vmp.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: 8ab9440fde00a19189a8b26319770769
File Size: 5.8 MB
Uploaded At: Jan. 23, 2026, 2:29 a.m.
Views: 25
Exported Functions
- run (Ordinal: 1, Address: 0x1b80)
- runEarlier (Ordinal: 2, Address: 0x1000)
- runEarly (Ordinal: 3, Address: 0x1010)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x18055da68)
- CloseHandle (Address: 0x18055da70)
- CreateFileW (Address: 0x18055da78)
- CreateToolhelp32Snapshot (Address: 0x18055da80)
- DeleteCriticalSection (Address: 0x18055da88)
- EncodePointer (Address: 0x18055da90)
- EnterCriticalSection (Address: 0x18055da98)
- ExitProcess (Address: 0x18055daa0)
- FindClose (Address: 0x18055daa8)
- FindFirstFileExW (Address: 0x18055dab0)
- FindNextFileW (Address: 0x18055dab8)
- FlsAlloc (Address: 0x18055dac0)
- FlsFree (Address: 0x18055dac8)
- FlsGetValue (Address: 0x18055dad0)
- FlsSetValue (Address: 0x18055dad8)
- FlushFileBuffers (Address: 0x18055dae0)
- FlushInstructionCache (Address: 0x18055dae8)
- FreeEnvironmentStringsW (Address: 0x18055daf0)
- FreeLibrary (Address: 0x18055daf8)
- GetACP (Address: 0x18055db00)
- GetCommandLineA (Address: 0x18055db10)
- GetCommandLineW (Address: 0x18055db18)
- GetConsoleMode (Address: 0x18055db20)
- GetConsoleOutputCP (Address: 0x18055db28)
- GetCPInfo (Address: 0x18055db08)
- GetCurrentProcess (Address: 0x18055db30)
- GetCurrentProcessId (Address: 0x18055db38)
- GetCurrentThreadId (Address: 0x18055db40)
- GetEnvironmentStringsW (Address: 0x18055db48)
- GetFileType (Address: 0x18055db50)
- GetLastError (Address: 0x18055db58)
- GetModuleFileNameW (Address: 0x18055db60)
- GetModuleHandleExW (Address: 0x18055db68)
- GetModuleHandleW (Address: 0x18055db70)
- GetOEMCP (Address: 0x18055db78)
- GetProcAddress (Address: 0x18055db80)
- GetProcessHeap (Address: 0x18055db88)
- GetStartupInfoW (Address: 0x18055db90)
- GetStdHandle (Address: 0x18055db98)
- GetStringTypeW (Address: 0x18055dba0)
- GetSystemInfo (Address: 0x18055dba8)
- GetSystemTimeAsFileTime (Address: 0x18055dbb0)
- GetThreadContext (Address: 0x18055dbb8)
- HeapAlloc (Address: 0x18055dbc0)
- HeapCreate (Address: 0x18055dbc8)
- HeapFree (Address: 0x18055dbd0)
- HeapReAlloc (Address: 0x18055dbd8)
- HeapSize (Address: 0x18055dbe0)
- InitializeCriticalSectionAndSpinCount (Address: 0x18055dbe8)
- InitializeSListHead (Address: 0x18055dbf0)
- InterlockedFlushSList (Address: 0x18055dbf8)
- IsDebuggerPresent (Address: 0x18055dc00)
- IsProcessorFeaturePresent (Address: 0x18055dc08)
- IsValidCodePage (Address: 0x18055dc10)
- LCMapStringW (Address: 0x18055dc18)
- LeaveCriticalSection (Address: 0x18055dc20)
- LoadLibraryExW (Address: 0x18055dc28)
- LoadLibraryW (Address: 0x18055dc30)
- MultiByteToWideChar (Address: 0x18055dc38)
- OpenThread (Address: 0x18055dc40)
- OutputDebugStringA (Address: 0x18055dc48)
- QueryPerformanceCounter (Address: 0x18055dc50)
- RaiseException (Address: 0x18055dc58)
- ReadConsoleW (Address: 0x18055dc60)
- ReadFile (Address: 0x18055dc68)
- ReleaseSRWLockExclusive (Address: 0x18055dc70)
- ResumeThread (Address: 0x18055dc78)
- RtlCaptureContext (Address: 0x18055dc80)
- RtlLookupFunctionEntry (Address: 0x18055dc88)
- RtlPcToFileHeader (Address: 0x18055dc90)
- RtlUnwindEx (Address: 0x18055dc98)
- RtlVirtualUnwind (Address: 0x18055dca0)
- SetEndOfFile (Address: 0x18055dca8)
- SetFilePointerEx (Address: 0x18055dcb0)
- SetLastError (Address: 0x18055dcb8)
- SetStdHandle (Address: 0x18055dcc0)
- SetThreadContext (Address: 0x18055dcc8)
- SetUnhandledExceptionFilter (Address: 0x18055dcd0)
- Sleep (Address: 0x18055dcd8)
- SuspendThread (Address: 0x18055dce0)
- TerminateProcess (Address: 0x18055dce8)
- Thread32First (Address: 0x18055dcf0)
- Thread32Next (Address: 0x18055dcf8)
- TlsAlloc (Address: 0x18055dd00)
- TlsFree (Address: 0x18055dd08)
- TlsGetValue (Address: 0x18055dd10)
- TlsSetValue (Address: 0x18055dd18)
- TryAcquireSRWLockExclusive (Address: 0x18055dd20)
- UnhandledExceptionFilter (Address: 0x18055dd28)
- VirtualAlloc (Address: 0x18055dd30)
- VirtualFree (Address: 0x18055dd38)
- VirtualProtect (Address: 0x18055dd40)
- VirtualQuery (Address: 0x18055dd48)
- WideCharToMultiByte (Address: 0x18055dd50)
- WriteConsoleW (Address: 0x18055dd58)
- WriteFile (Address: 0x18055dd60)