vmp.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 8ab9440fde00a19189a8b26319770769

File Size: 5.8 MB

Uploaded At: Jan. 23, 2026, 2:29 a.m.

Views: 25

Exported Functions

  • run (Ordinal: 1, Address: 0x1b80)
  • runEarlier (Ordinal: 2, Address: 0x1000)
  • runEarly (Ordinal: 3, Address: 0x1010)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18055da68)
  • CloseHandle (Address: 0x18055da70)
  • CreateFileW (Address: 0x18055da78)
  • CreateToolhelp32Snapshot (Address: 0x18055da80)
  • DeleteCriticalSection (Address: 0x18055da88)
  • EncodePointer (Address: 0x18055da90)
  • EnterCriticalSection (Address: 0x18055da98)
  • ExitProcess (Address: 0x18055daa0)
  • FindClose (Address: 0x18055daa8)
  • FindFirstFileExW (Address: 0x18055dab0)
  • FindNextFileW (Address: 0x18055dab8)
  • FlsAlloc (Address: 0x18055dac0)
  • FlsFree (Address: 0x18055dac8)
  • FlsGetValue (Address: 0x18055dad0)
  • FlsSetValue (Address: 0x18055dad8)
  • FlushFileBuffers (Address: 0x18055dae0)
  • FlushInstructionCache (Address: 0x18055dae8)
  • FreeEnvironmentStringsW (Address: 0x18055daf0)
  • FreeLibrary (Address: 0x18055daf8)
  • GetACP (Address: 0x18055db00)
  • GetCommandLineA (Address: 0x18055db10)
  • GetCommandLineW (Address: 0x18055db18)
  • GetConsoleMode (Address: 0x18055db20)
  • GetConsoleOutputCP (Address: 0x18055db28)
  • GetCPInfo (Address: 0x18055db08)
  • GetCurrentProcess (Address: 0x18055db30)
  • GetCurrentProcessId (Address: 0x18055db38)
  • GetCurrentThreadId (Address: 0x18055db40)
  • GetEnvironmentStringsW (Address: 0x18055db48)
  • GetFileType (Address: 0x18055db50)
  • GetLastError (Address: 0x18055db58)
  • GetModuleFileNameW (Address: 0x18055db60)
  • GetModuleHandleExW (Address: 0x18055db68)
  • GetModuleHandleW (Address: 0x18055db70)
  • GetOEMCP (Address: 0x18055db78)
  • GetProcAddress (Address: 0x18055db80)
  • GetProcessHeap (Address: 0x18055db88)
  • GetStartupInfoW (Address: 0x18055db90)
  • GetStdHandle (Address: 0x18055db98)
  • GetStringTypeW (Address: 0x18055dba0)
  • GetSystemInfo (Address: 0x18055dba8)
  • GetSystemTimeAsFileTime (Address: 0x18055dbb0)
  • GetThreadContext (Address: 0x18055dbb8)
  • HeapAlloc (Address: 0x18055dbc0)
  • HeapCreate (Address: 0x18055dbc8)
  • HeapFree (Address: 0x18055dbd0)
  • HeapReAlloc (Address: 0x18055dbd8)
  • HeapSize (Address: 0x18055dbe0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18055dbe8)
  • InitializeSListHead (Address: 0x18055dbf0)
  • InterlockedFlushSList (Address: 0x18055dbf8)
  • IsDebuggerPresent (Address: 0x18055dc00)
  • IsProcessorFeaturePresent (Address: 0x18055dc08)
  • IsValidCodePage (Address: 0x18055dc10)
  • LCMapStringW (Address: 0x18055dc18)
  • LeaveCriticalSection (Address: 0x18055dc20)
  • LoadLibraryExW (Address: 0x18055dc28)
  • LoadLibraryW (Address: 0x18055dc30)
  • MultiByteToWideChar (Address: 0x18055dc38)
  • OpenThread (Address: 0x18055dc40)
  • OutputDebugStringA (Address: 0x18055dc48)
  • QueryPerformanceCounter (Address: 0x18055dc50)
  • RaiseException (Address: 0x18055dc58)
  • ReadConsoleW (Address: 0x18055dc60)
  • ReadFile (Address: 0x18055dc68)
  • ReleaseSRWLockExclusive (Address: 0x18055dc70)
  • ResumeThread (Address: 0x18055dc78)
  • RtlCaptureContext (Address: 0x18055dc80)
  • RtlLookupFunctionEntry (Address: 0x18055dc88)
  • RtlPcToFileHeader (Address: 0x18055dc90)
  • RtlUnwindEx (Address: 0x18055dc98)
  • RtlVirtualUnwind (Address: 0x18055dca0)
  • SetEndOfFile (Address: 0x18055dca8)
  • SetFilePointerEx (Address: 0x18055dcb0)
  • SetLastError (Address: 0x18055dcb8)
  • SetStdHandle (Address: 0x18055dcc0)
  • SetThreadContext (Address: 0x18055dcc8)
  • SetUnhandledExceptionFilter (Address: 0x18055dcd0)
  • Sleep (Address: 0x18055dcd8)
  • SuspendThread (Address: 0x18055dce0)
  • TerminateProcess (Address: 0x18055dce8)
  • Thread32First (Address: 0x18055dcf0)
  • Thread32Next (Address: 0x18055dcf8)
  • TlsAlloc (Address: 0x18055dd00)
  • TlsFree (Address: 0x18055dd08)
  • TlsGetValue (Address: 0x18055dd10)
  • TlsSetValue (Address: 0x18055dd18)
  • TryAcquireSRWLockExclusive (Address: 0x18055dd20)
  • UnhandledExceptionFilter (Address: 0x18055dd28)
  • VirtualAlloc (Address: 0x18055dd30)
  • VirtualFree (Address: 0x18055dd38)
  • VirtualProtect (Address: 0x18055dd40)
  • VirtualQuery (Address: 0x18055dd48)
  • WideCharToMultiByte (Address: 0x18055dd50)
  • WriteConsoleW (Address: 0x18055dd58)
  • WriteFile (Address: 0x18055dd60)