version.dll
Description: https://github.com/acidicoala/Koaloader
Authors: Fuck the copyright \ud83d\udd95
Version: 2.3.1.0
Architecture: 64-bit
Operating System: Windows NT
SHA256: a29c83208c136445e5a767cf10f8dcd4
File Size: 2.2 MB
Uploaded At: Feb. 10, 2026, 3:24 p.m.
Views: 8
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
- DllMain (Ordinal: 1, Address: 0x2e360)
- GetFileVersionInfoA (Ordinal: 2, Address: 0x212084)
- GetFileVersionInfoByHandle (Ordinal: 3, Address: 0x2120cf)
- GetFileVersionInfoExA (Ordinal: 4, Address: 0x21211c)
- GetFileVersionInfoExW (Ordinal: 5, Address: 0x212164)
- GetFileVersionInfoSizeA (Ordinal: 6, Address: 0x2121ae)
- GetFileVersionInfoSizeExA (Ordinal: 7, Address: 0x2121fc)
- GetFileVersionInfoSizeExW (Ordinal: 8, Address: 0x21224c)
- GetFileVersionInfoSizeW (Ordinal: 9, Address: 0x21229a)
- GetFileVersionInfoW (Ordinal: 10, Address: 0x2122e2)
- VerFindFileA (Ordinal: 11, Address: 0x21231f)
- VerFindFileW (Ordinal: 12, Address: 0x212355)
- VerInstallFileA (Ordinal: 13, Address: 0x21238e)
- VerInstallFileW (Ordinal: 14, Address: 0x2123ca)
- VerLanguageNameA (Ordinal: 15, Address: 0x212407)
- VerLanguageNameW (Ordinal: 16, Address: 0x212445)
- VerQueryValueA (Ordinal: 17, Address: 0x212481)
- VerQueryValueW (Ordinal: 18, Address: 0x2124bb)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180160308)
- AreFileApisANSI (Address: 0x1801602b8)
- CloseHandle (Address: 0x1801600b0)
- CloseThreadpoolTimer (Address: 0x180160408)
- CloseThreadpoolWait (Address: 0x180160420)
- CloseThreadpoolWork (Address: 0x1801603e8)
- CompareStringEx (Address: 0x180160428)
- CompareStringW (Address: 0x180160508)
- CopyFileW (Address: 0x1801602d0)
- CreateDirectoryExW (Address: 0x1801602c8)
- CreateDirectoryW (Address: 0x180160230)
- CreateEventExW (Address: 0x1801603a8)
- CreateEventW (Address: 0x1801601a8)
- CreateFileMappingW (Address: 0x1801600b8)
- CreateFileW (Address: 0x180160238)
- CreateHardLinkW (Address: 0x1801602e0)
- CreateSemaphoreExW (Address: 0x1801603b0)
- CreateSymbolicLinkW (Address: 0x1801602f0)
- CreateThread (Address: 0x1801604c0)
- CreateThreadpoolTimer (Address: 0x1801603f0)
- CreateThreadpoolWait (Address: 0x180160410)
- CreateThreadpoolWork (Address: 0x1801603d8)
- DecodePointer (Address: 0x180160370)
- DeleteCriticalSection (Address: 0x1801600e8)
- DeleteFileW (Address: 0x180160590)
- DeviceIoControl (Address: 0x1801602c0)
- DisableThreadLibraryCalls (Address: 0x180160000)
- EncodePointer (Address: 0x180160368)
- EnterCriticalSection (Address: 0x1801600d8)
- EnumSystemLocalesW (Address: 0x180160530)
- ExitProcess (Address: 0x1801604a0)
- ExitThread (Address: 0x1801604c8)
- FindClose (Address: 0x180160240)
- FindFirstFileExW (Address: 0x180160248)
- FindNextFileW (Address: 0x180160250)
- FlsAlloc (Address: 0x180160380)
- FlsFree (Address: 0x180160398)
- FlsGetValue (Address: 0x180160388)
- FlsSetValue (Address: 0x180160390)
- FlushFileBuffers (Address: 0x180160538)
- FlushProcessWriteBuffers (Address: 0x1801603b8)
- FormatMessageA (Address: 0x180160218)
- FormatMessageW (Address: 0x180160060)
- FreeEnvironmentStringsW (Address: 0x180160170)
- FreeLibrary (Address: 0x180160038)
- FreeLibraryAndExitThread (Address: 0x1801604d8)
- FreeLibraryWhenCallbackReturns (Address: 0x1801603d0)
- GetACP (Address: 0x180160570)
- GetCommandLineA (Address: 0x180160598)
- GetCommandLineW (Address: 0x180160180)
- GetConsoleMode (Address: 0x180160130)
- GetConsoleOutputCP (Address: 0x180160540)
- GetConsoleScreenBufferInfo (Address: 0x180160140)
- GetCPInfo (Address: 0x180160430)
- GetCurrentDirectoryW (Address: 0x180160228)
- GetCurrentProcess (Address: 0x180160020)
- GetCurrentProcessId (Address: 0x180160108)
- GetCurrentProcessorNumber (Address: 0x1801603c0)
- GetCurrentThread (Address: 0x1801604e0)
- GetCurrentThreadId (Address: 0x180160110)
- GetDateFormatW (Address: 0x1801604f8)
- GetDiskFreeSpaceExW (Address: 0x180160258)
- GetDynamicTimeZoneInformation (Address: 0x180160118)
- GetEnvironmentStringsW (Address: 0x180160178)
- GetExitCodeThread (Address: 0x180160330)
- GetFileAttributesA (Address: 0x1801600f8)
- GetFileAttributesExW (Address: 0x180160268)
- GetFileAttributesW (Address: 0x180160260)
- GetFileInformationByHandle (Address: 0x180160270)
- GetFileInformationByHandleEx (Address: 0x1801602e8)
- GetFileSizeEx (Address: 0x180160550)
- GetFileType (Address: 0x1801604b8)
- GetFinalPathNameByHandleW (Address: 0x180160278)
- GetFullPathNameW (Address: 0x180160280)
- GetLastError (Address: 0x180160008)
- GetLocaleInfoEx (Address: 0x180160438)
- GetLocaleInfoW (Address: 0x180160518)
- GetModuleFileNameW (Address: 0x180160040)
- GetModuleHandleExW (Address: 0x1801604a8)
- GetModuleHandleW (Address: 0x180160048)
- GetNativeSystemInfo (Address: 0x180160338)
- GetOEMCP (Address: 0x180160578)
- GetProcAddress (Address: 0x180160050)
- GetProcessHeap (Address: 0x180160160)
- GetStartupInfoW (Address: 0x1801601e0)
- GetStdHandle (Address: 0x180160120)
- GetStringTypeW (Address: 0x180160440)
- GetSystemDirectoryW (Address: 0x180160028)
- GetSystemInfo (Address: 0x180160080)
- GetSystemTimeAsFileTime (Address: 0x180160200)
- GetTempPathW (Address: 0x1801602b0)
- GetTickCount64 (Address: 0x1801603c8)
- GetTimeFormatW (Address: 0x180160500)
- GetTimeZoneInformation (Address: 0x180160588)
- GetUserDefaultLCID (Address: 0x180160528)
- HeapAlloc (Address: 0x1801604f0)
- HeapFree (Address: 0x1801604e8)
- HeapReAlloc (Address: 0x180160560)
- HeapSize (Address: 0x180160150)
- InitializeConditionVariable (Address: 0x180160340)
- InitializeCriticalSection (Address: 0x1801600d0)
- InitializeCriticalSectionAndSpinCount (Address: 0x180160188)
- InitializeCriticalSectionEx (Address: 0x180160310)
- InitializeSListHead (Address: 0x180160208)
- InitializeSRWLock (Address: 0x1801602f8)
- InitOnceExecuteOnce (Address: 0x1801603a0)
- InterlockedFlushSList (Address: 0x180160468)
- InterlockedPushEntrySList (Address: 0x180160460)
- IsDebuggerPresent (Address: 0x1801601c8)
- IsProcessorFeaturePresent (Address: 0x1801601e8)
- IsValidCodePage (Address: 0x180160568)
- IsValidLocale (Address: 0x180160520)
- K32GetModuleInformation (Address: 0x180160068)
- LCMapStringEx (Address: 0x180160378)
- LCMapStringW (Address: 0x180160510)
- LeaveCriticalSection (Address: 0x1801600e0)
- LoadLibraryA (Address: 0x1801600a0)
- LoadLibraryExW (Address: 0x180160498)
- LoadLibraryW (Address: 0x180160058)
- LocalFree (Address: 0x180160210)
- MapViewOfFile (Address: 0x1801600c0)
- MoveFileExW (Address: 0x1801602d8)
- MultiByteToWideChar (Address: 0x180160010)
- OutputDebugStringA (Address: 0x1801600a8)
- OutputDebugStringW (Address: 0x180160158)
- QueryPerformanceCounter (Address: 0x1801601f8)
- QueryPerformanceFrequency (Address: 0x180160320)
- RaiseException (Address: 0x180160450)
- ReadConsoleW (Address: 0x180160558)
- ReadFile (Address: 0x180160548)
- ReadProcessMemory (Address: 0x180160078)
- ReleaseSRWLockExclusive (Address: 0x180160300)
- ResetEvent (Address: 0x180160198)
- ResumeThread (Address: 0x1801604d0)
- RtlCaptureContext (Address: 0x1801601b0)
- RtlLookupFunctionEntry (Address: 0x1801601b8)
- RtlPcToFileHeader (Address: 0x180160448)
- RtlUnwind (Address: 0x1801605a0)
- RtlUnwindEx (Address: 0x180160458)
- RtlVirtualUnwind (Address: 0x1801601c0)
- SetConsoleCtrlHandler (Address: 0x180160580)
- SetConsoleTextAttribute (Address: 0x180160148)
- SetCurrentDirectoryW (Address: 0x180160220)
- SetEndOfFile (Address: 0x180160288)
- SetEnvironmentVariableW (Address: 0x180160168)
- SetEvent (Address: 0x180160190)
- SetFileAttributesW (Address: 0x180160290)
- SetFileInformationByHandle (Address: 0x180160298)
- SetFilePointerEx (Address: 0x1801602a0)
- SetFileTime (Address: 0x1801602a8)
- SetLastError (Address: 0x180160470)
- SetStdHandle (Address: 0x1801604b0)
- SetThreadpoolTimer (Address: 0x1801603f8)
- SetThreadpoolWait (Address: 0x180160418)
- SetUnhandledExceptionFilter (Address: 0x1801601d8)
- Sleep (Address: 0x180160100)
- SleepConditionVariableCS (Address: 0x180160358)
- SleepConditionVariableSRW (Address: 0x180160360)
- SubmitThreadpoolWork (Address: 0x1801603e0)
- SwitchToThread (Address: 0x180160328)
- TerminateProcess (Address: 0x1801601f0)
- TlsAlloc (Address: 0x180160478)
- TlsFree (Address: 0x180160490)
- TlsGetValue (Address: 0x180160480)
- TlsSetValue (Address: 0x180160488)
- TryEnterCriticalSection (Address: 0x180160318)
- UnhandledExceptionFilter (Address: 0x1801601d0)
- UnmapViewOfFile (Address: 0x1801600c8)
- VirtualAlloc (Address: 0x180160088)
- VirtualFree (Address: 0x180160090)
- VirtualProtect (Address: 0x180160070)
- VirtualQuery (Address: 0x180160098)
- WaitForSingleObjectEx (Address: 0x1801601a0)
- WaitForThreadpoolTimerCallbacks (Address: 0x180160400)
- WakeAllConditionVariable (Address: 0x180160350)
- WakeConditionVariable (Address: 0x180160348)
- WideCharToMultiByte (Address: 0x180160018)
- WriteConsoleA (Address: 0x180160138)
- WriteConsoleW (Address: 0x1801600f0)
- WriteFile (Address: 0x180160128)
- WriteProcessMemory (Address: 0x180160030)
USER32.dll
- MessageBoxW (Address: 0x1801605b0)
VERSION.dll
- GetFileVersionInfoSizeW (Address: 0x1801605c0)
- GetFileVersionInfoW (Address: 0x1801605c8)
- VerQueryValueW (Address: 0x1801605d0)