception_context
__current_exception
longjmp
memcmp
__C_specific_handler
_set_se_translator
strrchr
wcschr
memset
memmove
memcpy
_CxxThrowException
wcsstr
__RTtypeid
__std_type_info_compare
_purecall
strchr
strstr
__std_terminate
__std_exception_copy
__std_exception_destroy
__RTDynamicCast
api-ms-win-crt-runtime-l1-1-0.dll terminate
_invalid_parameter_noinfo
abort
_beginthreadex
_invoke_watson
_invalid_parameter_noinfo_noreturn
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
exit
_cexit
_seh_filter_exe
_set_app_type
_get_narrow_winmain_command_line
_initterm
_register_thread_local_exe_atexit_callback
_c_exit
_initterm_e
_exit
_errno
api-ms-win-crt-heap-l1-1-0.dll _callnewh
free
calloc
malloc
_set_new_mode
realloc
api-ms-win-crt-stdio-l1-1-0.dll __p__commode
_open_osfhandle
_fseeki64
_ftelli64
fread
fclose
setbuf
fopen
ferror
fwrite
__stdio_common_vfwprintf
__stdio_common_vsprintf_p
__stdio_common_vsscanf
__stdio_common_vfprintf
__acrt_iob_func
feof
clearerr
_wfopen
_telli64
_lseeki64
_write
_read
_close
fflush
_get_osfhandle
_fileno
_get_stream_buffer_pointers
fsetpos
ungetc
setvbuf
fputc
__stdio_common_vswscanf
_wsopen_dispatch
fgetc
fseek
__stdio_common_vswprintf
_set_fmode
fgetpos
__stdio_common_vswprintf_p
__stdio_common_vsprintf
api-ms-win-crt-time-l1-1-0.dll _localtime64
_gmtime64_s
_get_timezone
_time64
_tzset
_localtime64_s
_gmtime64
_mktime64
wcsftime
api-ms-win-crt-filesystem-l1-1-0.dll remove
_wrename
_wremove
_lock_file
_unlock_file
api-ms-win-crt-utility-l1-1-0.dll bsearch
rand
qsort
api-ms-win-crt-string-l1-1-0.dll isspace
toupper
tolower
iswxdigit
iswalnum
iswalpha
iswdigit
iswprint
wcsncpy
strncpy
_strdup
strcmp
strncmp
_wcsicmp
wcspbrk
towlower
towupper
iswspace
api-ms-win-crt-convert-l1-1-0.dll _wtoi
strtoull
wcstod
_wcstoui64
strtoll
strtod
atoi
_wcstoi64
_wcstod_l
atof
_wtol
strtol
wcstoul
wcstol
api-ms-win-crt-locale-l1-1-0.dll _free_locale
_create_locale
setlocale
___lc_codepage_func
localeconv
_configthreadlocale
api-ms-win-crt-math-l1-1-0.dll sin
acosf
atan2f
floor
cos
ceil
ceilf
cosf
fmod
floorf
fmodf
exp
log
pow
lround
sinf
sqrtf
tanf
atan2
__setusermatherr
lroundf
sqrt
_dsign
_fdopen
_dclass
api-ms-win-crt-environment-l1-1-0.dll _wgetcwd
_wgetenv
getenv
WINSPOOL.DRV ClosePrinter
DocumentPropertiesW
GetPrinterW
OpenPrinterW
COMDLG32.dll CommDlgExtendedError
PrintDlgW
PageSetupDlgW
GetOpenFileNameW
GetSaveFileNameW
ChooseFontW
ADVAPI32.dll GetUserNameW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
SHELL32.dll DragFinish
DragAcceptFiles
ShellExecuteExW
DragQueryPoint
#6
CommandLineToArgvW
DragQueryFileW
ExtractIconW
SHGetFolderPathW
SHGetFileInfoW
ExtractIconExW

Delayed Imports

1

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x275
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.5089
Detected Filetype PNG graphic file
MD5 df79079d4f762a2512a7819b507cb5d9
SHA1 3c24dc9679249dc81a35d88b641af015c0648870
SHA256 7a208584b4d241bc20a27145bfdf333aedc4697b3d137a6edf69e2094a4a9ee9
SHA3 29e76d355f71a2c87ad58c72b1bd560d165d63da9748f1cde8e6d241176ca3ae

2

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x489
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.77397
Detected Filetype PNG graphic file
MD5 59e5063f60a3514ad624762a8f5e63df
SHA1 93238defccdd7480a14aea92e82068bf1152e714
SHA256 b3b210ac2487614f4450c327ec49e4cfc85a8fb7358251ecd769cf45e5a61790
SHA3 36f4b5b4076ef36d8461ee35a7a682bac23eddf1d92153a3844804d43db0c264

3

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x72b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.81103
Detected Filetype PNG graphic file
MD5 00482ae2938b00e77d22b026ea58b6c9
SHA1 6acd2179c7a9883b0a3edc8b8af133cdff6f896d
SHA256 7654eba414115352d4d4475364cc70397a1af94d0bf9575213db70b72baf66f0
SHA3 10a70130a012723a8a17a8f872bc96baec84518ffccfdf2c5b2992c11bc82540

4

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0xd6a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.89803
Detected Filetype PNG graphic file
MD5 d1ab67f7132e37dc610766bffae3e443
SHA1 bf46e573925c2afe8a1f91424df712d3ff5ed3a9
SHA256 c0e6cb7603f39e4097095566fd3987d9248fb3c6a10a24171132ac8856484bfa
SHA3 c9f05ec0be96b7559879ee794ce700e3096658321ab54e33e7e3c93e0f65adbd

5

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x15a1
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.92895
Detected Filetype PNG graphic file
MD5 c1d731acb48b405ea6aa68aefda8a8c8
SHA1 96763bd3c8b5106b226d973c9ed42acc7b94c337
SHA256 d289e91e68236c014d103f63216e7de64bb9a077ccf928da7037b730105306de
SHA3 aa48e055d8e2bb680c675d1bdce10df1bc6bb18a2cea22c25ca9bab5d5c985a9

6

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x446d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.97827
Detected Filetype PNG graphic file
MD5 c61e333ae56dfa27488c638c3f09db5a
SHA1 3800d113a15bbfa512e6d97be4648a8105b67762
SHA256 37ae08030a4f1c49db71d444e14290870b9640ec61a35aa9e0a5717acff54f8f
SHA3 3344996f9877c27320992ef5db33319a6ee4dcbccbaa34fa6dd1c9ef38aada9a

7

Type RT_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0xf312
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.99014
Detected Filetype PNG graphic file
MD5 0b74b0c95bd45ada368309b163646203
SHA1 92adc6799b2aa2af5f5c6155ccd73ff53ff12c79
SHA256 e9874bd199fbe1501504fc19db56f2b92a480837429a75c6393d096ae8adc8ba
SHA3 dffdd7b207c06d286ea67bd7ad53154ec867009bbbcf080c24c53ac6ad8f25bd

101

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x1ac
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.79472
Detected Filetype PNG graphic file
MD5 84780bff091b00bdd5314c75d7e42448
SHA1 5c7f57796b4ddd93fd69f39f11f509a1f213ef62
SHA256 6dfff3f2b61599f3d004240dea8cb5dd57656abbcda054038d4cd0f3f7d504f1
SHA3 f0927f7226195bdeda2b1d648ddad9ac9913af75a5c6f5c7c6d50869da1f8d5c

102

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x1ad
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.02473
Detected Filetype PNG graphic file
MD5 e62d26c40d6d553d53c11e7d44f1715e
SHA1 e3000e87d9e36c149ef4c52c821a1ed87ff880fd
SHA256 dd88c36d2160cc1361ca753fc8501f227312cc8478da9a9b19013c5d46c884dc
SHA3 204b9fee0fe78dad2ab020ae7723890c95e1f7f0cfd065760bd0c47c5000b6ed

103

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x193
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.6224
Detected Filetype PNG graphic file
MD5 9447963b1df99a56b2a7d777c4bba949
SHA1 f81589dedbe8d44fae95ffbabd957d260dd0f199
SHA256 9ab1c2155f95aa0c2b2c7c9823b47103babafc959c8e19d539f5a820663f05ee
SHA3 dd4a4535641c6bb07b73253805a84129a3e13f832ceea425457cc83322dd542e

113

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0xcf
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.01163
Detected Filetype PNG graphic file
MD5 aee4958004a064cf2ca9353ec8fc0f59
SHA1 9ba49f45320d1c6cb4764a52065d288bf84b45ca
SHA256 2ed00ddb90d271cb235a36747f8e4085d3b76e15f03c74218bc5807323f2576d
SHA3 9b0c941114dbcc4d95080073254332a04a198041029d802add2a8c9772c64d05

114

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0xe8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.3707
Detected Filetype PNG graphic file
MD5 234e6e9fb4b5c01d08272c0128e8e4d2
SHA1 4bf6d0ceb7bdc48f056d28ff3d27cf29c1d76f63
SHA256 9941f03d31821d8098a1225bb5725c72f7f23dcccc9947f27c2296c59ff22dce
SHA3 911f485c2acb285fe5aac681ce0e863b2ad088ae0198303ad99485b7d08cfa40

115

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x1a9
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.18877
Detected Filetype PNG graphic file
MD5 0407209a9572a66978aab52b2a925933
SHA1 c0cbd2bb84adc4b8704285d75a228864c5ae3a7a
SHA256 95e3181a720339d739185928651a7ec603786b47b43b6276e357f6ba058c27da
SHA3 60b3504104fd0ff497d44a46a75e49c39dc8d267364ceadfdac31dc7f4234004

116

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x267
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.50815
Detected Filetype PNG graphic file
MD5 b87812db444d6dbe6209ee9f9b936e8d
SHA1 a11873b8a9880436152505a7def6c3916f46a173
SHA256 0a71bd53c56994c8e463727c21b594ea93bd40824a1c928a9922c57b1680588b
SHA3 a32af21b1a0bc28394ac24da6b4936c77b78d70d117842cef5a84f09cbbcd8d1

117

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x14c4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.92852
Detected Filetype PNG graphic file
MD5 b7c97f9e487c0b414015b4b09db34cfb
SHA1 376a10bb3f81af0f2c90f7be941ffc8f46d47fa9
SHA256 f08a87e7de3f67d4058841da6525dffcc7f3e8b8143f40ca4075694c4c2a054a
SHA3 f5825dd5fa08b24d90d30319bee589831ed4d99b33f5b0aaf2fec493b3ec0fd6

118

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x1542
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.92938
Detected Filetype PNG graphic file
MD5 ead65379f20a7c3e90475910eb75518a
SHA1 1b4caeb63ddbbdcd1aae42895b856966200ff160
SHA256 66e63725b38ac9c3779232d7a679daed5c551b131e391aefc623e076d5aeceee
SHA3 113236cee4809565193e05af4163f5cc228e6529372dc16ca3de249eef6c6b56

120

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x949
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.90342
Detected Filetype PNG graphic file
MD5 3caa1c2b4e6124efd459419727f981e4
SHA1 730ea14d5ca1c0902c37939c76453f6cbf82d59b
SHA256 73efb2b348f30a05647c51f01ea527c3153d2acc92cf59aa9650c0b42193ddf8
SHA3 86b65bbe689d03ba684d22479db9556a30900bedb9e002ccce4d8d3dc2170f56

121

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0xa20
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.88563
Detected Filetype PNG graphic file
MD5 647130cd3907c680ea18fb18a7521584
SHA1 cf8db1662a81928f0abb76dff7bc7738f997241d
SHA256 ea5c2bddec50a1742d416442e11a3779ca095450797ccf016161eac9b7d0e841
SHA3 21093aa82653b2fa68fcfff0b10d91c55494675116a4ddc1a05d31407edeacc2

122

Type RT_RCDATA
Language Russian - Russia
Codepage UNKNOWN
Size 0x472999
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.96334
Detected Filetype Zip Compressed Archive
MD5 6ab763432dc6b3063d38e40f50270e51
SHA1 d82f14f0165dd4c280691f48d00c5de87759fa98
SHA256 8a30f4e8dfbfeda9b9a9307affd32afcbc958262ebee7a080c65ecabf1c94127
SHA3 888ef4e4989be443c35a1e181fc7d63ab1e6d5755733c3e5402b2bde40d00c7d

119

Type RT_GROUP_ICON
Language Russian - Russia
Codepage UNKNOWN
Size 0x68
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.08459
Detected Filetype Icon file
MD5 94a9a5b4ce86874f7730239d34d80bf7
SHA1 63005d952a314561713f8e2b78689366861cbf94
SHA256 7c38255d9b5d76b5aefabddc2887cf76ded24057bca1ed8efbf55f4d45a30636
SHA3 c58421559d0eeaaa9a9356188d21a3c069d06cb0ce4620d9414bbea879c4e02a

1 (#2)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x2d4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.7816
MD5 19c88f8b9807e50f5d6ce68ee876a578
SHA1 95db9afaaa1448628d6972b90e86927630636ba6
SHA256 9672049d94bcd83926b406da350c7c0e0edf322ba6a309f8362da4584bcee65e
SHA3 f7427a739c46ab2f703ab82d436b633d8ddf00e324eaab898e599df6fe5ea1f5

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-Apr-23 04:28:05
Version 0.0
SizeofData 79
AddressOfRawData 0x7d0880
PointerToRawData 0x7cf280
Referenced File D:\!Projects_c++\GitPixelRotation\Build\PR_Release.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2026-Apr-23 04:28:05
Version 0.0
SizeofData 20
AddressOfRawData 0x7d08d0
PointerToRawData 0x7cf2d0

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2026-Apr-23 04:28:05
Version 0.0
SizeofData 912
AddressOfRawData 0x7d08e4
PointerToRawData 0x7cf2e4

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2026-Apr-23 04:28:05
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

StartAddressOfRawData 0x1407d0c98
EndAddressOfRawData 0x1407d0cac
AddressOfIndex 0x1408bc610
AddressOfCallbacks 0x140612270
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_8BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x14087d0c0

RICH Header

XOR Key 0x8fa1262f
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 22
Imports (2207) 2
253 (34918) 1
ASM objects (34918) 4
C objects (34918) 10
C++ objects (34918) 46
Imports (34918) 6
C objects (33523) 100
C++ objects (33523) 297
C objects (33140) 10
C objects (CVTCIL) (33140) 1
Imports (33140) 39
Total imports 988
C++ objects (LTCG) (35207) 120
Resource objects (35207) 1
151 1
Linker (35207) 1

Errors

Leave a comment

No comments yet.