INJECTOR_API.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: d8a3cdb9d4be03331998aa77f069b3e1
File Size: 568.0 KB
Uploaded At: Feb. 5, 2026, 3:04 a.m.
Views: 15
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory, VirtualAllocEx, CreateRemoteThread
Exported Functions
- ??0VMemMgr@asmjit@@QEAA@PEAX@Z (Ordinal: 1, Address: 0xafc0)
- ??1VMemMgr@asmjit@@QEAA@XZ (Ordinal: 2, Address: 0xb0a0)
- ??_FVMemMgr@asmjit@@QEAAXXZ (Ordinal: 3, Address: 0x9d50)
- ?alloc@VMemMgr@asmjit@@QEAAPEAX_KI@Z (Ordinal: 4, Address: 0xb170)
- ?alloc@VMemUtil@asmjit@@SAPEAX_KPEA_KI@Z (Ordinal: 5, Address: 0x9fa0)
- ?allocProcessMemory@VMemUtil@asmjit@@SAPEAXPEAX_KPEA_KI@Z (Ordinal: 6, Address: 0x9fb0)
- ?getPageGranularity@VMemUtil@asmjit@@SA_KXZ (Ordinal: 7, Address: 0x9f10)
- ?getPageSize@VMemUtil@asmjit@@SA_KXZ (Ordinal: 8, Address: 0x9e80)
- ?release@VMemMgr@asmjit@@QEAAIPEAX@Z (Ordinal: 9, Address: 0xb280)
- ?release@VMemUtil@asmjit@@SAIPEAX_K@Z (Ordinal: 10, Address: 0xa0c0)
- ?releaseProcessMemory@VMemUtil@asmjit@@SAIPEAX0_K@Z (Ordinal: 11, Address: 0xa0d0)
- ?reset@VMemMgr@asmjit@@QEAAXXZ (Ordinal: 12, Address: 0xb0f0)
- ?shrink@VMemMgr@asmjit@@QEAAIPEAX_K@Z (Ordinal: 13, Address: 0xb430)
- ?x86RegData@asmjit@@3UX86RegData@1@B (Ordinal: 14, Address: 0x7a9c0)
- BypassVAC (Ordinal: 15, Address: 0x45a0)
- CleanupHybridProcesses (Ordinal: 16, Address: 0x40b0)
- InjectAPC (Ordinal: 17, Address: 0x41b0)
- InjectHybrid (Ordinal: 18, Address: 0x4030)
- InjectLoadLibrary (Ordinal: 19, Address: 0x43b0)
- InjectManualMap (Ordinal: 20, Address: 0x4120)
- RestoreVAC (Ordinal: 21, Address: 0x4970)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x18006d1c8)
- CloseHandle (Address: 0x18006d078)
- CloseThreadpoolTimer (Address: 0x18006d2b8)
- CloseThreadpoolWait (Address: 0x18006d2d0)
- CloseThreadpoolWork (Address: 0x18006d298)
- CompareStringW (Address: 0x18006d408)
- CreateEventExW (Address: 0x18006d250)
- CreateEventW (Address: 0x18006d318)
- CreateFileMappingW (Address: 0x18006d110)
- CreateFileW (Address: 0x18006d038)
- CreateRemoteThread (Address: 0x18006d0f0)
- CreateSemaphoreExW (Address: 0x18006d258)
- CreateSymbolicLinkW (Address: 0x18006d2e0)
- CreateThreadpoolTimer (Address: 0x18006d2a0)
- CreateThreadpoolWait (Address: 0x18006d2c0)
- CreateThreadpoolWork (Address: 0x18006d288)
- CreateToolhelp32Snapshot (Address: 0x18006d060)
- DecodePointer (Address: 0x18006d0a8)
- DeleteCriticalSection (Address: 0x18006d0c8)
- EncodePointer (Address: 0x18006d370)
- EnterCriticalSection (Address: 0x18006d138)
- EnumSystemLocalesW (Address: 0x18006d430)
- ExitProcess (Address: 0x18006d3a8)
- FindClose (Address: 0x18006d468)
- FindFirstFileExW (Address: 0x18006d470)
- FindNextFileW (Address: 0x18006d478)
- FlsAlloc (Address: 0x18006d200)
- FlsFree (Address: 0x18006d218)
- FlsGetValue (Address: 0x18006d208)
- FlsSetValue (Address: 0x18006d210)
- FlushFileBuffers (Address: 0x18006d198)
- FlushInstructionCache (Address: 0x18006d0e0)
- FlushProcessWriteBuffers (Address: 0x18006d260)
- FormatMessageA (Address: 0x18006d1e0)
- FreeEnvironmentStringsW (Address: 0x18006d4c0)
- FreeLibrary (Address: 0x18006d398)
- FreeLibraryWhenCallbackReturns (Address: 0x18006d280)
- GetACP (Address: 0x18006d488)
- GetCommandLineA (Address: 0x18006d4a0)
- GetCommandLineW (Address: 0x18006d4a8)
- GetConsoleMode (Address: 0x18006d180)
- GetConsoleOutputCP (Address: 0x18006d188)
- GetCPInfo (Address: 0x18006d498)
- GetCurrentProcess (Address: 0x18006d140)
- GetCurrentProcessId (Address: 0x18006d348)
- GetCurrentProcessorNumber (Address: 0x18006d268)
- GetCurrentThread (Address: 0x18006d3c0)
- GetCurrentThreadId (Address: 0x18006d1d8)
- GetDateFormatW (Address: 0x18006d3f8)
- GetEnvironmentStringsW (Address: 0x18006d4b8)
- GetFileInformationByHandleEx (Address: 0x18006d2d8)
- GetFileSizeEx (Address: 0x18006d448)
- GetFileType (Address: 0x18006d440)
- GetLastError (Address: 0x18006d068)
- GetLocaleInfoW (Address: 0x18006d418)
- GetModuleFileNameW (Address: 0x18006d3b8)
- GetModuleHandleExW (Address: 0x18006d3b0)
- GetModuleHandleW (Address: 0x18006d0d8)
- GetNativeSystemInfo (Address: 0x18006d080)
- GetOEMCP (Address: 0x18006d490)
- GetProcAddress (Address: 0x18006d0b8)
- GetProcessHeap (Address: 0x18006d1a8)
- GetStartupInfoW (Address: 0x18006d340)
- GetStdHandle (Address: 0x18006d438)
- GetStringTypeW (Address: 0x18006d1a0)
- GetSystemInfo (Address: 0x18006d158)
- GetSystemTimeAsFileTime (Address: 0x18006d270)
- GetTempPathW (Address: 0x18006d3e0)
- GetThreadContext (Address: 0x18006d0b0)
- GetThreadTimes (Address: 0x18006d0f8)
- GetTickCount64 (Address: 0x18006d278)
- GetTimeFormatW (Address: 0x18006d400)
- GetUserDefaultLCID (Address: 0x18006d428)
- HeapAlloc (Address: 0x18006d3d0)
- HeapFree (Address: 0x18006d3c8)
- HeapReAlloc (Address: 0x18006d460)
- HeapSize (Address: 0x18006d458)
- InitializeConditionVariable (Address: 0x18006d228)
- InitializeCriticalSection (Address: 0x18006d150)
- InitializeCriticalSectionAndSpinCount (Address: 0x18006d2f8)
- InitializeCriticalSectionEx (Address: 0x18006d020)
- InitializeSListHead (Address: 0x18006d350)
- InitializeSRWLock (Address: 0x18006d1b8)
- InitOnceExecuteOnce (Address: 0x18006d220)
- InterlockedFlushSList (Address: 0x18006d360)
- InterlockedPushEntrySList (Address: 0x18006d358)
- IsDebuggerPresent (Address: 0x18006d2f0)
- IsProcessorFeaturePresent (Address: 0x18006d338)
- IsThreadAFiber (Address: 0x18006d3e8)
- IsValidCodePage (Address: 0x18006d480)
- IsValidLocale (Address: 0x18006d420)
- IsWow64Process (Address: 0x18006d128)
- LCMapStringW (Address: 0x18006d410)
- LeaveCriticalSection (Address: 0x18006d148)
- LoadLibraryExW (Address: 0x18006d3a0)
- LoadLibraryW (Address: 0x18006d090)
- LocalFree (Address: 0x18006d2e8)
- MapViewOfFile (Address: 0x18006d118)
- Module32FirstW (Address: 0x18006d0a0)
- Module32NextW (Address: 0x18006d100)
- MultiByteToWideChar (Address: 0x18006d4b0)
- OpenProcess (Address: 0x18006d058)
- OpenThread (Address: 0x18006d130)
- OutputDebugStringW (Address: 0x18006d070)
- QueryPerformanceCounter (Address: 0x18006d1e8)
- QueryPerformanceFrequency (Address: 0x18006d1f0)
- QueueUserAPC (Address: 0x18006d098)
- RaiseException (Address: 0x18006d088)
- ReadConsoleW (Address: 0x18006d168)
- ReadFile (Address: 0x18006d170)
- ReadProcessMemory (Address: 0x18006d0d0)
- ReleaseSRWLockExclusive (Address: 0x18006d1c0)
- ResetEvent (Address: 0x18006d308)
- ResumeThread (Address: 0x18006d048)
- SetConsoleCtrlHandler (Address: 0x18006d3d8)
- SetEnvironmentVariableW (Address: 0x18006d1b0)
- SetEvent (Address: 0x18006d300)
- SetFileInformationByHandle (Address: 0x18006d1f8)
- SetFilePointerEx (Address: 0x18006d450)
- SetLastError (Address: 0x18006d368)
- SetStdHandle (Address: 0x18006d178)
- SetThreadContext (Address: 0x18006d120)
- SetThreadpoolTimer (Address: 0x18006d2a8)
- SetThreadpoolWait (Address: 0x18006d2c8)
- SetUnhandledExceptionFilter (Address: 0x18006d328)
- SleepConditionVariableCS (Address: 0x18006d240)
- SleepConditionVariableSRW (Address: 0x18006d248)
- SubmitThreadpoolWork (Address: 0x18006d290)
- SuspendThread (Address: 0x18006d040)
- TerminateProcess (Address: 0x18006d330)
- Thread32First (Address: 0x18006d028)
- Thread32Next (Address: 0x18006d010)
- TlsAlloc (Address: 0x18006d378)
- TlsFree (Address: 0x18006d390)
- TlsGetValue (Address: 0x18006d380)
- TlsSetValue (Address: 0x18006d388)
- TryEnterCriticalSection (Address: 0x18006d1d0)
- UnhandledExceptionFilter (Address: 0x18006d320)
- UnmapViewOfFile (Address: 0x18006d050)
- VirtualAllocEx (Address: 0x18006d0c0)
- VirtualFreeEx (Address: 0x18006d108)
- VirtualProtect (Address: 0x18006d3f0)
- WaitForSingleObject (Address: 0x18006d030)
- WaitForSingleObjectEx (Address: 0x18006d310)
- WaitForThreadpoolTimerCallbacks (Address: 0x18006d2b0)
- WakeAllConditionVariable (Address: 0x18006d238)
- WakeConditionVariable (Address: 0x18006d230)
- WideCharToMultiByte (Address: 0x18006d0e8)
- Wow64GetThreadContext (Address: 0x18006d018)
- Wow64SetThreadContext (Address: 0x18006d008)
- WriteConsoleW (Address: 0x18006d160)
- WriteFile (Address: 0x18006d190)
- WriteProcessMemory (Address: 0x18006d000)
ntdll.dll
- RtlCaptureContext (Address: 0x18006d510)
- RtlLookupFunctionEntry (Address: 0x18006d518)
- RtlPcToFileHeader (Address: 0x18006d508)
- RtlUnwind (Address: 0x18006d4f0)
- RtlUnwindEx (Address: 0x18006d500)
- RtlVirtualUnwind (Address: 0x18006d4f8)
USER32.dll
- FindWindowW (Address: 0x18006d4e0)
- GetWindowThreadProcessId (Address: 0x18006d4d8)
- UnregisterClassW (Address: 0x18006d4d0)