version.dll

Description: https://github.com/acidicoala/Koaloader

Authors: Fuck the copyright \ud83d\udd95

Version: 2.3.1.0

Architecture: 64-bit

Operating System: Windows NT

SHA256: a29c83208c136445e5a767cf10f8dcd4

File Size: 2.2 MB

Uploaded At: Feb. 10, 2026, 3:24 p.m.

Views: 8

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • DllMain (Ordinal: 1, Address: 0x2e360)
  • GetFileVersionInfoA (Ordinal: 2, Address: 0x212084)
  • GetFileVersionInfoByHandle (Ordinal: 3, Address: 0x2120cf)
  • GetFileVersionInfoExA (Ordinal: 4, Address: 0x21211c)
  • GetFileVersionInfoExW (Ordinal: 5, Address: 0x212164)
  • GetFileVersionInfoSizeA (Ordinal: 6, Address: 0x2121ae)
  • GetFileVersionInfoSizeExA (Ordinal: 7, Address: 0x2121fc)
  • GetFileVersionInfoSizeExW (Ordinal: 8, Address: 0x21224c)
  • GetFileVersionInfoSizeW (Ordinal: 9, Address: 0x21229a)
  • GetFileVersionInfoW (Ordinal: 10, Address: 0x2122e2)
  • VerFindFileA (Ordinal: 11, Address: 0x21231f)
  • VerFindFileW (Ordinal: 12, Address: 0x212355)
  • VerInstallFileA (Ordinal: 13, Address: 0x21238e)
  • VerInstallFileW (Ordinal: 14, Address: 0x2123ca)
  • VerLanguageNameA (Ordinal: 15, Address: 0x212407)
  • VerLanguageNameW (Ordinal: 16, Address: 0x212445)
  • VerQueryValueA (Ordinal: 17, Address: 0x212481)
  • VerQueryValueW (Ordinal: 18, Address: 0x2124bb)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180160308)
  • AreFileApisANSI (Address: 0x1801602b8)
  • CloseHandle (Address: 0x1801600b0)
  • CloseThreadpoolTimer (Address: 0x180160408)
  • CloseThreadpoolWait (Address: 0x180160420)
  • CloseThreadpoolWork (Address: 0x1801603e8)
  • CompareStringEx (Address: 0x180160428)
  • CompareStringW (Address: 0x180160508)
  • CopyFileW (Address: 0x1801602d0)
  • CreateDirectoryExW (Address: 0x1801602c8)
  • CreateDirectoryW (Address: 0x180160230)
  • CreateEventExW (Address: 0x1801603a8)
  • CreateEventW (Address: 0x1801601a8)
  • CreateFileMappingW (Address: 0x1801600b8)
  • CreateFileW (Address: 0x180160238)
  • CreateHardLinkW (Address: 0x1801602e0)
  • CreateSemaphoreExW (Address: 0x1801603b0)
  • CreateSymbolicLinkW (Address: 0x1801602f0)
  • CreateThread (Address: 0x1801604c0)
  • CreateThreadpoolTimer (Address: 0x1801603f0)
  • CreateThreadpoolWait (Address: 0x180160410)
  • CreateThreadpoolWork (Address: 0x1801603d8)
  • DecodePointer (Address: 0x180160370)
  • DeleteCriticalSection (Address: 0x1801600e8)
  • DeleteFileW (Address: 0x180160590)
  • DeviceIoControl (Address: 0x1801602c0)
  • DisableThreadLibraryCalls (Address: 0x180160000)
  • EncodePointer (Address: 0x180160368)
  • EnterCriticalSection (Address: 0x1801600d8)
  • EnumSystemLocalesW (Address: 0x180160530)
  • ExitProcess (Address: 0x1801604a0)
  • ExitThread (Address: 0x1801604c8)
  • FindClose (Address: 0x180160240)
  • FindFirstFileExW (Address: 0x180160248)
  • FindNextFileW (Address: 0x180160250)
  • FlsAlloc (Address: 0x180160380)
  • FlsFree (Address: 0x180160398)
  • FlsGetValue (Address: 0x180160388)
  • FlsSetValue (Address: 0x180160390)
  • FlushFileBuffers (Address: 0x180160538)
  • FlushProcessWriteBuffers (Address: 0x1801603b8)
  • FormatMessageA (Address: 0x180160218)
  • FormatMessageW (Address: 0x180160060)
  • FreeEnvironmentStringsW (Address: 0x180160170)
  • FreeLibrary (Address: 0x180160038)
  • FreeLibraryAndExitThread (Address: 0x1801604d8)
  • FreeLibraryWhenCallbackReturns (Address: 0x1801603d0)
  • GetACP (Address: 0x180160570)
  • GetCommandLineA (Address: 0x180160598)
  • GetCommandLineW (Address: 0x180160180)
  • GetConsoleMode (Address: 0x180160130)
  • GetConsoleOutputCP (Address: 0x180160540)
  • GetConsoleScreenBufferInfo (Address: 0x180160140)
  • GetCPInfo (Address: 0x180160430)
  • GetCurrentDirectoryW (Address: 0x180160228)
  • GetCurrentProcess (Address: 0x180160020)
  • GetCurrentProcessId (Address: 0x180160108)
  • GetCurrentProcessorNumber (Address: 0x1801603c0)
  • GetCurrentThread (Address: 0x1801604e0)
  • GetCurrentThreadId (Address: 0x180160110)
  • GetDateFormatW (Address: 0x1801604f8)
  • GetDiskFreeSpaceExW (Address: 0x180160258)
  • GetDynamicTimeZoneInformation (Address: 0x180160118)
  • GetEnvironmentStringsW (Address: 0x180160178)
  • GetExitCodeThread (Address: 0x180160330)
  • GetFileAttributesA (Address: 0x1801600f8)
  • GetFileAttributesExW (Address: 0x180160268)
  • GetFileAttributesW (Address: 0x180160260)
  • GetFileInformationByHandle (Address: 0x180160270)
  • GetFileInformationByHandleEx (Address: 0x1801602e8)
  • GetFileSizeEx (Address: 0x180160550)
  • GetFileType (Address: 0x1801604b8)
  • GetFinalPathNameByHandleW (Address: 0x180160278)
  • GetFullPathNameW (Address: 0x180160280)
  • GetLastError (Address: 0x180160008)
  • GetLocaleInfoEx (Address: 0x180160438)
  • GetLocaleInfoW (Address: 0x180160518)
  • GetModuleFileNameW (Address: 0x180160040)
  • GetModuleHandleExW (Address: 0x1801604a8)
  • GetModuleHandleW (Address: 0x180160048)
  • GetNativeSystemInfo (Address: 0x180160338)
  • GetOEMCP (Address: 0x180160578)
  • GetProcAddress (Address: 0x180160050)
  • GetProcessHeap (Address: 0x180160160)
  • GetStartupInfoW (Address: 0x1801601e0)
  • GetStdHandle (Address: 0x180160120)
  • GetStringTypeW (Address: 0x180160440)
  • GetSystemDirectoryW (Address: 0x180160028)
  • GetSystemInfo (Address: 0x180160080)
  • GetSystemTimeAsFileTime (Address: 0x180160200)
  • GetTempPathW (Address: 0x1801602b0)
  • GetTickCount64 (Address: 0x1801603c8)
  • GetTimeFormatW (Address: 0x180160500)
  • GetTimeZoneInformation (Address: 0x180160588)
  • GetUserDefaultLCID (Address: 0x180160528)
  • HeapAlloc (Address: 0x1801604f0)
  • HeapFree (Address: 0x1801604e8)
  • HeapReAlloc (Address: 0x180160560)
  • HeapSize (Address: 0x180160150)
  • InitializeConditionVariable (Address: 0x180160340)
  • InitializeCriticalSection (Address: 0x1801600d0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180160188)
  • InitializeCriticalSectionEx (Address: 0x180160310)
  • InitializeSListHead (Address: 0x180160208)
  • InitializeSRWLock (Address: 0x1801602f8)
  • InitOnceExecuteOnce (Address: 0x1801603a0)
  • InterlockedFlushSList (Address: 0x180160468)
  • InterlockedPushEntrySList (Address: 0x180160460)
  • IsDebuggerPresent (Address: 0x1801601c8)
  • IsProcessorFeaturePresent (Address: 0x1801601e8)
  • IsValidCodePage (Address: 0x180160568)
  • IsValidLocale (Address: 0x180160520)
  • K32GetModuleInformation (Address: 0x180160068)
  • LCMapStringEx (Address: 0x180160378)
  • LCMapStringW (Address: 0x180160510)
  • LeaveCriticalSection (Address: 0x1801600e0)
  • LoadLibraryA (Address: 0x1801600a0)
  • LoadLibraryExW (Address: 0x180160498)
  • LoadLibraryW (Address: 0x180160058)
  • LocalFree (Address: 0x180160210)
  • MapViewOfFile (Address: 0x1801600c0)
  • MoveFileExW (Address: 0x1801602d8)
  • MultiByteToWideChar (Address: 0x180160010)
  • OutputDebugStringA (Address: 0x1801600a8)
  • OutputDebugStringW (Address: 0x180160158)
  • QueryPerformanceCounter (Address: 0x1801601f8)
  • QueryPerformanceFrequency (Address: 0x180160320)
  • RaiseException (Address: 0x180160450)
  • ReadConsoleW (Address: 0x180160558)
  • ReadFile (Address: 0x180160548)
  • ReadProcessMemory (Address: 0x180160078)
  • ReleaseSRWLockExclusive (Address: 0x180160300)
  • ResetEvent (Address: 0x180160198)
  • ResumeThread (Address: 0x1801604d0)
  • RtlCaptureContext (Address: 0x1801601b0)
  • RtlLookupFunctionEntry (Address: 0x1801601b8)
  • RtlPcToFileHeader (Address: 0x180160448)
  • RtlUnwind (Address: 0x1801605a0)
  • RtlUnwindEx (Address: 0x180160458)
  • RtlVirtualUnwind (Address: 0x1801601c0)
  • SetConsoleCtrlHandler (Address: 0x180160580)
  • SetConsoleTextAttribute (Address: 0x180160148)
  • SetCurrentDirectoryW (Address: 0x180160220)
  • SetEndOfFile (Address: 0x180160288)
  • SetEnvironmentVariableW (Address: 0x180160168)
  • SetEvent (Address: 0x180160190)
  • SetFileAttributesW (Address: 0x180160290)
  • SetFileInformationByHandle (Address: 0x180160298)
  • SetFilePointerEx (Address: 0x1801602a0)
  • SetFileTime (Address: 0x1801602a8)
  • SetLastError (Address: 0x180160470)
  • SetStdHandle (Address: 0x1801604b0)
  • SetThreadpoolTimer (Address: 0x1801603f8)
  • SetThreadpoolWait (Address: 0x180160418)
  • SetUnhandledExceptionFilter (Address: 0x1801601d8)
  • Sleep (Address: 0x180160100)
  • SleepConditionVariableCS (Address: 0x180160358)
  • SleepConditionVariableSRW (Address: 0x180160360)
  • SubmitThreadpoolWork (Address: 0x1801603e0)
  • SwitchToThread (Address: 0x180160328)
  • TerminateProcess (Address: 0x1801601f0)
  • TlsAlloc (Address: 0x180160478)
  • TlsFree (Address: 0x180160490)
  • TlsGetValue (Address: 0x180160480)
  • TlsSetValue (Address: 0x180160488)
  • TryEnterCriticalSection (Address: 0x180160318)
  • UnhandledExceptionFilter (Address: 0x1801601d0)
  • UnmapViewOfFile (Address: 0x1801600c8)
  • VirtualAlloc (Address: 0x180160088)
  • VirtualFree (Address: 0x180160090)
  • VirtualProtect (Address: 0x180160070)
  • VirtualQuery (Address: 0x180160098)
  • WaitForSingleObjectEx (Address: 0x1801601a0)
  • WaitForThreadpoolTimerCallbacks (Address: 0x180160400)
  • WakeAllConditionVariable (Address: 0x180160350)
  • WakeConditionVariable (Address: 0x180160348)
  • WideCharToMultiByte (Address: 0x180160018)
  • WriteConsoleA (Address: 0x180160138)
  • WriteConsoleW (Address: 0x1801600f0)
  • WriteFile (Address: 0x180160128)
  • WriteProcessMemory (Address: 0x180160030)
USER32.dll
  • MessageBoxW (Address: 0x1801605b0)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x1801605c0)
  • GetFileVersionInfoW (Address: 0x1801605c8)
  • VerQueryValueW (Address: 0x1801605d0)