eaad0b67cd7232e53adc84cf1d307c23bad31b1204da8f1296927b0c162567e7

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2026-Mar-30 20:38:33
Detected languages English - United States
TLS Callbacks 1 callback(s) detected.
Debug artifacts vk_swiftshader.dll.pdb
FileDescription SwiftShader Vulkan 64-bit Dynamic Link Library
FileVersion 5.0.0
InternalName Vulkan
LegalCopyright Copyright (C) 2018 Google Inc.
OriginalFilename vk_swiftshader.dll
PrivateBuild 5.0.0
ProductName SwiftShader Vulkan Dynamic Link Library
ProductVersion 5.0.0

Plugin Output

Suspicious The PE is possibly packed. Unusual section name found: .fptable
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryExW
Functions which can be used for anti-debugging purposes:
  • SwitchToThread
Memory manipulation functions often used by packers:
  • VirtualAlloc
  • VirtualProtect
Info The PE is digitally signed. Signer: Spotify AB
Issuer: DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Safe VirusTotal score: 0/71 (Scanned on 2026-04-24 14:18:30) All the AVs think this file is safe.

Hashes

MD5 ec23330ff1f405864f7d166d2173d3fb
SHA1 03f14d154ee1a6b9797e7b94cf4d082196e4aae0
SHA256 eaad0b67cd7232e53adc84cf1d307c23bad31b1204da8f1296927b0c162567e7
SHA3 ca81a67719a70c494f37fa956e6f5f979b1474e638752e2bc2776e4a196d6909
SSDeep 98304:D4ydZOjlb3GaE1COMOIFGOOOOOOOOOOOOqLOOOOOOOOOOG:klC09GOOOOOOOOOOOOqLOOOOOOOOOOG
Imports Hash 044fe78a0bf0936739485626c9260122

DOS Header

e_magic MZ
e_cblp 0x78
e_cp 0x1
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0
e_ss 0
e_sp 0
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x78

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 9
TimeDateStamp 2026-Mar-30 20:38:33
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x448600
SizeOfInitializedData 0xe8400
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000003B04A0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x180000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion A.0
ImageVersion 0.0
SubsystemVersion A.0
Win32VersionValue 0
SizeOfImage 0x54b000
SizeOfHeaders 0x400
Checksum 0x53f2dd
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 3a75715218d0d31b059d2828bac5b8a0
SHA1 170682186a64154ebd57861caf5cf156a62c86d6
SHA256 dbe99fa75656e99e3c71ff31243fde15e27e61bdffeb7d4bc8a98e7d0aab87e7
SHA3 2fee597ec6035da8eeb19e2ddf1b10c106ba6d167c49a3004b2d4112f7f117d5
VirtualSize 0x4485e6
VirtualAddress 0x1000
SizeOfRawData 0x448600
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.36749

.rdata

MD5 e2169f12ce9ee136318018518ca84b8b
SHA1 e0ab15fef571ae98bb54e1a8cf378c240a06d6e0
SHA256 8ead8d25b6605c1fbf0692d582de0de66349a94f0216180493bbef10ffbcea11
SHA3 b54e21667b1516936e8802d5479f2e09e00973229e9e81513a6c28a5eda970e9
VirtualSize 0xb4d9c
VirtualAddress 0x44a000
SizeOfRawData 0xb4e00
PointerToRawData 0x448a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.28117

.data

MD5 d896b4520132fbc60daa7666a2518f6a
SHA1 6316f9896f986f014c35f1283221e65a9849c88d
SHA256 2588447c356ab5a54dbcd98ec478b2cf3862a85fe31d86b42e06a1cc37804745
SHA3 6249760dac2c4ac8a2a1aa1e95834407fc6dd30ddc9191c8f991f914582e7cc8
VirtualSize 0x2ecc4
VirtualAddress 0x4ff000
SizeOfRawData 0x1a400
PointerToRawData 0x4fd800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.10786

.pdata

MD5 481150c1ebca1f225062ce12ad8bdb39
SHA1 758148b52d990c5296f64e8ac59c25c17e28ea15
SHA256 3759b40ffd7729ec80ccc1333a34ae1d8731845a17795a5c92e7232c04e50ad4
SHA3 724c0d22899c72e3b7b1bcdc486f40237d07399788b17646642d3a8f72d5f213
VirtualSize 0x136a4
VirtualAddress 0x52e000
SizeOfRawData 0x13800
PointerToRawData 0x517c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.10081

.fptable

MD5 bf619eac0cdf3f68d496ea9344137e8b
SHA1 5c3eb80066420002bc3dcc7ca4ab6efad7ed4ae5
SHA256 076a27c79e5ace2a3d47f9dd2e83e4ff6ea8872b3c2218f66c92b89b55f36560
SHA3 622de1e1568ddef36c4b89b706b05201c13481c3575d0fc804ff8224787fcb59
VirtualSize 0x100
VirtualAddress 0x542000
SizeOfRawData 0x200
PointerToRawData 0x52b400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0

.tls

MD5 f62e59ac85c713b632e8a2facd71eb50
SHA1 7df276f5c20c3265499c2c08ca126a2db5877c61
SHA256 8405d8721747263ae147151e9134aceecfbd76f7256f5c7684d5baa7f2609d52
SHA3 6bc52e2f7b5364bca4fa9cf1873c340d74a69052df2da1fa7c9439623496e779
VirtualSize 0x59
VirtualAddress 0x543000
SizeOfRawData 0x200
PointerToRawData 0x52b600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.0611629

_RDATA

MD5 f7aabeb74913d342b79db2e25c54665b
SHA1 ab05466a401133f29902cceac0467307fb21dd3b
SHA256 55736844cf28642fdc1b0233d4cc4547bb1ef4455e06d74d7cc04722c103563a
SHA3 449d07e7a7c378aec80b1fd31557ac05ebb91295e4a35f939374955d6e7e4fcf
VirtualSize 0x1f4
VirtualAddress 0x544000
SizeOfRawData 0x200
PointerToRawData 0x52b800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.20257

.rsrc

MD5 8659dadf0d2a17e5aa64e0935a1922cf
SHA1 9ba7ec1314bad1a1baa438730c5fd0f875fa0d2e
SHA256 c2b8b93e99da1783977f23785631bff7fce8d2ffde5dfa82976ade3b67b18066
SHA3 726afefa55d01193b10e6aac65ed13f9cca09e336e9d64f219122a798649cfa3
VirtualSize 0x4d8
VirtualAddress 0x545000
SizeOfRawData 0x600
PointerToRawData 0x52ba00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.81347

.reloc

MD5 4a8e774776027bceb7c7a3cb80bf4faa
SHA1 4aa18c17b94833547e56392d8c4dc27c9f49a99a
SHA256 d5b53959dcbb3467b11e6d8733b1fa0a1297ca2eaa3d6d6f6feffcef3e5cf7ab
SHA3 c21d3e4c772eafec6e8dc1e506ff82612e84320b158d9d1a76f17fc4b43f0659
VirtualSize 0x4cfc
VirtualAddress 0x546000
SizeOfRawData 0x4e00
PointerToRawData 0x52c000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.44265

Imports

KERNEL32.dll AcquireSRWLockExclusive
CloseHandle
CompareStringW
ConvertFiberToThread
ConvertThreadToFiberEx
CreateFiberEx
CreateFileW
CreateRemoteThreadEx
CreateThread
DeleteCriticalSection
DeleteFiber
DeleteFileW
DeleteProcThreadAttributeList
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
ExitThread
FindClose
FindFirstFileExW
FindNextFileW
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetEnvironmentStringsW
GetFileAttributesW
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetLastError
GetLocaleInfoW
GetLogicalProcessorInformationEx
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
HeapAlloc
HeapFree
HeapQueryInformation
HeapReAlloc
HeapSize
HeapValidate
HeapWalk
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeProcThreadAttributeList
InitializeSListHead
InterlockedFlushSList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LocalFree
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadConsoleW
ReadFile
ReleaseSRWLockExclusive
RemoveDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetConsoleTextAttribute
SetEndOfFile
SetEnvironmentVariableW
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SleepConditionVariableSRW
SwitchToFiber
SwitchToThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
UnhandledExceptionFilter
UpdateProcThreadAttribute
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WaitForSingleObjectEx
WakeAllConditionVariable
WakeConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
USER32.dll GetClientRect
GetDC
IsWindow
ReleaseDC
GDI32.dll StretchDIBits

Delayed Imports

vkAcquireNextImage2KHR

Ordinal 1
Address 0x3dce0

vkAcquireNextImageKHR

Ordinal 2
Address 0x3dc00

vkAllocateCommandBuffers

Ordinal 3
Address 0x37780

vkAllocateDescriptorSets

Ordinal 4
Address 0x36ca0

vkAllocateMemory

Ordinal 5
Address 0x33ca0

vkBeginCommandBuffer

Ordinal 6
Address 0x37900

vkBindBufferMemory

Ordinal 7
Address 0x33fb0

vkBindBufferMemory2

Ordinal 8
Address 0x3af00

vkBindImageMemory

Ordinal 9
Address 0x34040

vkBindImageMemory2

Ordinal 10
Address 0x3b090

vkCmdBeginQuery

Ordinal 11
Address 0x3a760

vkCmdBeginRenderPass

Ordinal 12
Address 0x3aa90

vkCmdBeginRenderPass2

Ordinal 13
Address 0x3aaf0

vkCmdBeginRendering

Ordinal 14
Address 0x3add0

vkCmdBindDescriptorSets

Ordinal 15
Address 0x37e80

vkCmdBindIndexBuffer

Ordinal 16
Address 0x37f10

vkCmdBindPipeline

Ordinal 17
Address 0x37aa0

vkCmdBindVertexBuffers

Ordinal 18
Address 0x37f80

vkCmdBindVertexBuffers2

Ordinal 19
Address 0x38000

vkCmdBlitImage

Ordinal 20
Address 0x38ea0

vkCmdBlitImage2

Ordinal 21
Address 0x39190

vkCmdClearAttachments

Ordinal 22
Address 0x398f0

vkCmdClearColorImage

Ordinal 23
Address 0x397f0

vkCmdClearDepthStencilImage

Ordinal 24
Address 0x39870

vkCmdCopyBuffer

Ordinal 25
Address 0x389b0

vkCmdCopyBuffer2

Ordinal 26
Address 0x38b60

vkCmdCopyBufferToImage

Ordinal 27
Address 0x391e0

vkCmdCopyBufferToImage2

Ordinal 28
Address 0x39420

vkCmdCopyImage

Ordinal 29
Address 0x38bb0

vkCmdCopyImage2

Ordinal 30
Address 0x38e50

vkCmdCopyImageToBuffer

Ordinal 31
Address 0x39470

vkCmdCopyImageToBuffer2

Ordinal 32
Address 0x396c0

vkCmdCopyQueryPoolResults

Ordinal 33
Address 0x3a970

vkCmdDispatch

Ordinal 34
Address 0x388f0

vkCmdDispatchBase

Ordinal 35
Address 0x3b300

vkCmdDispatchIndirect

Ordinal 36
Address 0x38950

vkCmdDraw

Ordinal 37
Address 0x38620

vkCmdDrawIndexed

Ordinal 38
Address 0x38690

vkCmdDrawIndexedIndirect

Ordinal 39
Address 0x38780

vkCmdDrawIndexedIndirectCount

Ordinal 40
Address 0x38870

vkCmdDrawIndirect

Ordinal 41
Address 0x38710

vkCmdDrawIndirectCount

Ordinal 42
Address 0x387f0

vkCmdEndQuery

Ordinal 43
Address 0x3a7d0

vkCmdEndRenderPass

Ordinal 44
Address 0x3ad00

vkCmdEndRenderPass2

Ordinal 45
Address 0x3ad40

vkCmdEndRendering

Ordinal 46
Address 0x3ae20

vkCmdExecuteCommands

Ordinal 47
Address 0x3ad80

vkCmdFillBuffer

Ordinal 48
Address 0x39780

vkCmdNextSubpass

Ordinal 49
Address 0x3ac60

vkCmdNextSubpass2

Ordinal 50
Address 0x3acb0

vkCmdPipelineBarrier

Ordinal 51
Address 0x3a520

vkCmdPipelineBarrier2

Ordinal 52
Address 0x3a710

vkCmdPushConstants

Ordinal 53
Address 0x3aa10

vkCmdResetEvent

Ordinal 54
Address 0x3a200

vkCmdResetEvent2

Ordinal 55
Address 0x3a260

vkCmdResetQueryPool

Ordinal 56
Address 0x3a830

vkCmdResolveImage

Ordinal 57
Address 0x39960

vkCmdResolveImage2

Ordinal 58
Address 0x39c00

vkCmdSetBlendConstants

Ordinal 59
Address 0x37cb0

vkCmdSetCullMode

Ordinal 60
Address 0x38080

vkCmdSetDepthBias

Ordinal 61
Address 0x37c10

vkCmdSetDepthBiasEnable

Ordinal 62
Address 0x38470

vkCmdSetDepthBounds

Ordinal 63
Address 0x37d20

vkCmdSetDepthBoundsTestEnable

Ordinal 64
Address 0x380d0

vkCmdSetDepthCompareOp

Ordinal 65
Address 0x38120

vkCmdSetDepthTestEnable

Ordinal 66
Address 0x38170

vkCmdSetDepthWriteEnable

Ordinal 67
Address 0x381c0

vkCmdSetDeviceMask

Ordinal 68
Address 0x3b2b0

vkCmdSetEvent

Ordinal 69
Address 0x39c50

vkCmdSetEvent2

Ordinal 70
Address 0x3a1a0

vkCmdSetFrontFace

Ordinal 71
Address 0x38210

vkCmdSetLineWidth

Ordinal 72
Address 0x37bb0

vkCmdSetPrimitiveRestartEnable

Ordinal 73
Address 0x384c0

vkCmdSetPrimitiveTopology

Ordinal 74
Address 0x38260

vkCmdSetRasterizerDiscardEnable

Ordinal 75
Address 0x38420

vkCmdSetScissor

Ordinal 76
Address 0x37b50

vkCmdSetScissorWithCount

Ordinal 77
Address 0x382b0

vkCmdSetStencilCompareMask

Ordinal 78
Address 0x37d90

vkCmdSetStencilOp

Ordinal 79
Address 0x38300

vkCmdSetStencilReference

Ordinal 80
Address 0x37e30

vkCmdSetStencilTestEnable

Ordinal 81
Address 0x38380

vkCmdSetStencilWriteMask

Ordinal 82
Address 0x37de0

vkCmdSetViewport

Ordinal 83
Address 0x37af0

vkCmdSetViewportWithCount

Ordinal 84
Address 0x383d0

vkCmdUpdateBuffer

Ordinal 85
Address 0x39710

vkCmdWaitEvents

Ordinal 86
Address 0x3a2c0

vkCmdWaitEvents2

Ordinal 87
Address 0x3a4c0

vkCmdWriteTimestamp

Ordinal 88
Address 0x3a8a0

vkCmdWriteTimestamp2

Ordinal 89
Address 0x3a900

vkCreateBuffer

Ordinal 90
Address 0x34fb0

vkCreateBufferView

Ordinal 91
Address 0x35260

vkCreateCommandPool

Ordinal 92
Address 0x37500

vkCreateComputePipelines

Ordinal 93
Address 0x36120

vkCreateDescriptorPool

Ordinal 94
Address 0x36a10

vkCreateDescriptorSetLayout

Ordinal 95
Address 0x36820

vkCreateDescriptorUpdateTemplate

Ordinal 96
Address 0x3c530

vkCreateDevice

Ordinal 97
Address 0x32250

vkCreateEvent

Ordinal 98
Address 0x34a40

vkCreateFence

Ordinal 99
Address 0x342f0

vkCreateFramebuffer

Ordinal 100
Address 0x36ea0

vkCreateGraphicsPipelines

Ordinal 101
Address 0x35f70

vkCreateImage

Ordinal 102
Address 0x35430

vkCreateImageView

Ordinal 103
Address 0x35820

vkCreateInstance

Ordinal 104
Address 0x316c0

vkCreatePipelineCache

Ordinal 105
Address 0x35cc0

vkCreatePipelineLayout

Ordinal 106
Address 0x36340

vkCreatePrivateDataSlot

Ordinal 107
Address 0x3c9f0

vkCreateQueryPool

Ordinal 108
Address 0x34d00

vkCreateRenderPass

Ordinal 109
Address 0x36fd0

vkCreateRenderPass2

Ordinal 110
Address 0x37210

vkCreateSampler

Ordinal 111
Address 0x36550

vkCreateSamplerYcbcrConversion

Ordinal 112
Address 0x3c360

vkCreateSemaphore

Ordinal 113
Address 0x34660

vkCreateShaderModule

Ordinal 114
Address 0x35a90

vkCreateSwapchainKHR

Ordinal 115
Address 0x3d9f0

vkCreateWin32SurfaceKHR

Ordinal 116
Address 0x3d480

vkDestroyBuffer

Ordinal 117
Address 0x35140

vkDestroyBufferView

Ordinal 118
Address 0x353e0

vkDestroyCommandPool

Ordinal 119
Address 0x37690

vkDestroyDescriptorPool

Ordinal 120
Address 0x36ba0

vkDestroyDescriptorSetLayout

Ordinal 121
Address 0x369b0

vkDestroyDescriptorUpdateTemplate

Ordinal 122
Address 0x3c6f0

vkDestroyDevice

Ordinal 123
Address 0x32f70

vkDestroyEvent

Ordinal 124
Address 0x34bb0

vkDestroyFence

Ordinal 125
Address 0x34480

vkDestroyFramebuffer

Ordinal 126
Address 0x36f70

vkDestroyImage

Ordinal 127
Address 0x35600

vkDestroyImageView

Ordinal 128
Address 0x35a10

vkDestroyInstance

Ordinal 129
Address 0x31b70

vkDestroyPipeline

Ordinal 130
Address 0x362d0

vkDestroyPipelineCache

Ordinal 131
Address 0x35e60

vkDestroyPipelineLayout

Ordinal 132
Address 0x364f0

vkDestroyPrivateDataSlot

Ordinal 133
Address 0x3ca70

vkDestroyQueryPool

Ordinal 134
Address 0x34ea0

vkDestroyRenderPass

Ordinal 135
Address 0x37450

vkDestroySampler

Ordinal 136
Address 0x367b0

vkDestroySamplerYcbcrConversion

Ordinal 137
Address 0x3c4e0

vkDestroySemaphore

Ordinal 138
Address 0x348a0

vkDestroyShaderModule

Ordinal 139
Address 0x35c40

vkDestroySurfaceKHR

Ordinal 140
Address 0x3d650

vkDestroySwapchainKHR

Ordinal 141
Address 0x3db30

vkDeviceWaitIdle

Ordinal 142
Address 0x33c60

vkEndCommandBuffer

Ordinal 143
Address 0x37a10

vkEnumerateDeviceExtensionProperties

Ordinal 144
Address 0x33240

vkEnumerateDeviceLayerProperties

Ordinal 145
Address 0x333d0

vkEnumerateInstanceExtensionProperties

Ordinal 146
Address 0x32fe0

vkEnumerateInstanceLayerProperties

Ordinal 147
Address 0x33380

vkEnumerateInstanceVersion

Ordinal 148
Address 0x3aec0

vkEnumeratePhysicalDeviceGroups

Ordinal 149
Address 0x3b3d0

vkEnumeratePhysicalDevices

Ordinal 150
Address 0x31bd0

vkFlushMappedMemoryRanges

Ordinal 151
Address 0x33f00

vkFreeCommandBuffers

Ordinal 152
Address 0x378b0

vkFreeDescriptorSets

Ordinal 153
Address 0x36dd0

vkFreeMemory

Ordinal 154
Address 0x33d50

vkGetBufferDeviceAddress

Ordinal 155
Address 0x351a0

vkGetBufferMemoryRequirements

Ordinal 156
Address 0x340d0

vkGetBufferMemoryRequirements2

Ordinal 157
Address 0x3b540

vkGetBufferOpaqueCaptureAddress

Ordinal 158
Address 0x351e0

vkGetDescriptorSetLayoutSupport

Ordinal 159
Address 0x3c8d0

vkGetDeviceBufferMemoryRequirements

Ordinal 160
Address 0x3cbc0

vkGetDeviceGroupPeerMemoryFeatures

Ordinal 161
Address 0x3b240

vkGetDeviceGroupPresentCapabilitiesKHR

Ordinal 162
Address 0x3dde0

vkGetDeviceGroupSurfacePresentModesKHR

Ordinal 163
Address 0x3de40

vkGetDeviceImageMemoryRequirements

Ordinal 164
Address 0x3cc60

vkGetDeviceImageSparseMemoryRequirements

Ordinal 165
Address 0x3ce50

vkGetDeviceMemoryCommitment

Ordinal 166
Address 0x33f60

vkGetDeviceMemoryOpaqueCaptureAddress

Ordinal 167
Address 0x35220

vkGetDeviceProcAddr

Ordinal 168
Address 0x32200

vkGetDeviceQueue

Ordinal 169
Address 0x33420

vkGetDeviceQueue2

Ordinal 170
Address 0x3c200

vkGetEventStatus

Ordinal 171
Address 0x34c00

vkGetFenceStatus

Ordinal 172
Address 0x34590

vkGetImageMemoryRequirements

Ordinal 173
Address 0x34160

vkGetImageMemoryRequirements2

Ordinal 174
Address 0x3b430

vkGetImageSparseMemoryRequirements

Ordinal 175
Address 0x341f0

vkGetImageSparseMemoryRequirements2

Ordinal 176
Address 0x3b720

vkGetImageSubresourceLayout

Ordinal 177
Address 0x356b0

vkGetInstanceProcAddr

Ordinal 178
Address 0x321b0

vkGetPhysicalDeviceExternalBufferProperties

Ordinal 179
Address 0x3c7b0

vkGetPhysicalDeviceExternalFenceProperties

Ordinal 180
Address 0x3c810

vkGetPhysicalDeviceExternalSemaphoreProperties

Ordinal 181
Address 0x3c870

vkGetPhysicalDeviceFeatures

Ordinal 182
Address 0x31c30

vkGetPhysicalDeviceFeatures2

Ordinal 183
Address 0x3b8a0

vkGetPhysicalDeviceFormatProperties

Ordinal 184
Address 0x31c90

vkGetPhysicalDeviceFormatProperties2

Ordinal 185
Address 0x3bd60

vkGetPhysicalDeviceImageFormatProperties

Ordinal 186
Address 0x31cd0

vkGetPhysicalDeviceImageFormatProperties2

Ordinal 187
Address 0x31df0

vkGetPhysicalDeviceMemoryProperties

Ordinal 188
Address 0x32160

vkGetPhysicalDeviceMemoryProperties2

Ordinal 189
Address 0x3bf10

vkGetPhysicalDevicePresentRectanglesKHR

Ordinal 190
Address 0x3de80

vkGetPhysicalDeviceProperties

Ordinal 191
Address 0x32090

vkGetPhysicalDeviceProperties2

Ordinal 192
Address 0x3b8f0

vkGetPhysicalDeviceQueueFamilyProperties

Ordinal 193
Address 0x320f0

vkGetPhysicalDeviceQueueFamilyProperties2

Ordinal 194
Address 0x3bea0

vkGetPhysicalDeviceSparseImageFormatProperties

Ordinal 195
Address 0x34240

vkGetPhysicalDeviceSparseImageFormatProperties2

Ordinal 196
Address 0x3c040

vkGetPhysicalDeviceSurfaceCapabilities2KHR

Ordinal 197
Address 0x3d770

vkGetPhysicalDeviceSurfaceCapabilitiesKHR

Ordinal 198
Address 0x3d710

vkGetPhysicalDeviceSurfaceFormats2KHR

Ordinal 199
Address 0x3d920

vkGetPhysicalDeviceSurfaceFormatsKHR

Ordinal 200
Address 0x3d7f0

vkGetPhysicalDeviceSurfacePresentModesKHR

Ordinal 201
Address 0x3d990

vkGetPhysicalDeviceSurfaceSupportKHR

Ordinal 202
Address 0x3d6d0

vkGetPhysicalDeviceToolProperties

Ordinal 203
Address 0x3c140

vkGetPhysicalDeviceWin32PresentationSupportKHR

Ordinal 204
Address 0x3d550

vkGetPipelineCacheData

Ordinal 205
Address 0x35ed0

vkGetPrivateData

Ordinal 206
Address 0x3cb50

vkGetQueryPoolResults

Ordinal 207
Address 0x34f00

vkGetRenderAreaGranularity

Ordinal 208
Address 0x374b0

vkGetSemaphoreCounterValue

Ordinal 209
Address 0x34920

vkGetSwapchainImagesKHR

Ordinal 210
Address 0x3db90

vkInvalidateMappedMemoryRanges

Ordinal 211
Address 0x33f30

vkMapMemory

Ordinal 212
Address 0x33e40

vkMergePipelineCaches

Ordinal 213
Address 0x35f20

vkQueueBindSparse

Ordinal 214
Address 0x342b0

vkQueuePresentKHR

Ordinal 215
Address 0x3dca0

vkQueueSubmit

Ordinal 216
Address 0x33480

vkQueueSubmit2

Ordinal 217
Address 0x33890

vkQueueWaitIdle

Ordinal 218
Address 0x33c20

vkReleaseSwapchainImagesEXT

Ordinal 219
Address 0x3dda0

vkReleaseSwapchainImagesKHR

Ordinal 220
Address 0x3dd60

vkResetCommandBuffer

Ordinal 221
Address 0x37a50

vkResetCommandPool

Ordinal 222
Address 0x37730

vkResetDescriptorPool

Ordinal 223
Address 0x36c40

vkResetEvent

Ordinal 224
Address 0x34cb0

vkResetFences

Ordinal 225
Address 0x34510

vkResetQueryPool

Ordinal 226
Address 0x3b380

vkSetEvent

Ordinal 227
Address 0x34c50

vkSetPrivateData

Ordinal 228
Address 0x3cae0

vkSignalSemaphore

Ordinal 229
Address 0x34980

vkTrimCommandPool

Ordinal 230
Address 0x3c190

vkUnmapMemory

Ordinal 231
Address 0x33ed0

vkUpdateDescriptorSetWithTemplate

Ordinal 232
Address 0x3c740

vkUpdateDescriptorSets

Ordinal 233
Address 0x36e30

vkWaitForFences

Ordinal 234
Address 0x345f0

vkWaitSemaphores

Ordinal 235
Address 0x349e0

vk_icdEnumerateAdapterPhysicalDevices

Ordinal 236
Address 0x314d0

vk_icdGetInstanceProcAddr

Ordinal 237
Address 0x31440

vk_icdGetPhysicalDeviceProcAddr

Ordinal 238
Address 0x314b0

vk_icdNegotiateLoaderICDInterfaceVersion

Ordinal 239
Address 0x31490

101

Type RT_DIALOG
Language English - United States
Codepage UNKNOWN
Size 0xf8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.13186
MD5 aa9a3fb4894b7256bcb247b07978a092
SHA1 75369ba948c280a8519b994e52c38a476f3709de
SHA256 c8b96b2158c157cb16c65f20297e06c3cf179cd2567f27e685e84b388a541a7a
SHA3 726cb4775cabbba0a10db7433559805cf50ef01f11c7e3d8c24b6d582ebb8d1f

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x340
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.43993
MD5 297739c91299d269fae081b27e156210
SHA1 584d43d8f2c4a2e21fe5c8dd22d41fe5f17dec4d
SHA256 f8aff9c55d8a0faaff7bb97eecc74cd288c88e9e1cadd7198742cadfb07cc5b4
SHA3 c16b12bdec1f25a9125575ee3422f4e7554aeed7d071f99db0675ad1bff4fbf0

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 5.0.0.1
ProductVersion 5.0.0.1
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_DLL
Language English - United States
FileDescription SwiftShader Vulkan 64-bit Dynamic Link Library
FileVersion (#2) 5.0.0
InternalName Vulkan
LegalCopyright Copyright (C) 2018 Google Inc.
OriginalFilename vk_swiftshader.dll
PrivateBuild 5.0.0
ProductName SwiftShader Vulkan Dynamic Link Library
ProductVersion (#2) 5.0.0
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-Mar-30 20:38:33
Version 0.0
SizeofData 47
AddressOfRawData 0x4ed704
PointerToRawData 0x4ec104
Referenced File vk_swiftshader.dll.pdb

UNKNOWN

Characteristics 0
TimeDateStamp 2026-Mar-30 20:38:33
Version 0.0
SizeofData 4
AddressOfRawData 0x4ed734
PointerToRawData 0x4ec134

TLS Callbacks

StartAddressOfRawData 0x180543000
EndAddressOfRawData 0x180543058
AddressOfIndex 0x180519360
AddressOfCallbacks 0x1804efd00
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_8BYTES
Callbacks 0x00000001803AF460

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1804ff040
GuardCFCheckFunctionPointer 6447627288
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

Errors

Leave a comment

No comments yet.