INJECTOR_API.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: d8a3cdb9d4be03331998aa77f069b3e1

File Size: 568.0 KB

Uploaded At: Feb. 5, 2026, 3:04 a.m.

Views: 15

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory, VirtualAllocEx, CreateRemoteThread

Exported Functions

  • ??0VMemMgr@asmjit@@QEAA@PEAX@Z (Ordinal: 1, Address: 0xafc0)
  • ??1VMemMgr@asmjit@@QEAA@XZ (Ordinal: 2, Address: 0xb0a0)
  • ??_FVMemMgr@asmjit@@QEAAXXZ (Ordinal: 3, Address: 0x9d50)
  • ?alloc@VMemMgr@asmjit@@QEAAPEAX_KI@Z (Ordinal: 4, Address: 0xb170)
  • ?alloc@VMemUtil@asmjit@@SAPEAX_KPEA_KI@Z (Ordinal: 5, Address: 0x9fa0)
  • ?allocProcessMemory@VMemUtil@asmjit@@SAPEAXPEAX_KPEA_KI@Z (Ordinal: 6, Address: 0x9fb0)
  • ?getPageGranularity@VMemUtil@asmjit@@SA_KXZ (Ordinal: 7, Address: 0x9f10)
  • ?getPageSize@VMemUtil@asmjit@@SA_KXZ (Ordinal: 8, Address: 0x9e80)
  • ?release@VMemMgr@asmjit@@QEAAIPEAX@Z (Ordinal: 9, Address: 0xb280)
  • ?release@VMemUtil@asmjit@@SAIPEAX_K@Z (Ordinal: 10, Address: 0xa0c0)
  • ?releaseProcessMemory@VMemUtil@asmjit@@SAIPEAX0_K@Z (Ordinal: 11, Address: 0xa0d0)
  • ?reset@VMemMgr@asmjit@@QEAAXXZ (Ordinal: 12, Address: 0xb0f0)
  • ?shrink@VMemMgr@asmjit@@QEAAIPEAX_K@Z (Ordinal: 13, Address: 0xb430)
  • ?x86RegData@asmjit@@3UX86RegData@1@B (Ordinal: 14, Address: 0x7a9c0)
  • BypassVAC (Ordinal: 15, Address: 0x45a0)
  • CleanupHybridProcesses (Ordinal: 16, Address: 0x40b0)
  • InjectAPC (Ordinal: 17, Address: 0x41b0)
  • InjectHybrid (Ordinal: 18, Address: 0x4030)
  • InjectLoadLibrary (Ordinal: 19, Address: 0x43b0)
  • InjectManualMap (Ordinal: 20, Address: 0x4120)
  • RestoreVAC (Ordinal: 21, Address: 0x4970)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18006d1c8)
  • CloseHandle (Address: 0x18006d078)
  • CloseThreadpoolTimer (Address: 0x18006d2b8)
  • CloseThreadpoolWait (Address: 0x18006d2d0)
  • CloseThreadpoolWork (Address: 0x18006d298)
  • CompareStringW (Address: 0x18006d408)
  • CreateEventExW (Address: 0x18006d250)
  • CreateEventW (Address: 0x18006d318)
  • CreateFileMappingW (Address: 0x18006d110)
  • CreateFileW (Address: 0x18006d038)
  • CreateRemoteThread (Address: 0x18006d0f0)
  • CreateSemaphoreExW (Address: 0x18006d258)
  • CreateSymbolicLinkW (Address: 0x18006d2e0)
  • CreateThreadpoolTimer (Address: 0x18006d2a0)
  • CreateThreadpoolWait (Address: 0x18006d2c0)
  • CreateThreadpoolWork (Address: 0x18006d288)
  • CreateToolhelp32Snapshot (Address: 0x18006d060)
  • DecodePointer (Address: 0x18006d0a8)
  • DeleteCriticalSection (Address: 0x18006d0c8)
  • EncodePointer (Address: 0x18006d370)
  • EnterCriticalSection (Address: 0x18006d138)
  • EnumSystemLocalesW (Address: 0x18006d430)
  • ExitProcess (Address: 0x18006d3a8)
  • FindClose (Address: 0x18006d468)
  • FindFirstFileExW (Address: 0x18006d470)
  • FindNextFileW (Address: 0x18006d478)
  • FlsAlloc (Address: 0x18006d200)
  • FlsFree (Address: 0x18006d218)
  • FlsGetValue (Address: 0x18006d208)
  • FlsSetValue (Address: 0x18006d210)
  • FlushFileBuffers (Address: 0x18006d198)
  • FlushInstructionCache (Address: 0x18006d0e0)
  • FlushProcessWriteBuffers (Address: 0x18006d260)
  • FormatMessageA (Address: 0x18006d1e0)
  • FreeEnvironmentStringsW (Address: 0x18006d4c0)
  • FreeLibrary (Address: 0x18006d398)
  • FreeLibraryWhenCallbackReturns (Address: 0x18006d280)
  • GetACP (Address: 0x18006d488)
  • GetCommandLineA (Address: 0x18006d4a0)
  • GetCommandLineW (Address: 0x18006d4a8)
  • GetConsoleMode (Address: 0x18006d180)
  • GetConsoleOutputCP (Address: 0x18006d188)
  • GetCPInfo (Address: 0x18006d498)
  • GetCurrentProcess (Address: 0x18006d140)
  • GetCurrentProcessId (Address: 0x18006d348)
  • GetCurrentProcessorNumber (Address: 0x18006d268)
  • GetCurrentThread (Address: 0x18006d3c0)
  • GetCurrentThreadId (Address: 0x18006d1d8)
  • GetDateFormatW (Address: 0x18006d3f8)
  • GetEnvironmentStringsW (Address: 0x18006d4b8)
  • GetFileInformationByHandleEx (Address: 0x18006d2d8)
  • GetFileSizeEx (Address: 0x18006d448)
  • GetFileType (Address: 0x18006d440)
  • GetLastError (Address: 0x18006d068)
  • GetLocaleInfoW (Address: 0x18006d418)
  • GetModuleFileNameW (Address: 0x18006d3b8)
  • GetModuleHandleExW (Address: 0x18006d3b0)
  • GetModuleHandleW (Address: 0x18006d0d8)
  • GetNativeSystemInfo (Address: 0x18006d080)
  • GetOEMCP (Address: 0x18006d490)
  • GetProcAddress (Address: 0x18006d0b8)
  • GetProcessHeap (Address: 0x18006d1a8)
  • GetStartupInfoW (Address: 0x18006d340)
  • GetStdHandle (Address: 0x18006d438)
  • GetStringTypeW (Address: 0x18006d1a0)
  • GetSystemInfo (Address: 0x18006d158)
  • GetSystemTimeAsFileTime (Address: 0x18006d270)
  • GetTempPathW (Address: 0x18006d3e0)
  • GetThreadContext (Address: 0x18006d0b0)
  • GetThreadTimes (Address: 0x18006d0f8)
  • GetTickCount64 (Address: 0x18006d278)
  • GetTimeFormatW (Address: 0x18006d400)
  • GetUserDefaultLCID (Address: 0x18006d428)
  • HeapAlloc (Address: 0x18006d3d0)
  • HeapFree (Address: 0x18006d3c8)
  • HeapReAlloc (Address: 0x18006d460)
  • HeapSize (Address: 0x18006d458)
  • InitializeConditionVariable (Address: 0x18006d228)
  • InitializeCriticalSection (Address: 0x18006d150)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18006d2f8)
  • InitializeCriticalSectionEx (Address: 0x18006d020)
  • InitializeSListHead (Address: 0x18006d350)
  • InitializeSRWLock (Address: 0x18006d1b8)
  • InitOnceExecuteOnce (Address: 0x18006d220)
  • InterlockedFlushSList (Address: 0x18006d360)
  • InterlockedPushEntrySList (Address: 0x18006d358)
  • IsDebuggerPresent (Address: 0x18006d2f0)
  • IsProcessorFeaturePresent (Address: 0x18006d338)
  • IsThreadAFiber (Address: 0x18006d3e8)
  • IsValidCodePage (Address: 0x18006d480)
  • IsValidLocale (Address: 0x18006d420)
  • IsWow64Process (Address: 0x18006d128)
  • LCMapStringW (Address: 0x18006d410)
  • LeaveCriticalSection (Address: 0x18006d148)
  • LoadLibraryExW (Address: 0x18006d3a0)
  • LoadLibraryW (Address: 0x18006d090)
  • LocalFree (Address: 0x18006d2e8)
  • MapViewOfFile (Address: 0x18006d118)
  • Module32FirstW (Address: 0x18006d0a0)
  • Module32NextW (Address: 0x18006d100)
  • MultiByteToWideChar (Address: 0x18006d4b0)
  • OpenProcess (Address: 0x18006d058)
  • OpenThread (Address: 0x18006d130)
  • OutputDebugStringW (Address: 0x18006d070)
  • QueryPerformanceCounter (Address: 0x18006d1e8)
  • QueryPerformanceFrequency (Address: 0x18006d1f0)
  • QueueUserAPC (Address: 0x18006d098)
  • RaiseException (Address: 0x18006d088)
  • ReadConsoleW (Address: 0x18006d168)
  • ReadFile (Address: 0x18006d170)
  • ReadProcessMemory (Address: 0x18006d0d0)
  • ReleaseSRWLockExclusive (Address: 0x18006d1c0)
  • ResetEvent (Address: 0x18006d308)
  • ResumeThread (Address: 0x18006d048)
  • SetConsoleCtrlHandler (Address: 0x18006d3d8)
  • SetEnvironmentVariableW (Address: 0x18006d1b0)
  • SetEvent (Address: 0x18006d300)
  • SetFileInformationByHandle (Address: 0x18006d1f8)
  • SetFilePointerEx (Address: 0x18006d450)
  • SetLastError (Address: 0x18006d368)
  • SetStdHandle (Address: 0x18006d178)
  • SetThreadContext (Address: 0x18006d120)
  • SetThreadpoolTimer (Address: 0x18006d2a8)
  • SetThreadpoolWait (Address: 0x18006d2c8)
  • SetUnhandledExceptionFilter (Address: 0x18006d328)
  • SleepConditionVariableCS (Address: 0x18006d240)
  • SleepConditionVariableSRW (Address: 0x18006d248)
  • SubmitThreadpoolWork (Address: 0x18006d290)
  • SuspendThread (Address: 0x18006d040)
  • TerminateProcess (Address: 0x18006d330)
  • Thread32First (Address: 0x18006d028)
  • Thread32Next (Address: 0x18006d010)
  • TlsAlloc (Address: 0x18006d378)
  • TlsFree (Address: 0x18006d390)
  • TlsGetValue (Address: 0x18006d380)
  • TlsSetValue (Address: 0x18006d388)
  • TryEnterCriticalSection (Address: 0x18006d1d0)
  • UnhandledExceptionFilter (Address: 0x18006d320)
  • UnmapViewOfFile (Address: 0x18006d050)
  • VirtualAllocEx (Address: 0x18006d0c0)
  • VirtualFreeEx (Address: 0x18006d108)
  • VirtualProtect (Address: 0x18006d3f0)
  • WaitForSingleObject (Address: 0x18006d030)
  • WaitForSingleObjectEx (Address: 0x18006d310)
  • WaitForThreadpoolTimerCallbacks (Address: 0x18006d2b0)
  • WakeAllConditionVariable (Address: 0x18006d238)
  • WakeConditionVariable (Address: 0x18006d230)
  • WideCharToMultiByte (Address: 0x18006d0e8)
  • Wow64GetThreadContext (Address: 0x18006d018)
  • Wow64SetThreadContext (Address: 0x18006d008)
  • WriteConsoleW (Address: 0x18006d160)
  • WriteFile (Address: 0x18006d190)
  • WriteProcessMemory (Address: 0x18006d000)
ntdll.dll
  • RtlCaptureContext (Address: 0x18006d510)
  • RtlLookupFunctionEntry (Address: 0x18006d518)
  • RtlPcToFileHeader (Address: 0x18006d508)
  • RtlUnwind (Address: 0x18006d4f0)
  • RtlUnwindEx (Address: 0x18006d500)
  • RtlVirtualUnwind (Address: 0x18006d4f8)
USER32.dll
  • FindWindowW (Address: 0x18006d4e0)
  • GetWindowThreadProcessId (Address: 0x18006d4d8)
  • UnregisterClassW (Address: 0x18006d4d0)