zr.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 56157224ce1db5ed424e49b793af09b4

File Size: 1.4 MB

Uploaded At: Feb. 10, 2026, 11:58 a.m.

Views: 7

Exported Functions

No exported functions.

Imported DLLs & Functions

d3d11.dll
  • D3D11CreateDeviceAndSwapChain (Address: 0x180114518)
D3DCOMPILER_47.dll
  • D3DCompile (Address: 0x180114000)
dwmapi.dll
  • DwmEnableBlurBehindWindow (Address: 0x180114538)
  • DwmGetColorizationColor (Address: 0x180114530)
  • DwmIsCompositionEnabled (Address: 0x180114528)
GDI32.dll
  • CreateRectRgn (Address: 0x180114010)
  • DeleteObject (Address: 0x180114018)
  • GetDeviceCaps (Address: 0x180114020)
IMM32.dll
  • ImmGetContext (Address: 0x180114040)
  • ImmReleaseContext (Address: 0x180114038)
  • ImmSetCandidateWindow (Address: 0x180114048)
  • ImmSetCompositionWindow (Address: 0x180114030)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180114240)
  • AllocConsole (Address: 0x1801140e8)
  • CloseHandle (Address: 0x1801141d0)
  • CreateFileW (Address: 0x180114348)
  • CreateThread (Address: 0x1801140d8)
  • CreateToolhelp32Snapshot (Address: 0x1801141b0)
  • DecodePointer (Address: 0x180114288)
  • DeleteCriticalSection (Address: 0x180114268)
  • DisableThreadLibraryCalls (Address: 0x1801140e0)
  • EncodePointer (Address: 0x180114280)
  • EnterCriticalSection (Address: 0x180114250)
  • EnumSystemLocalesW (Address: 0x1801140c8)
  • ExitProcess (Address: 0x180114400)
  • ExitThread (Address: 0x1801143c0)
  • FindClose (Address: 0x180114080)
  • FindFirstFileExW (Address: 0x180114078)
  • FindNextFileW (Address: 0x180114070)
  • FlsAlloc (Address: 0x180114408)
  • FlsFree (Address: 0x180114420)
  • FlsGetValue (Address: 0x180114410)
  • FlsSetValue (Address: 0x180114418)
  • FlushFileBuffers (Address: 0x1801140b0)
  • FlushInstructionCache (Address: 0x180114200)
  • FreeEnvironmentStringsW (Address: 0x180114330)
  • FreeLibrary (Address: 0x180114140)
  • FreeLibraryAndExitThread (Address: 0x1801143c8)
  • GetACP (Address: 0x180114060)
  • GetCommandLineA (Address: 0x180114218)
  • GetCommandLineW (Address: 0x180114320)
  • GetConsoleMode (Address: 0x1801140a0)
  • GetConsoleOutputCP (Address: 0x1801140a8)
  • GetCPInfo (Address: 0x1801142b0)
  • GetCurrentProcess (Address: 0x180114180)
  • GetCurrentProcessId (Address: 0x1801141f0)
  • GetCurrentThreadId (Address: 0x180114198)
  • GetEnvironmentStringsW (Address: 0x180114328)
  • GetFileSizeEx (Address: 0x180114088)
  • GetFileType (Address: 0x1801143e0)
  • GetLastError (Address: 0x1801141c0)
  • GetLocaleInfoA (Address: 0x180114160)
  • GetLocaleInfoW (Address: 0x180114310)
  • GetModuleFileNameW (Address: 0x1801143e8)
  • GetModuleHandleA (Address: 0x180114148)
  • GetModuleHandleExW (Address: 0x1801143d0)
  • GetModuleHandleW (Address: 0x1801141f8)
  • GetOEMCP (Address: 0x180114058)
  • GetProcAddress (Address: 0x180114150)
  • GetProcessHeap (Address: 0x180114338)
  • GetStartupInfoW (Address: 0x1801142f8)
  • GetStdHandle (Address: 0x1801143d8)
  • GetStringTypeW (Address: 0x1801142a8)
  • GetSystemInfo (Address: 0x180114228)
  • GetSystemTimeAsFileTime (Address: 0x180114298)
  • GetThreadContext (Address: 0x1801141e8)
  • GetUserDefaultLCID (Address: 0x1801140d0)
  • GlobalAlloc (Address: 0x1801140f8)
  • GlobalFree (Address: 0x180114110)
  • GlobalLock (Address: 0x180114108)
  • GlobalUnlock (Address: 0x180114100)
  • HeapAlloc (Address: 0x1801141d8)
  • HeapCreate (Address: 0x180114168)
  • HeapDestroy (Address: 0x1801141e0)
  • HeapFree (Address: 0x180114178)
  • HeapReAlloc (Address: 0x1801141c8)
  • HeapSize (Address: 0x180114350)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180114390)
  • InitializeCriticalSectionEx (Address: 0x180114260)
  • InitializeSListHead (Address: 0x180114300)
  • InterlockedFlushSList (Address: 0x180114380)
  • IsDebuggerPresent (Address: 0x1801142f0)
  • IsProcessorFeaturePresent (Address: 0x1801142e8)
  • IsValidCodePage (Address: 0x180114068)
  • IsValidLocale (Address: 0x180114308)
  • LCMapStringEx (Address: 0x180114290)
  • LCMapStringW (Address: 0x180114318)
  • LeaveCriticalSection (Address: 0x180114258)
  • LoadLibraryA (Address: 0x180114158)
  • LoadLibraryExW (Address: 0x1801143b8)
  • MultiByteToWideChar (Address: 0x180114118)
  • OpenThread (Address: 0x180114210)
  • OutputDebugStringW (Address: 0x1801140b8)
  • QueryPerformanceCounter (Address: 0x180114130)
  • QueryPerformanceFrequency (Address: 0x180114138)
  • RaiseException (Address: 0x180114370)
  • ReadConsoleW (Address: 0x180114098)
  • ReadFile (Address: 0x1801143f8)
  • ReleaseSRWLockExclusive (Address: 0x180114238)
  • ResumeThread (Address: 0x1801141a8)
  • RtlCaptureContext (Address: 0x1801142b8)
  • RtlLookupFunctionEntry (Address: 0x1801142c0)
  • RtlPcToFileHeader (Address: 0x180114368)
  • RtlUnwind (Address: 0x1801142a0)
  • RtlUnwindEx (Address: 0x180114378)
  • RtlVirtualUnwind (Address: 0x1801142c8)
  • SetConsoleTitleA (Address: 0x1801140f0)
  • SetEndOfFile (Address: 0x180114358)
  • SetFilePointerEx (Address: 0x180114090)
  • SetLastError (Address: 0x180114388)
  • SetStdHandle (Address: 0x180114340)
  • SetThreadContext (Address: 0x180114208)
  • SetUnhandledExceptionFilter (Address: 0x1801142d8)
  • Sleep (Address: 0x1801141b8)
  • SleepConditionVariableSRW (Address: 0x180114278)
  • SuspendThread (Address: 0x1801141a0)
  • TerminateProcess (Address: 0x1801142e0)
  • Thread32First (Address: 0x180114190)
  • Thread32Next (Address: 0x180114188)
  • TlsAlloc (Address: 0x180114398)
  • TlsFree (Address: 0x1801143b0)
  • TlsGetValue (Address: 0x1801143a0)
  • TlsSetValue (Address: 0x1801143a8)
  • TryAcquireSRWLockExclusive (Address: 0x180114248)
  • UnhandledExceptionFilter (Address: 0x1801142d0)
  • VerSetConditionMask (Address: 0x180114128)
  • VirtualAlloc (Address: 0x180114220)
  • VirtualFree (Address: 0x180114360)
  • VirtualProtect (Address: 0x180114170)
  • VirtualQuery (Address: 0x180114230)
  • WakeAllConditionVariable (Address: 0x180114270)
  • WideCharToMultiByte (Address: 0x180114120)
  • WriteConsoleW (Address: 0x1801143f0)
  • WriteFile (Address: 0x1801140c0)
SHELL32.dll
  • ShellExecuteW (Address: 0x180114430)
USER32.dll
  • ClientToScreen (Address: 0x180114480)
  • CloseClipboard (Address: 0x1801144b8)
  • EmptyClipboard (Address: 0x1801144f0)
  • GetAsyncKeyState (Address: 0x180114450)
  • GetCapture (Address: 0x1801144c8)
  • GetClientRect (Address: 0x180114498)
  • GetClipboardData (Address: 0x1801144f8)
  • GetCursorPos (Address: 0x180114440)
  • GetDC (Address: 0x1801144a8)
  • GetForegroundWindow (Address: 0x180114448)
  • GetKeyboardLayout (Address: 0x1801144e8)
  • GetKeyState (Address: 0x1801144d0)
  • GetMessageExtraInfo (Address: 0x1801144d8)
  • IsWindowUnicode (Address: 0x1801144b0)
  • LoadCursorA (Address: 0x180114478)
  • MonitorFromWindow (Address: 0x180114470)
  • OpenClipboard (Address: 0x180114460)
  • ReleaseCapture (Address: 0x180114458)
  • ReleaseDC (Address: 0x1801144a0)
  • ScreenToClient (Address: 0x180114508)
  • SetCapture (Address: 0x1801144c0)
  • SetClipboardData (Address: 0x180114500)
  • SetCursor (Address: 0x180114488)
  • SetCursorPos (Address: 0x180114490)
  • SetProcessDPIAware (Address: 0x180114468)
  • TrackMouseEvent (Address: 0x1801144e0)