a80683b3a04211c42f9149e0a5490967288a5978deca63cbe887dd2958cc9c8f

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-May-04 08:50:56
Detected languages English - United States
Debug artifacts D:\a\defold\defold\engine\engine\build\src\dmengine_release.pdb

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Suspicious Strings found in the binary may indicate undesirable behavior: Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • RetroUSB.com
  • continuousphysics.com
  • defold.com
  • https://defold.com
Info Cryptographic algorithms detected in the binary: Uses constants related to CRC32
Uses constants related to MD5
Uses constants related to SHA1
Uses constants related to SHA256
Uses constants related to SHA512
Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .fptable
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • LoadLibraryExA
  • GetProcAddress
  • LoadLibraryA
  • LoadLibraryExW
Possibly launches other programs:
  • CreateProcessW
  • ShellExecuteA
Uses Windows's Native API:
  • ntohs
  • ntohl
Uses Microsoft's cryptographic API:
  • CryptGenRandom
  • CryptReleaseContext
  • CryptAcquireContextW
Can create temporary files:
  • CreateFileA
  • GetTempPathW
  • CreateFileW
Uses functions commonly found in keyloggers:
  • GetForegroundWindow
  • MapVirtualKeyW
Memory manipulation functions often used by packers:
  • VirtualProtect
  • VirtualAlloc
Leverages the raw socket API to access the Internet:
  • inet_ntop
  • ntohs
  • htons
  • inet_pton
  • WSAGetLastError
  • WSACleanup
  • WSAStartup
  • gethostbyname
  • gethostbyaddr
  • htonl
  • ntohl
  • getpeername
  • getsockname
  • inet_ntoa
  • gethostname
  • getaddrinfo
  • freeaddrinfo
  • getnameinfo
  • setsockopt
  • __WSAFDIsSet
  • accept
  • bind
  • closesocket
  • connect
  • socket
  • getsockopt
  • listen
  • recv
  • recvfrom
  • ioctlsocket
  • select
  • send
  • sendto
  • shutdown
  • WSAPoll
Enumerates local disk drives:
  • GetDriveTypeW
Manipulates other processes:
  • EnumProcessModules
Reads the contents of the clipboard:
  • GetClipboardData
Safe VirusTotal score: 0/66 (Scanned on 2026-05-22 11:57:01) All the AVs think this file is safe.

Hashes

MD5 a0d673b084fbf6277760f5ac45ff0c0e
SHA1 c65a0f07ceef2b7d4747163fdf5a1a90c670e714
SHA256 a80683b3a04211c42f9149e0a5490967288a5978deca63cbe887dd2958cc9c8f
SHA3 22ba78ca25d6022378fe56a22ecb6d4be704428673593369e73d6044a3758698
SSDeep 196608:9Oe9kRzKm3K6DKny69jf+25ZMOqVVTtxbqzD:9Oe9kRzKm3K6B69qq3
Imports Hash 3bc5b95dd161bbfd6a55373e28a87249

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x148

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 10
TimeDateStamp 2026-May-04 08:50:56
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x5ac800
SizeOfInitializedData 0x2e2600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000000000000D59E (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x896000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 fac048b4850e86bc95fecdd911349b8e
SHA1 534d6dedbfb1b19919df69ae09311c6d74ed40b6
SHA256 4f50b1172a18f5a0eaab8ccd89f6fa72eea46cfcc22afb3f468924f60376c8a9
SHA3 e8df8e597806eb7a5fe64440553f7910319e3c3bf6ef90f3156963299d6bef7e
VirtualSize 0x5ac7f9
VirtualAddress 0x1000
SizeOfRawData 0x5ac800
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.78485

.rdata

MD5 3d7db5c06c83498ff5bc6981905be71a
SHA1 1a86351c36fae557487ffc3b4e9c345a16897ca5
SHA256 3897537331821db9008f5e638ee07093cbb43a1dc46f27bfb1090b0adcee2145
SHA3 2f42887ae839cdf2d825690c7814c619b266cc9f6b053b314b34b96438d21220
VirtualSize 0x1178a9
VirtualAddress 0x5ae000
SizeOfRawData 0x117a00
PointerToRawData 0x5acc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.07262

.data

MD5 e4562accd64700c3b453afd047f7413d
SHA1 250fa74dacb4642ae024842a6b518c0abe798010
SHA256 474447714a9ff18a758475b4872c8776a7c4301c5a8e09e98009bfec462bcef1
SHA3 40869a19c2b62fa76a1402628b572680eef29c6b36b7a5ad6eb3a50aba84ca38
VirtualSize 0x1040f1
VirtualAddress 0x6c6000
SizeOfRawData 0x36200
PointerToRawData 0x6c4600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 4.76696

.pdata

MD5 e266f1131fea70c675d42716a6d894a6
SHA1 1dfb9a049e598d32d2345cae44043b1ed742ecfe
SHA256 dcede547868b0aebbb34c5ca6bce52706817b6d1552fce088b95f5c3ab267d3e
SHA3 6188e34ff8b7bf4512fec7ee59b670ee4a561795a12e2d48b949b379b3eb8fac
VirtualSize 0x3e55c
VirtualAddress 0x7cb000
SizeOfRawData 0x3e600
PointerToRawData 0x6fa800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 6.08421

.idata

MD5 ff06af9eea5ed3ea4e98618a6273930b
SHA1 5fc00866722503fc70cdd3be50611232566b2ac5
SHA256 ab961d09b9f8d0078c579674477e92fc8f2412f82b62bf9d774109e2689b9cf2
SHA3 51d21b6d03974dd7fd303675d36598ef863c5795569c2875fb71d754a471e184
VirtualSize 0x3ce4
VirtualAddress 0x80a000
SizeOfRawData 0x3e00
PointerToRawData 0x738e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.84951

.tls

MD5 c573bd7cea296a9c5d230ca6b5aee1a6
SHA1 04a0b9fde89c71864acaf5e74689fe4c269bd7a8
SHA256 13bde09a110c13b533dc985f3e2c475b6f6bcf514d1a23fce5b784a653548e91
SHA3 3679da6860e8ab20485113de9ac22dfe22ddc29d53f14ddc33a648aa98196361
VirtualSize 0x309
VirtualAddress 0x80e000
SizeOfRawData 0x400
PointerToRawData 0x73cc00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.0111738

.00cfg

MD5 f3229831f504f36e8fd4e37f68e52ea2
SHA1 ce65634f387c8ddbaded8798110e878ac3e97685
SHA256 cb8c2fc733280c30f40526a21537ee7dd87c483fff3df816d3ebfb6da1c55600
SHA3 90178921ecff95976d5417f6fa7e1c597a53cd48333d8e52e77e34375c6da38a
VirtualSize 0x175
VirtualAddress 0x80f000
SizeOfRawData 0x200
PointerToRawData 0x73d000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 0.411681

.fptable

MD5 0f343b0931126a20f133d67c2b018a3b
SHA1 60cacbf3d72e1e7834203da608037b1bf83b40e8
SHA256 5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef
SHA3 6841b2c10aa6e5f7a384143e4de58fbc9aa28a4b742e9ad4ed14ba148a723a43
VirtualSize 0x233
VirtualAddress 0x810000
SizeOfRawData 0x400
PointerToRawData 0x73d200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0

.rsrc

MD5 905a91a578e317052eb6bda559136672
SHA1 4265404545f14ac0ed3ac616fc2b0b9e6188082b
SHA256 00770a2073247f95a03eee6ed5981178e80585632e03fbcfa289765d576e067c
SHA3 3aba75439a25b950ee93bed66a3cb6c5ed43325306645f8d13584582cc77ef13
VirtualSize 0x788fc
VirtualAddress 0x811000
SizeOfRawData 0x78a00
PointerToRawData 0x73d600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.59564

.reloc

MD5 d46ad93a4b4c14eeb2957ec606a73f5d
SHA1 5f97b9deb0a7202dfc4c564d7897dafd48c753f0
SHA256 03a36adf7589fd87992d1d2a7b87651dcb7d5b7f4d371b7d36a925e4e7d109de
SHA3 335d5896a66e3440f655321b4c1b1a96607aa182a46ff5afe4493dab2a985a5f
VirtualSize 0xb077
VirtualAddress 0x88a000
SizeOfRawData 0xb200
PointerToRawData 0x7b6000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 3.24834

Imports

KERNEL32.dll DeleteCriticalSection
WaitForSingleObject
CreateThread
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleExA
FormatMessageA
VirtualProtect
OutputDebugStringA
FindClose
FindFirstFileExW
FindNextFileW
GetFullPathNameW
GetShortPathNameW
GetVersionExA
GetModuleHandleW
MoveFileExA
GetTimeZoneInformation
WideCharToMultiByte
CloseHandle
GetCurrentThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
MultiByteToWideChar
RtlCaptureStackBackTrace
CreateFileA
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
AllocConsole
AttachConsole
WriteFile
CreateEventExW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
SleepConditionVariableSRW
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
VirtualQuery
VirtualFree
VirtualAlloc
LoadLibraryExA
GetProcAddress
SetLastError
GetLastError
RaiseException
RtlVirtualUnwind
RtlUnwindEx
RtlRestoreContext
RtlLookupFunctionEntry
RtlCaptureContext
FormatMessageW
GetSystemTimeAsFileTime
LoadLibraryA
VerSetConditionMask
SetThreadExecutionState
LocalFree
LeaveCriticalSection
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
SetEndOfFile
GetProcessHeap
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapQueryInformation
HeapSize
RemoveDirectoryW
SetStdHandle
GetCurrentDirectoryW
SetCurrentDirectoryW
MoveFileExW
DeleteFileW
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
HeapReAlloc
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
InitializeCriticalSectionEx
IsThreadAFiber
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetTempPathW
HeapAlloc
HeapFree
OutputDebugStringW
GetCommandLineW
GetCommandLineA
SetConsoleCtrlHandler
CreateDirectoryW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
CreateProcessW
DuplicateHandle
ExitProcess
ReadFile
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameW
GetFileType
GetStdHandle
LoadLibraryExW
EnterCriticalSection
LocalAlloc
Sleep
GetTickCount
QueryPerformanceFrequency
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
EncodePointer
RtlPcToFileHeader
InterlockedPushEntrySList
InterlockedFlushSList
QueryPerformanceCounter
OPENGL32.dll wglGetProcAddress
glBindTexture
glBlendFunc
glClear
glClearColor
glClearDepth
glClearStencil
glColorMask
glCullFace
glDeleteTextures
glDepthFunc
glDepthMask
glDisable
glDrawArrays
glDrawElements
glEnable
glFlush
glFrontFace
glGenTextures
glGetError
glGetFloatv
glGetIntegerv
glGetString
glPixelStorei
glPolygonOffset
glReadBuffer
glReadPixels
glScissor
glStencilMask
glTexImage2D
glTexParameterf
glTexParameteri
glTexSubImage2D
glViewport
glDrawBuffer
SHELL32.dll DragQueryPoint
DragFinish
DragQueryFileW
DragAcceptFiles
SHGetFolderPathW
ShellExecuteA
dbghelp.dll MiniDumpWriteDump
SymFromAddr
SymInitialize
SymGetLineFromAddr64
SymGetModuleBase64
SymFunctionTableAccess64
SymCleanup
SymSetOptions
StackWalk64
PSAPI.DLL GetModuleFileNameExA
GetModuleInformation
EnumProcessModules
WS2_32.dll inet_ntop
ntohs
htons
inet_pton
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
gethostbyaddr
htonl
ntohl
getpeername
getsockname
inet_ntoa
gethostname
getaddrinfo
freeaddrinfo
getnameinfo
setsockopt
__WSAFDIsSet
accept
bind
closesocket
connect
socket
getsockopt
listen
recv
recvfrom
ioctlsocket
select
send
sendto
shutdown
WSAPoll
IPHLPAPI.DLL GetAdaptersAddresses
ADVAPI32.dll CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
ole32.dll CoInitializeEx
CoCreateInstance
CoUninitialize
USER32.dll WindowFromPoint
ScreenToClient
ClientToScreen
GetCursorPos
ClipCursor
SetRect
OffsetRect
PtInRect
GetWindowLongW
SystemParametersInfoW
MonitorFromWindow
GetMonitorInfoW
GetRawInputData
RegisterRawInputDevices
RegisterDeviceNotificationW
UnregisterDeviceNotification
UnregisterClassW
ToUnicode
ChangeDisplaySettingsExW
EnumDisplaySettingsW
EnumDisplaySettingsExW
EnumDisplayDevicesW
EnumDisplayMonitors
GetRawInputDeviceInfoA
GetRawInputDeviceList
SetWindowLongW
CreateIconIndirect
LoadCursorW
DestroyIcon
GetClassLongPtrW
GetForegroundWindow
GetDC
ReleaseDC
GetWindowLongPtrW
LoadImageW
GetIconInfo
TrackMouseEvent
TranslateMessage
DispatchMessageW
PeekMessageW
GetMessageTime
SendMessageW
PostMessageW
WaitMessage
DefWindowProcW
RegisterClassExW
CreateWindowExW
DestroyWindow
ShowWindow
GetLayeredWindowAttributes
SetLayeredWindowAttributes
FlashWindow
MoveWindow
SetWindowPos
GetWindowPlacement
SetWindowPlacement
IsWindowVisible
IsIconic
BringWindowToTop
IsZoomed
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
EmptyClipboard
SetFocus
GetActiveWindow
GetKeyState
MapVirtualKeyW
SetCapture
ReleaseCapture
MsgWaitForMultipleObjects
GetSystemMetrics
SetForegroundWindow
SetPropW
GetPropW
RemovePropW
SetWindowTextW
GetClientRect
GetWindowRect
AdjustWindowRectEx
SetCursorPos
SetCursor
GDI32.dll DeleteObject
GetDIBits
GetObjectW
CreateBitmap
CreateRectRgn
CreateDIBSection
ChoosePixelFormat
DescribePixelFormat
SetPixelFormat
SwapBuffers
CreateDCW
DeleteDC
GetDeviceCaps
GetDeviceGammaRamp
SetDeviceGammaRamp

Delayed Imports

?dmHashReverse32Alloc@@YAPEBXPEAUdmAllocator@@IPEAI@Z

Ordinal 1
Address 0xad17

?dmHashReverse64Alloc@@YAPEBXPEAUdmAllocator@@_KPEAI@Z

Ordinal 2
Address 0x129d1

AmdPowerXpressRequestHighPerformance

Ordinal 3
Address 0x6f8364

DecryptXTeaCTR

Ordinal 4
Address 0x11da1

EncryptXTeaCTR

Ordinal 5
Address 0x8bed

LZ4CompressBuffer

Ordinal 6
Address 0x44a8

LZ4DecompressBuffer

Ordinal 7
Address 0x1afa

LZ4MaxCompressedSize

Ordinal 8
Address 0x113ec

NvOptimusEnablement

Ordinal 9
Address 0x6f8360

Particle_CreateContext

Ordinal 10
Address 0x2f04

Particle_CreateInstance

Ordinal 11
Address 0x113c4

Particle_DeletePrototype

Ordinal 12
Address 0xb9b5

Particle_DestroyContext

Ordinal 13
Address 0xefb1

Particle_DestroyInstance

Ordinal 14
Address 0x129ae

Particle_GenerateVertexData

Ordinal 15
Address 0x1c35

Particle_GetContextMaxParticleCount

Ordinal 16
Address 0x3350

Particle_GetEmitterCount

Ordinal 17
Address 0x10465

Particle_GetInstanceStats

Ordinal 18
Address 0x1037

Particle_GetMaterial

Ordinal 19
Address 0x1d2f

Particle_GetMaterialPath

Ordinal 20
Address 0x14ca4

Particle_GetStats

Ordinal 21
Address 0x54a2

Particle_GetTileSource

Ordinal 22
Address 0xcf36

Particle_GetTileSourcePath

Ordinal 23
Address 0x1215c

Particle_GetVertexBufferSize

Ordinal 24
Address 0x275c

Particle_Hash

Ordinal 25
Address 0x889b

Particle_IsSleeping

Ordinal 26
Address 0x87e2

Particle_NewPrototype

Ordinal 27
Address 0xdcc4

Particle_NewPrototypeFromDDF

Ordinal 28
Address 0x13af2

Particle_ReloadInstance

Ordinal 29
Address 0x47eb

Particle_ReloadPrototype

Ordinal 30
Address 0xdd4b

Particle_RenderEmitter

Ordinal 31
Address 0x7b30

Particle_ResetAttributeScratchBuffer

Ordinal 32
Address 0xd977

Particle_ResetInstance

Ordinal 33
Address 0x1424a

Particle_ResetRenderConstant

Ordinal 34
Address 0x651e

Particle_SetContextMaxParticleCount

Ordinal 35
Address 0x14c1d

Particle_SetMaterial

Ordinal 36
Address 0xf687

Particle_SetPosition

Ordinal 37
Address 0x91b5

Particle_SetRenderConstant

Ordinal 38
Address 0x4dc7

Particle_SetRotation

Ordinal 39
Address 0x3a71

Particle_SetScale

Ordinal 40
Address 0xe25f

Particle_SetTileSource

Ordinal 41
Address 0x54fc

Particle_StartInstance

Ordinal 42
Address 0x1535c

Particle_StopInstance

Ordinal 43
Address 0xdb75

Particle_Update

Ordinal 44
Address 0x57b3

Particle_WriteAttributeToScratchBuffer

Ordinal 45
Address 0x6b7c

__swprintf_l

Ordinal 46
Address 0x14650

__vswprintf_l

Ordinal 47
Address 0xcb76

_fprintf_l

Ordinal 48
Address 0x1355c

_fprintf_p

Ordinal 49
Address 0x8891

_fprintf_p_l

Ordinal 50
Address 0x14394

_fprintf_s_l

Ordinal 51
Address 0x8030

_fscanf_l

Ordinal 52
Address 0x12b16

_fscanf_s_l

Ordinal 53
Address 0x79e6

_fwprintf_l

Ordinal 54
Address 0x10e4c

_fwprintf_p

Ordinal 55
Address 0x413d

_fwprintf_p_l

Ordinal 56
Address 0x11dc4

_fwprintf_s_l

Ordinal 57
Address 0x14155

_fwscanf_l

Ordinal 58
Address 0xf6e1

_fwscanf_s_l

Ordinal 59
Address 0x278e

_printf_l

Ordinal 60
Address 0xb776

_printf_p

Ordinal 61
Address 0x3026

_printf_p_l

Ordinal 62
Address 0xb2fd

_printf_s_l

Ordinal 63
Address 0xb05a

_scanf_l

Ordinal 64
Address 0x4e03

_scanf_s_l

Ordinal 65
Address 0x5240

_scprintf

Ordinal 66
Address 0x1d02

_scprintf_l

Ordinal 67
Address 0x13d04

_scprintf_p

Ordinal 68
Address 0xf25e

_scprintf_p_l

Ordinal 69
Address 0xb235

_scwprintf

Ordinal 70
Address 0x86cf

_scwprintf_l

Ordinal 71
Address 0x6208

_scwprintf_p

Ordinal 72
Address 0x14ab0

_scwprintf_p_l

Ordinal 73
Address 0x98d1

_snprintf

Ordinal 74
Address 0xc342

_snprintf_c

Ordinal 75
Address 0xdc5b

_snprintf_c_l

Ordinal 76
Address 0x9903

_snprintf_l

Ordinal 77
Address 0x487c

_snprintf_s

Ordinal 78
Address 0x628a

_snprintf_s_l

Ordinal 79
Address 0x3080

_snscanf

Ordinal 80
Address 0x125f8

_snscanf_l

Ordinal 81
Address 0xaa10

_snscanf_s

Ordinal 82
Address 0x8ae4

_snscanf_s_l

Ordinal 83
Address 0x9011

_snwprintf

Ordinal 84
Address 0x12a99

_snwprintf_l

Ordinal 85
Address 0x41c9

_snwprintf_s

Ordinal 86
Address 0x129b3

_snwprintf_s_l

Ordinal 87
Address 0x15258

_snwscanf

Ordinal 88
Address 0xa614

_snwscanf_l

Ordinal 89
Address 0x48b8

_snwscanf_s

Ordinal 90
Address 0x4976

_snwscanf_s_l

Ordinal 91
Address 0x754a

_sprintf_l

Ordinal 92
Address 0x59ed

_sprintf_p

Ordinal 93
Address 0xda03

_sprintf_p_l

Ordinal 94
Address 0x10e29

_sprintf_s_l

Ordinal 95
Address 0xec37

_sscanf_l

Ordinal 96
Address 0x13f6b

_sscanf_s_l

Ordinal 97
Address 0xf0a6

_swprintf

Ordinal 98
Address 0xbcfd

_swprintf_c

Ordinal 99
Address 0x9354

_swprintf_c_l

Ordinal 100
Address 0x4250

_swprintf_l

Ordinal 101
Address 0x1c1c

_swprintf_p

Ordinal 102
Address 0x3eef

_swprintf_p_l

Ordinal 103
Address 0x144bb

_swprintf_s_l

Ordinal 104
Address 0x9a9d

_swscanf_l

Ordinal 105
Address 0xad26

_swscanf_s_l

Ordinal 106
Address 0x9edf

_vfprintf_l

Ordinal 107
Address 0x8da5

_vfprintf_p

Ordinal 108
Address 0x119a

_vfprintf_p_l

Ordinal 109
Address 0xd2fb

_vfprintf_s_l

Ordinal 110
Address 0x7b2b

_vfscanf_l

Ordinal 111
Address 0x49f8

_vfscanf_s_l

Ordinal 112
Address 0x46f6

_vfwprintf_l

Ordinal 113
Address 0x5506

_vfwprintf_p

Ordinal 114
Address 0x7734

_vfwprintf_p_l

Ordinal 115
Address 0xade4

_vfwprintf_s_l

Ordinal 116
Address 0x14ea7

_vfwscanf_l

Ordinal 117
Address 0x826a

_vfwscanf_s_l

Ordinal 118
Address 0xcce8

_vprintf_l

Ordinal 119
Address 0x10505

_vprintf_p

Ordinal 120
Address 0x9fc5

_vprintf_p_l

Ordinal 121
Address 0x1456

_vprintf_s_l

Ordinal 122
Address 0xf7e5

_vscanf_l

Ordinal 123
Address 0x11fe

_vscanf_s_l

Ordinal 124
Address 0xfe61

_vscprintf

Ordinal 125
Address 0x8f76

_vscprintf_l

Ordinal 126
Address 0x217b

_vscprintf_p

Ordinal 127
Address 0xa056

_vscprintf_p_l

Ordinal 128
Address 0x87b0

_vscwprintf

Ordinal 129
Address 0xc0db

_vscwprintf_l

Ordinal 130
Address 0x7252

_vscwprintf_p

Ordinal 131
Address 0x6e74

_vscwprintf_p_l

Ordinal 132
Address 0x11c7

_vsnprintf

Ordinal 133
Address 0x3823

_vsnprintf_c

Ordinal 134
Address 0x14a0b

_vsnprintf_c_l

Ordinal 135
Address 0x12715

_vsnprintf_l

Ordinal 136
Address 0x74e6

_vsnprintf_s

Ordinal 137
Address 0x1252b

_vsnprintf_s_l

Ordinal 138
Address 0xc324

_vsnwprintf

Ordinal 139
Address 0x14fec

_vsnwprintf_l

Ordinal 140
Address 0x9a5c

_vsnwprintf_s

Ordinal 141
Address 0x8c60

_vsnwprintf_s_l

Ordinal 142
Address 0x110e5

_vsnwscanf_l

Ordinal 143
Address 0x1297c

_vsnwscanf_s_l

Ordinal 144
Address 0x1bb3

_vsprintf_l

Ordinal 145
Address 0x5083

_vsprintf_p

Ordinal 146
Address 0x39b8

_vsprintf_p_l

Ordinal 147
Address 0x86b6

_vsprintf_s_l

Ordinal 148
Address 0x12b93

_vsscanf_l

Ordinal 149
Address 0x204f

_vsscanf_s_l

Ordinal 150
Address 0x4a4d

_vswprintf

Ordinal 151
Address 0x12bbb

_vswprintf_c

Ordinal 152
Address 0x9c0a

_vswprintf_c_l

Ordinal 153
Address 0x1203f

_vswprintf_l

Ordinal 154
Address 0x7de7

_vswprintf_p

Ordinal 155
Address 0x6726

_vswprintf_p_l

Ordinal 156
Address 0xe025

_vswprintf_s_l

Ordinal 157
Address 0xb569

_vswscanf_l

Ordinal 158
Address 0x18ca

_vswscanf_s_l

Ordinal 159
Address 0x2eaf

_vwprintf_l

Ordinal 160
Address 0xe08e

_vwprintf_p

Ordinal 161
Address 0xdf17

_vwprintf_p_l

Ordinal 162
Address 0xe80e

_vwprintf_s_l

Ordinal 163
Address 0x55b5

_vwscanf_l

Ordinal 164
Address 0x2059

_vwscanf_s_l

Ordinal 165
Address 0xce5a

_wprintf_l

Ordinal 166
Address 0xdaf8

_wprintf_p

Ordinal 167
Address 0x772f

_wprintf_p_l

Ordinal 168
Address 0x6c7b

_wprintf_s_l

Ordinal 169
Address 0x2b35

_wscanf_l

Ordinal 170
Address 0x148e4

_wscanf_s_l

Ordinal 171
Address 0x6375

dmHashBuffer32

Ordinal 172
Address 0x8828

dmHashBuffer64

Ordinal 173
Address 0xe007

dmHashBufferNoReverse32

Ordinal 174
Address 0x11383

dmHashBufferNoReverse64

Ordinal 175
Address 0x696a

dmHashClone32

Ordinal 176
Address 0x79d2

dmHashClone64

Ordinal 177
Address 0xaa79

dmHashEnableReverseHash

Ordinal 178
Address 0x9a25

dmHashFinal32

Ordinal 179
Address 0x434a

dmHashFinal64

Ordinal 180
Address 0xe057

dmHashInit32

Ordinal 181
Address 0x14cb8

dmHashInit64

Ordinal 182
Address 0xa92f

dmHashRelease32

Ordinal 183
Address 0x12c92

dmHashRelease64

Ordinal 184
Address 0x9ead

dmHashReverse32

Ordinal 185
Address 0xca13

dmHashReverse64

Ordinal 186
Address 0xf9b1

dmHashReverseErase32

Ordinal 187
Address 0x66f9

dmHashReverseErase64

Ordinal 188
Address 0x12eb8

dmHashReverseSafe32

Ordinal 189
Address 0xaa6f

dmHashReverseSafe32Alloc

Ordinal 190
Address 0x438b

dmHashReverseSafe64

Ordinal 191
Address 0x144cf

dmHashReverseSafe64Alloc

Ordinal 192
Address 0x8279

dmHashString32

Ordinal 193
Address 0x102bc

dmHashString64

Ordinal 194
Address 0x6a7d

dmHashUpdateBuffer32

Ordinal 195
Address 0x108b1

dmHashUpdateBuffer64

Ordinal 196
Address 0x9a8e

fprintf

Ordinal 197
Address 0x10e51

fprintf_s

Ordinal 198
Address 0x10e74

fscanf

Ordinal 199
Address 0x7cf2

fscanf_s

Ordinal 200
Address 0xe1ec

fwprintf

Ordinal 201
Address 0x1d07

fwprintf_s

Ordinal 202
Address 0xf853

fwscanf

Ordinal 203
Address 0xfa7e

fwscanf_s

Ordinal 204
Address 0x12701

printf

Ordinal 205
Address 0x9a3e

printf_s

Ordinal 206
Address 0x1245e

scanf

Ordinal 207
Address 0x3c51

scanf_s

Ordinal 208
Address 0xb947

snprintf

Ordinal 209
Address 0xd909

sprintf

Ordinal 210
Address 0x1200d

sprintf_s

Ordinal 211
Address 0xbbea

sscanf

Ordinal 212
Address 0xd4b3

sscanf_s

Ordinal 213
Address 0x21d0

swprintf

Ordinal 214
Address 0x6302

swprintf_s

Ordinal 215
Address 0x68c5

swscanf

Ordinal 216
Address 0x2bf8

swscanf_s

Ordinal 217
Address 0xb596

vfprintf

Ordinal 218
Address 0x1198c

vfprintf_s

Ordinal 219
Address 0x148a8

vfscanf

Ordinal 220
Address 0xf19b

vfscanf_s

Ordinal 221
Address 0x2306

vfwprintf

Ordinal 222
Address 0x6b4a

vfwprintf_s

Ordinal 223
Address 0xef07

vfwscanf

Ordinal 224
Address 0x10f7d

vfwscanf_s

Ordinal 225
Address 0xbb4a

vprintf

Ordinal 226
Address 0x1dbb

vprintf_s

Ordinal 227
Address 0x6dac

vscanf

Ordinal 228
Address 0x58ad

vscanf_s

Ordinal 229
Address 0x878d

vsnprintf

Ordinal 230
Address 0x5a3d

vsnprintf_s

Ordinal 231
Address 0x2662

vsprintf

Ordinal 232
Address 0x4188

vsprintf_s

Ordinal 233
Address 0x1095b

vsscanf

Ordinal 234
Address 0xf1f5

vsscanf_s

Ordinal 235
Address 0x10d93

vswprintf

Ordinal 236
Address 0xaa83

vswprintf_s

Ordinal 237
Address 0x7865

vswscanf

Ordinal 238
Address 0x10bdb

vswscanf_s

Ordinal 239
Address 0xdd55

vwprintf

Ordinal 240
Address 0xdee0

vwprintf_s

Ordinal 241
Address 0x14fb

vwscanf

Ordinal 242
Address 0xe57f

vwscanf_s

Ordinal 243
Address 0xdde1

wprintf

Ordinal 244
Address 0x1b54

wprintf_s

Ordinal 245
Address 0x8855

wscanf

Ordinal 246
Address 0xcf3b

wscanf_s

Ordinal 247
Address 0x1533e

1

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.93322
MD5 28adf51122dce90a3927c85f84b2a4bf
SHA1 eac07b3f971445e6db111364a3861d2b61813215
SHA256 bc93431567ea9a1050247a9b9690b3c78aa3f194df74838a50cdc01c5f3d38a3
SHA3 3fead38d7af00992a3fc5a9c0cd864fabe9dfb6105f533d3197150926b032fc1

2

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x988
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.90228
MD5 6881af228e5bf3f386b3bb2cf5cd6cee
SHA1 90c71d21646164e3bc1685fd12029698c62fe864
SHA256 b7e4bdf9841d17d39e3caba966c5596c22d0f402cf9ef3005534306d5995d7f5
SHA3 7df00a456665252f4609354b49f9b32bd23df086bbe3a6b2190df0c9133403d2

3

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.84213
MD5 ecc3fe7350623441aa7c63db75df1789
SHA1 ab5c32ca218b7a2d6885e8ee879f2decf1810e2a
SHA256 742dd35fdf1da7389792799135aa3c45fee52052a1ff8f18d074bf8f2ef96a14
SHA3 73231765e20d07dfe1b02f277ac74b2472faf2791b2dbe3fb68771a1c2d96f34

4

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.54876
MD5 09756e6247e22589f0ecee4f01b12527
SHA1 7a88dc2e0dc3eb8e68bea9e2e1300665a77c8ea0
SHA256 4bfc806182b48bc78098de8493bd3d4d02954f41d44dc4bac6814619042c0727
SHA3 28f9ec0a51d78315cbb0f8de1c44927fe2c072b68106783acd92601ecf7f668b

5

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.46563
MD5 c00c8c4b784e0897a206fcc0e1f5324e
SHA1 6a5aef0f901eceb3c7b2db3f94afcc55460d4857
SHA256 1cc93058d87a0055d82131f68089fa4277be02575d47f19a7613a11515ca6271
SHA3 ca6ef8de669492bc2b769c4c7f49d5350be3da207f47d9d92c818756cc6bc768

6

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x94a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.29893
MD5 8fa3c76df403a38c24bd23561e371ee3
SHA1 29e836948672b25701078633748bd37c6c86d5d4
SHA256 a0a1158db3531228db3c47ba8809493a03dfb4ccce840951c174e3e1e623a091
SHA3 d3f2d207de224d3cac76ff3bbdad5b46e6435f7d0393c835a5d37aed5d3e8ab3

7

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.1998
MD5 ab72678f8623de3b764cf6d55ed56a9b
SHA1 246849f5c59735cffcc6c8a3b909a0af92f98e10
SHA256 399472f89948f9ce04ebed33edd35247661a9064596c0f2357036fb68fdc0620
SHA3 f2a620f17b1473d9efe42bb5ee1f51f53717c9306e04c686a9363bc100778cb1

8

Type RT_ICON
Language English - United States
Codepage UNKNOWN
Size 0x42028
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.94524
MD5 acd53776d118c30426f5001ea195531a
SHA1 4bf11bccbb84340a7e3774c200e40ed7ca2989bd
SHA256 76d0177513e4d0b7a1b21a07eac70ec2d61912445b5694823d59d560f8c86c16
SHA3 5f2b7697b08a1d2bbd33c4236c27df5f07a22212e44a3149859eccd935a110f4

100

Type RT_GROUP_ICON
Language English - United States
Codepage UNKNOWN
Size 0x76
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.94794
Detected Filetype Icon file
MD5 19b8a1373207d2ceacaf26fce76f8a56
SHA1 d67585b88fcb9a45d3e59198ae4deec70fac8a52
SHA256 8221fe91b14c89d9acf6c69e626cdfd9a3acfaf8f1a373149705a38d861891cd
SHA3 e4c9410d242c44c20e7af255504a0b44cf298299936cbabd6168ceeb4cb7785a

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2026-May-04 08:50:56
Version 0.0
SizeofData 88
AddressOfRawData 0x65c300
PointerToRawData 0x65af00
Referenced File D:\a\defold\defold\engine\engine\build\src\dmengine_release.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2026-May-04 08:50:56
Version 0.0
SizeofData 20
AddressOfRawData 0x65c358
PointerToRawData 0x65af58

TLS Callbacks

StartAddressOfRawData 0x14080e000
EndAddressOfRawData 0x14080e208
AddressOfIndex 0x1407c32c4
AddressOfCallbacks 0x1405b06f0
SizeOfZeroFill 0
Characteristics IMAGE_SCN_ALIGN_4BYTES
Callbacks (EMPTY)

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1406f49c0

RICH Header

XOR Key 0xcc889737
Unmarked objects 0
C++ objects (33145) 225
C objects (33145) 61
ASM objects (33145) 33
253 (35207) 2
ASM objects (35207) 12
C objects (35207) 19
C++ objects (35207) 53
C objects (34808) 21
Unmarked objects (#2) 1
C objects (35219) 66
C objects (35224) 66
C++ objects (34809) 47
C++ objects (VS2015 UPD3.1 build 24215) 59
Imports (33145) 23
Total imports 347
C++ objects (35224) 293
Exports (35224) 1
Resource objects (35224) 1
Linker (35224) 1

Errors

Leave a comment

No comments yet.