988440c99a6e8726ecd5c49a4052a160d430985c34e03e8172278d7204fa4a07

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2024-Jan-24 16:02:41
Detected languages English - United States
Debug artifacts C:\projects\src\out\Default\vulkan-1.dll.pdb
FileDescription 1.3.268.Dev Build
FileVersion Vulkan Loader - Dev Build
LegalCopyright Copyright (C) 2015-2023
ProductName Vulkan Runtime
ProductVersion Vulkan Loader - Dev Build

Plugin Output

Suspicious The PE is possibly packed. Unusual section name found: .gxfg
Unusual section name found: .retplne
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryA
  • LoadLibraryExW
  • LoadLibraryW
Can access the registry:
  • RegCloseKey
  • RegEnumValueA
  • RegOpenKeyExA
  • RegQueryValueExA
Functions related to the privilege level:
  • OpenProcessToken
Safe VirusTotal score: 0/72 (Scanned on 2026-03-05 04:32:26) All the AVs think this file is safe.

Hashes

MD5 5b542cdbadd0f4bfe7cf87c6a10061a0
SHA1 c1e0e3ce1808d08947b7ab4d382155dfd9814245
SHA256 988440c99a6e8726ecd5c49a4052a160d430985c34e03e8172278d7204fa4a07
SHA3 62c7991027730f9ef6b2ff9daaf7e6cc3d7b10286bac8c48ceedd9866ac10207
SSDeep 24576:gy+lCO+5ia/1DW6pb9MLtX6Z5WdDYsH26g3P0zAk7o36:gymVqXpbId6Z5WdDYsH26g3P0zAk7oq
Imports Hash 49ed29c3ff417b26c7cd92ecc9b7dcb3

DOS Header

e_magic MZ
e_cblp 0x78
e_cp 0x1
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0
e_ss 0
e_sp 0
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x78

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 11
TimeDateStamp 2024-Jan-24 16:02:41
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x9a000
SizeOfInitializedData 0x4ce00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000000000005E8A0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x180000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.2
ImageVersion 0.0
SubsystemVersion 5.2
Win32VersionValue 0
SizeOfImage 0xf1000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 39a5274b8c3f89c21d0d4859b9f57e33
SHA1 9e9d3c66407f9bb1ec339786224cef2056a2c08d
SHA256 1063b4068bfd5b6ea5e71dd35e5c8003ff6c248a3dc017e968030756301a0850
SHA3 554ce90184dd7daacfdbd555071df90f676640507c00039a805ee92616bf4015
VirtualSize 0x99e1b
VirtualAddress 0x1000
SizeOfRawData 0x9a000
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.44375

.rdata

MD5 c6267496a9f664ef34173828a237ad6d
SHA1 2630d2cb97b884fca232434437f51c0937ebdb54
SHA256 0f3e93f795ed0611372a806cf7c97a6eec6fae35ac2c841e94a0ca3c68513488
SHA3 c39c7a7e69e414d099b7bd54d035421d74a01bc15ca72df255562280b287d6b0
VirtualSize 0x3f71c
VirtualAddress 0x9b000
SizeOfRawData 0x3f800
PointerToRawData 0x9a400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.87432

.data

MD5 55175ea57dd258562f68e96cb3c20e5d
SHA1 169e77f8dbcdac67173bd8f7addd494ba9a85bc4
SHA256 29aeb511fdb8adb538ddfb6019608a7ef0afd768c141ed63bdd89b569de7d681
SHA3 8f49a4640c0ad24db224417e40def5ca09b9add133677089115a1bfa56b7c0e5
VirtualSize 0x4d08
VirtualAddress 0xdb000
SizeOfRawData 0x2200
PointerToRawData 0xd9c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 3.62722

.pdata

MD5 e6bd9f1c02d8250257c174ba9d3fc441
SHA1 48123d77d49b1f30ec0dd24fa5e7eda7bfdbdea0
SHA256 b70dd4f86b598de6b790f41261ab08e4a9cac86d7788fbdc098f164148bde792
SHA3 4b9d67961a76843b47cfb922ca11afb765d0b6da84dac8c50833ad0013961592
VirtualSize 0x7080
VirtualAddress 0xe0000
SizeOfRawData 0x7200
PointerToRawData 0xdbe00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.72885

.00cfg

MD5 8f89bc51167c4fed930f96226210b2ae
SHA1 f200fa40b4a0de3884211d553046e8dcf091d010
SHA256 ef42a3363c9f657dbb40708921d424fbeedb97232efc20311a4151ca6638d0df
SHA3 8b1a19b7de21be254f17d2c6882e2a030727da4b7820bbe9948d638275fefcb4
VirtualSize 0x38
VirtualAddress 0xe8000
SizeOfRawData 0x200
PointerToRawData 0xe3000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.49651

.gxfg

MD5 94ca2e139bfd7f6f19c6eaac75a820ca
SHA1 3cdcf8d4bf6537ef2e3da81440f4408786870d97
SHA256 bdda22e73dd95ec5ce6cb0b195e0de9fbdaa2f829016b0c342aa4229a79c6d77
SHA3 22bf8877cbc18280f7d16fe2486ea579a9301ea2f5d60df8d025df318f97c88a
VirtualSize 0x2950
VirtualAddress 0xe9000
SizeOfRawData 0x2a00
PointerToRawData 0xe3200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.17701

.retplne

MD5 8c950f651287cbc1296bcb4e8cd7e990
SHA1 018fcd27ff9f8487c792aecf902a516f00c03d18
SHA256 15163cfff9feb802c2e7699f17e01245e54304d28a1650c79f9237de661774e0
SHA3 5b66ec3ad2d5f760e44bb32dd7acc837d5364d21154bccafc1c375d2993cd545
VirtualSize 0x8c
VirtualAddress 0xec000
SizeOfRawData 0x200
PointerToRawData 0xe5c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics (EMPTY)
Entropy 1.05058

.tls

MD5 1f354d76203061bfdd5a53dae48d5435
SHA1 aa0d33a0c854e073439067876e932688b65cb6a9
SHA256 4c6474903705cb450bb6434c29e8854f17d8324efca1fdb9ee9008599060883a
SHA3 991fbbd46bbd69198269fe6c247d440e0f8a7d38259b7a1e04b74790301d1d2b
VirtualSize 0x9
VirtualAddress 0xed000
SizeOfRawData 0x200
PointerToRawData 0xe5e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.0203931

_RDATA

MD5 f23e7f882a1b4be04a49c9619e195b70
SHA1 474ae89df58afda627d587d62db2a3eba1f4e3b2
SHA256 1c45e4412e7e638d278ccdb1ed0074e84f807b2ae343ccdcf559582facd6992f
SHA3 f27df1b6ea85494f57eb33056d1ba5c63c613393861be3de7f8b5017ee1722af
VirtualSize 0x15c
VirtualAddress 0xee000
SizeOfRawData 0x200
PointerToRawData 0xe6000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.26477

.rsrc

MD5 684b50fcdb5f538552702a90d0827e3a
SHA1 df52cbef806ece69f8058cd12c6a904191fa5f4d
SHA256 3689c02dddc1452b36f85ed8a54f631130cf177aae6d531a1102f1c4199c9998
SHA3 efa6dfa649b1c78d2c7dd46b87204912e80f435d7462692e75cd3730fbd425ca
VirtualSize 0x2c8
VirtualAddress 0xef000
SizeOfRawData 0x400
PointerToRawData 0xe6200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.44919

.reloc

MD5 fe0b0f688387ee4eb89572e654a262b1
SHA1 a094cb8f9ec2958b94da6e40efa1de5af8437864
SHA256 732df37a4d8746356139c8bef4e40eeeb429f80187c0f1e80176da75dad75f6b
SHA3 fe6482bef62b8aaf204ff0a07f62cc413fa0ce9488fc7a5e2da1d1e1eae3aa83
VirtualSize 0xd4c
VirtualAddress 0xf0000
SizeOfRawData 0xe00
PointerToRawData 0xe6600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.3395

Imports

KERNEL32.dll AcquireSRWLockExclusive
CloseHandle
CompareStringW
CreateEventW
CreateFileW
DeleteCriticalSection
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
FileTimeToSystemTime
FindClose
FindFirstFileExW
FindNextFileW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetFileAttributesExW
GetFileSizeEx
GetFileType
GetLastError
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedFlushSList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
IsWow64Process
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
ReleaseSRWLockExclusive
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableW
SetEvent
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SleepConditionVariableSRW
SystemTimeToTzSpecificLocalTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObjectEx
WakeAllConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
ADVAPI32.dll GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
OpenProcessToken
RegCloseKey
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
CFGMGR32.dll CM_Get_Child
CM_Get_DevNode_Registry_PropertyW
CM_Get_DevNode_Status
CM_Get_Device_IDW
CM_Get_Device_ID_ListW
CM_Get_Device_ID_List_SizeW
CM_Get_Sibling
CM_Locate_DevNodeW
CM_Open_DevNode_Key

Delayed Imports

vkAcquireNextImage2KHR

Ordinal 1
Address 0x44470

vkAcquireNextImageKHR

Ordinal 2
Address 0x43300

vkAllocateCommandBuffers

Ordinal 3
Address 0x31b30

vkAllocateDescriptorSets

Ordinal 4
Address 0x34730

vkAllocateMemory

Ordinal 5
Address 0x332c0

vkBeginCommandBuffer

Ordinal 6
Address 0x34bb0

vkBindBufferMemory

Ordinal 7
Address 0x334f0

vkBindBufferMemory2

Ordinal 8
Address 0x36320

vkBindImageMemory

Ordinal 9
Address 0x33540

vkBindImageMemory2

Ordinal 10
Address 0x36380

vkCmdBeginQuery

Ordinal 11
Address 0x35990

vkCmdBeginRenderPass

Ordinal 12
Address 0x35bd0

vkCmdBeginRenderPass2

Ordinal 13
Address 0x36920

vkCmdBeginRendering

Ordinal 14
Address 0x36dd0

vkCmdBindDescriptorSets

Ordinal 15
Address 0x35090

vkCmdBindIndexBuffer

Ordinal 16
Address 0x350f0

vkCmdBindPipeline

Ordinal 17
Address 0x34cd0

vkCmdBindVertexBuffers

Ordinal 18
Address 0x35150

vkCmdBindVertexBuffers2

Ordinal 19
Address 0x36e10

vkCmdBlitImage

Ordinal 20
Address 0x354b0

vkCmdBlitImage2

Ordinal 21
Address 0x36e50

vkCmdClearAttachments

Ordinal 22
Address 0x35750

vkCmdClearColorImage

Ordinal 23
Address 0x35690

vkCmdClearDepthStencilImage

Ordinal 24
Address 0x356f0

vkCmdCopyBuffer

Ordinal 25
Address 0x353f0

vkCmdCopyBuffer2

Ordinal 26
Address 0x36e90

vkCmdCopyBufferToImage

Ordinal 27
Address 0x35510

vkCmdCopyBufferToImage2

Ordinal 28
Address 0x36ed0

vkCmdCopyImage

Ordinal 29
Address 0x35450

vkCmdCopyImage2

Ordinal 30
Address 0x36f10

vkCmdCopyImageToBuffer

Ordinal 31
Address 0x35570

vkCmdCopyImageToBuffer2

Ordinal 32
Address 0x36f50

vkCmdCopyQueryPoolResults

Ordinal 33
Address 0x35b10

vkCmdDispatch

Ordinal 34
Address 0x35330

vkCmdDispatchBase

Ordinal 35
Address 0x364a0

vkCmdDispatchIndirect

Ordinal 36
Address 0x35390

vkCmdDraw

Ordinal 37
Address 0x351b0

vkCmdDrawIndexed

Ordinal 38
Address 0x35210

vkCmdDrawIndexedIndirect

Ordinal 39
Address 0x352d0

vkCmdDrawIndexedIndirectCount

Ordinal 40
Address 0x36aa0

vkCmdDrawIndirect

Ordinal 41
Address 0x35270

vkCmdDrawIndirectCount

Ordinal 42
Address 0x36a40

vkCmdEndQuery

Ordinal 43
Address 0x359f0

vkCmdEndRenderPass

Ordinal 44
Address 0x35c90

vkCmdEndRenderPass2

Ordinal 45
Address 0x369e0

vkCmdEndRendering

Ordinal 46
Address 0x36f90

vkCmdExecuteCommands

Ordinal 47
Address 0x35cf0

vkCmdFillBuffer

Ordinal 48
Address 0x35630

vkCmdNextSubpass

Ordinal 49
Address 0x35c30

vkCmdNextSubpass2

Ordinal 50
Address 0x36980

vkCmdPipelineBarrier

Ordinal 51
Address 0x35930

vkCmdPipelineBarrier2

Ordinal 52
Address 0x36fd0

vkCmdPushConstants

Ordinal 53
Address 0x35b70

vkCmdResetEvent

Ordinal 54
Address 0x35870

vkCmdResetEvent2

Ordinal 55
Address 0x37010

vkCmdResetQueryPool

Ordinal 56
Address 0x35a50

vkCmdResolveImage

Ordinal 57
Address 0x357b0

vkCmdResolveImage2

Ordinal 58
Address 0x37050

vkCmdSetBlendConstants

Ordinal 59
Address 0x34eb0

vkCmdSetCullMode

Ordinal 60
Address 0x37090

vkCmdSetDepthBias

Ordinal 61
Address 0x34e50

vkCmdSetDepthBiasEnable

Ordinal 62
Address 0x370d0

vkCmdSetDepthBounds

Ordinal 63
Address 0x34f10

vkCmdSetDepthBoundsTestEnable

Ordinal 64
Address 0x37110

vkCmdSetDepthCompareOp

Ordinal 65
Address 0x37150

vkCmdSetDepthTestEnable

Ordinal 66
Address 0x37190

vkCmdSetDepthWriteEnable

Ordinal 67
Address 0x371d0

vkCmdSetDeviceMask

Ordinal 68
Address 0x36440

vkCmdSetEvent

Ordinal 69
Address 0x35810

vkCmdSetEvent2

Ordinal 70
Address 0x37210

vkCmdSetFrontFace

Ordinal 71
Address 0x37250

vkCmdSetLineWidth

Ordinal 72
Address 0x34df0

vkCmdSetPrimitiveRestartEnable

Ordinal 73
Address 0x37290

vkCmdSetPrimitiveTopology

Ordinal 74
Address 0x372d0

vkCmdSetRasterizerDiscardEnable

Ordinal 75
Address 0x37310

vkCmdSetScissor

Ordinal 76
Address 0x34d90

vkCmdSetScissorWithCount

Ordinal 77
Address 0x37350

vkCmdSetStencilCompareMask

Ordinal 78
Address 0x34f70

vkCmdSetStencilOp

Ordinal 79
Address 0x37390

vkCmdSetStencilReference

Ordinal 80
Address 0x35030

vkCmdSetStencilTestEnable

Ordinal 81
Address 0x373d0

vkCmdSetStencilWriteMask

Ordinal 82
Address 0x34fd0

vkCmdSetViewport

Ordinal 83
Address 0x34d30

vkCmdSetViewportWithCount

Ordinal 84
Address 0x37410

vkCmdUpdateBuffer

Ordinal 85
Address 0x355d0

vkCmdWaitEvents

Ordinal 86
Address 0x358d0

vkCmdWaitEvents2

Ordinal 87
Address 0x37450

vkCmdWriteTimestamp

Ordinal 88
Address 0x35ab0

vkCmdWriteTimestamp2

Ordinal 89
Address 0x37490

vkCreateBuffer

Ordinal 90
Address 0x33d10

vkCreateBufferView

Ordinal 91
Address 0x33dd0

vkCreateCommandPool

Ordinal 92
Address 0x34a30

vkCreateComputePipelines

Ordinal 93
Address 0x34310

vkCreateDescriptorPool

Ordinal 94
Address 0x34610

vkCreateDescriptorSetLayout

Ordinal 95
Address 0x34550

vkCreateDescriptorUpdateTemplate

Ordinal 96
Address 0x367a0

vkCreateDevice

Ordinal 97
Address 0x32fa0

vkCreateDisplayModeKHR

Ordinal 98
Address 0x43c10

vkCreateDisplayPlaneSurfaceKHR

Ordinal 99
Address 0x43dd0

vkCreateEvent

Ordinal 100
Address 0x33a10

vkCreateFence

Ordinal 101
Address 0x33770

vkCreateFramebuffer

Ordinal 102
Address 0x34850

vkCreateGraphicsPipelines

Ordinal 103
Address 0x342b0

vkCreateHeadlessSurfaceEXT

Ordinal 104
Address 0x43690

vkCreateImage

Ordinal 105
Address 0x33e90

vkCreateImageView

Ordinal 106
Address 0x33fb0

vkCreateInstance

Ordinal 107
Address 0x32480

vkCreatePipelineCache

Ordinal 108
Address 0x34130

vkCreatePipelineLayout

Ordinal 109
Address 0x343d0

vkCreatePrivateDataSlot

Ordinal 110
Address 0x374d0

vkCreateQueryPool

Ordinal 111
Address 0x33bf0

vkCreateRenderPass

Ordinal 112
Address 0x34910

vkCreateRenderPass2

Ordinal 113
Address 0x368c0

vkCreateSampler

Ordinal 114
Address 0x34490

vkCreateSamplerYcbcrConversion

Ordinal 115
Address 0x36680

vkCreateSemaphore

Ordinal 116
Address 0x33950

vkCreateShaderModule

Ordinal 117
Address 0x34070

vkCreateSharedSwapchainsKHR

Ordinal 118
Address 0x44000

vkCreateSwapchainKHR

Ordinal 119
Address 0x43070

vkCreateWin32SurfaceKHR

Ordinal 120
Address 0x433c0

vkDestroyBuffer

Ordinal 121
Address 0x33d70

vkDestroyBufferView

Ordinal 122
Address 0x33e30

vkDestroyCommandPool

Ordinal 123
Address 0x34a90

vkDestroyDescriptorPool

Ordinal 124
Address 0x34670

vkDestroyDescriptorSetLayout

Ordinal 125
Address 0x345b0

vkDestroyDescriptorUpdateTemplate

Ordinal 126
Address 0x36800

vkDestroyDevice

Ordinal 127
Address 0x31a30

vkDestroyEvent

Ordinal 128
Address 0x33a70

vkDestroyFence

Ordinal 129
Address 0x337d0

vkDestroyFramebuffer

Ordinal 130
Address 0x348b0

vkDestroyImage

Ordinal 131
Address 0x33ef0

vkDestroyImageView

Ordinal 132
Address 0x34010

vkDestroyInstance

Ordinal 133
Address 0x32af0

vkDestroyPipeline

Ordinal 134
Address 0x34370

vkDestroyPipelineCache

Ordinal 135
Address 0x34190

vkDestroyPipelineLayout

Ordinal 136
Address 0x34430

vkDestroyPrivateDataSlot

Ordinal 137
Address 0x37510

vkDestroyQueryPool

Ordinal 138
Address 0x33c50

vkDestroyRenderPass

Ordinal 139
Address 0x34970

vkDestroySampler

Ordinal 140
Address 0x344f0

vkDestroySamplerYcbcrConversion

Ordinal 141
Address 0x366e0

vkDestroySemaphore

Ordinal 142
Address 0x339b0

vkDestroyShaderModule

Ordinal 143
Address 0x340d0

vkDestroySurfaceKHR

Ordinal 144
Address 0x42b00

vkDestroySwapchainKHR

Ordinal 145
Address 0x43240

vkDeviceWaitIdle

Ordinal 146
Address 0x33270

vkEndCommandBuffer

Ordinal 147
Address 0x34c10

vkEnumerateDeviceExtensionProperties

Ordinal 148
Address 0x33030

vkEnumerateDeviceLayerProperties

Ordinal 149
Address 0x330c0

vkEnumerateInstanceExtensionProperties

Ordinal 150
Address 0x31c30

vkEnumerateInstanceLayerProperties

Ordinal 151
Address 0x31ef0

vkEnumerateInstanceVersion

Ordinal 152
Address 0x321b0

vkEnumeratePhysicalDeviceGroups

Ordinal 153
Address 0x35d50

vkEnumeratePhysicalDevices

Ordinal 154
Address 0x32c90

vkFlushMappedMemoryRanges

Ordinal 155
Address 0x33400

vkFreeCommandBuffers

Ordinal 156
Address 0x34b50

vkFreeDescriptorSets

Ordinal 157
Address 0x34790

vkFreeMemory

Ordinal 158
Address 0x33310

vkGetBufferDeviceAddress

Ordinal 159
Address 0x36c20

vkGetBufferMemoryRequirements

Ordinal 160
Address 0x33590

vkGetBufferMemoryRequirements2

Ordinal 161
Address 0x36560

vkGetBufferOpaqueCaptureAddress

Ordinal 162
Address 0x36c80

vkGetDescriptorSetLayoutSupport

Ordinal 163
Address 0x36740

vkGetDeviceBufferMemoryRequirements

Ordinal 164
Address 0x37550

vkGetDeviceGroupPeerMemoryFeatures

Ordinal 165
Address 0x363e0

vkGetDeviceGroupPresentCapabilitiesKHR

Ordinal 166
Address 0x441f0

vkGetDeviceGroupSurfacePresentModesKHR

Ordinal 167
Address 0x44250

vkGetDeviceImageMemoryRequirements

Ordinal 168
Address 0x37590

vkGetDeviceImageSparseMemoryRequirements

Ordinal 169
Address 0x375d0

vkGetDeviceMemoryCommitment

Ordinal 170
Address 0x334a0

vkGetDeviceMemoryOpaqueCaptureAddress

Ordinal 171
Address 0x36ce0

vkGetDeviceProcAddr

Ordinal 172
Address 0x31850

vkGetDeviceQueue

Ordinal 173
Address 0x31ac0

vkGetDeviceQueue2

Ordinal 174
Address 0x31bc0

vkGetDisplayModeProperties2KHR

Ordinal 175
Address 0x448c0

vkGetDisplayModePropertiesKHR

Ordinal 176
Address 0x43b30

vkGetDisplayPlaneCapabilities2KHR

Ordinal 177
Address 0x44ae0

vkGetDisplayPlaneCapabilitiesKHR

Ordinal 178
Address 0x43ce0

vkGetDisplayPlaneSupportedDisplaysKHR

Ordinal 179
Address 0x43a50

vkGetEventStatus

Ordinal 180
Address 0x33ad0

vkGetFenceStatus

Ordinal 181
Address 0x33890

vkGetImageMemoryRequirements

Ordinal 182
Address 0x335f0

vkGetImageMemoryRequirements2

Ordinal 183
Address 0x36500

vkGetImageSparseMemoryRequirements

Ordinal 184
Address 0x33650

vkGetImageSparseMemoryRequirements2

Ordinal 185
Address 0x365c0

vkGetImageSubresourceLayout

Ordinal 186
Address 0x33f50

vkGetInstanceProcAddr

Ordinal 187
Address 0x31740

vkGetPhysicalDeviceDisplayPlaneProperties2KHR

Ordinal 188
Address 0x446d0

vkGetPhysicalDeviceDisplayPlanePropertiesKHR

Ordinal 189
Address 0x43970

vkGetPhysicalDeviceDisplayProperties2KHR

Ordinal 190
Address 0x444d0

vkGetPhysicalDeviceDisplayPropertiesKHR

Ordinal 191
Address 0x43890

vkGetPhysicalDeviceExternalBufferProperties

Ordinal 192
Address 0x361a0

vkGetPhysicalDeviceExternalFenceProperties

Ordinal 193
Address 0x362a0

vkGetPhysicalDeviceExternalSemaphoreProperties

Ordinal 194
Address 0x36220

vkGetPhysicalDeviceFeatures

Ordinal 195
Address 0x32d60

vkGetPhysicalDeviceFeatures2

Ordinal 196
Address 0x35e20

vkGetPhysicalDeviceFormatProperties

Ordinal 197
Address 0x32dc0

vkGetPhysicalDeviceFormatProperties2

Ordinal 198
Address 0x35f20

vkGetPhysicalDeviceImageFormatProperties

Ordinal 199
Address 0x32e20

vkGetPhysicalDeviceImageFormatProperties2

Ordinal 200
Address 0x35fa0

vkGetPhysicalDeviceMemoryProperties

Ordinal 201
Address 0x32f40

vkGetPhysicalDeviceMemoryProperties2

Ordinal 202
Address 0x360a0

vkGetPhysicalDevicePresentRectanglesKHR

Ordinal 203
Address 0x44390

vkGetPhysicalDeviceProperties

Ordinal 204
Address 0x32e80

vkGetPhysicalDeviceProperties2

Ordinal 205
Address 0x35ea0

vkGetPhysicalDeviceQueueFamilyProperties

Ordinal 206
Address 0x32ee0

vkGetPhysicalDeviceQueueFamilyProperties2

Ordinal 207
Address 0x36020

vkGetPhysicalDeviceSparseImageFormatProperties

Ordinal 208
Address 0x336b0

vkGetPhysicalDeviceSparseImageFormatProperties2

Ordinal 209
Address 0x36120

vkGetPhysicalDeviceSurfaceCapabilities2KHR

Ordinal 210
Address 0x44c00

vkGetPhysicalDeviceSurfaceCapabilitiesKHR

Ordinal 211
Address 0x42d30

vkGetPhysicalDeviceSurfaceFormats2KHR

Ordinal 212
Address 0x44e40

vkGetPhysicalDeviceSurfaceFormatsKHR

Ordinal 213
Address 0x42e50

vkGetPhysicalDeviceSurfacePresentModesKHR

Ordinal 214
Address 0x42f60

vkGetPhysicalDeviceSurfaceSupportKHR

Ordinal 215
Address 0x42c20

vkGetPhysicalDeviceToolProperties

Ordinal 216
Address 0x36da0

vkGetPhysicalDeviceWin32PresentationSupportKHR

Ordinal 217
Address 0x435d0

vkGetPipelineCacheData

Ordinal 218
Address 0x341f0

vkGetPrivateData

Ordinal 219
Address 0x37610

vkGetQueryPoolResults

Ordinal 220
Address 0x33cb0

vkGetRenderAreaGranularity

Ordinal 221
Address 0x349d0

vkGetSemaphoreCounterValue

Ordinal 222
Address 0x36b00

vkGetSwapchainImagesKHR

Ordinal 223
Address 0x432a0

vkInvalidateMappedMemoryRanges

Ordinal 224
Address 0x33450

vkMapMemory

Ordinal 225
Address 0x33360

vkMergePipelineCaches

Ordinal 226
Address 0x34250

vkQueueBindSparse

Ordinal 227
Address 0x33710

vkQueuePresentKHR

Ordinal 228
Address 0x43360

vkQueueSubmit

Ordinal 229
Address 0x331d0

vkQueueSubmit2

Ordinal 230
Address 0x37690

vkQueueWaitIdle

Ordinal 231
Address 0x33220

vkResetCommandBuffer

Ordinal 232
Address 0x34c70

vkResetCommandPool

Ordinal 233
Address 0x34af0

vkResetDescriptorPool

Ordinal 234
Address 0x346d0

vkResetEvent

Ordinal 235
Address 0x33b90

vkResetFences

Ordinal 236
Address 0x33830

vkResetQueryPool

Ordinal 237
Address 0x36d40

vkSetEvent

Ordinal 238
Address 0x33b30

vkSetPrivateData

Ordinal 239
Address 0x37650

vkSignalSemaphore

Ordinal 240
Address 0x36bc0

vkTrimCommandPool

Ordinal 241
Address 0x36620

vkUnmapMemory

Ordinal 242
Address 0x333b0

vkUpdateDescriptorSetWithTemplate

Ordinal 243
Address 0x36860

vkUpdateDescriptorSets

Ordinal 244
Address 0x347f0

vkWaitForFences

Ordinal 245
Address 0x338f0

vkWaitSemaphores

Ordinal 246
Address 0x36b60

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x268
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.43642
MD5 dd81ced5af5e97e219ff3fd4d9028f3c
SHA1 0f04f1ee80c337a564238515985635bb21324839
SHA256 7b63a510f8ec1dad58757c7cc6b15c65b144b552b7c0503c8e5b0529a2ca1492
SHA3 bb33c3656b4c846a18f8b8913d318314786a27d289a0658211cbc37c160ac5ed

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.3.268.0
ProductVersion 1.3.268.0
FileFlags (EMPTY)
FileOs (EMPTY)
FileType VFT_DLL
Language English - United States
FileDescription 1.3.268.Dev Build
FileVersion (#2) Vulkan Loader - Dev Build
LegalCopyright Copyright (C) 2015-2023
ProductName Vulkan Runtime
ProductVersion (#2) Vulkan Loader - Dev Build
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2024-Jan-24 16:02:41
Version 0.0
SizeofData 69
AddressOfRawData 0xcd888
PointerToRawData 0xccc88
Referenced File C:\projects\src\out\Default\vulkan-1.dll.pdb

TLS Callbacks

StartAddressOfRawData 0x1800ed000
EndAddressOfRawData 0x1800ed008
AddressOfIndex 0x1800dd0ac
AddressOfCallbacks 0x1800cf4f8
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1800db028
GuardCFCheckFunctionPointer 6443401216
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

Errors

Leave a comment

No comments yet.