HD2CheatMenu.dll

Description: HD2 Cheat Menu

Authors: Zodiac

Version: 2.6.0.0

Architecture: 64-bit

Operating System: Unknown (0x0)

SHA256: 9623f978cae987145493282a01e77906

File Size: 4.1 MB

Uploaded At: Feb. 11, 2026, 5:53 a.m.

Views: 8

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

No exported functions.

Imported DLLs & Functions

api-ms-win-core-synch-l1-2-0.dll
  • WaitOnAddress (Address: 0x1803a4548)
  • WakeByAddressAll (Address: 0x1803a4550)
d3d11.dll
  • D3D11CreateDeviceAndSwapChain (Address: 0x1803a4560)
d3d12.dll
  • (Address: 0x1803a4570)
D3DCOMPILER_47.dll
  • D3DCompile (Address: 0x1803a4000)
dxgi.dll
  • CreateDXGIFactory1 (Address: 0x1803a4580)
IMM32.dll
  • ImmGetContext (Address: 0x1803a4020)
  • ImmReleaseContext (Address: 0x1803a4018)
  • ImmSetCandidateWindow (Address: 0x1803a4028)
  • ImmSetCompositionWindow (Address: 0x1803a4010)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1803a42d0)
  • AreFileApisANSI (Address: 0x1803a42b0)
  • Beep (Address: 0x1803a41c0)
  • CloseHandle (Address: 0x1803a4218)
  • CreateDirectoryW (Address: 0x1803a4278)
  • CreateEventA (Address: 0x1803a4210)
  • CreateFile2 (Address: 0x1803a42a8)
  • CreateFileW (Address: 0x1803a40e8)
  • CreateThread (Address: 0x1803a41c8)
  • CreateToolhelp32Snapshot (Address: 0x1803a43c8)
  • DecodePointer (Address: 0x1803a4350)
  • DeleteCriticalSection (Address: 0x1803a4340)
  • EncodePointer (Address: 0x1803a4348)
  • EnterCriticalSection (Address: 0x1803a4328)
  • EnumSystemLocalesW (Address: 0x1803a4180)
  • ExitProcess (Address: 0x1803a41f8)
  • ExitThread (Address: 0x1803a4258)
  • FindClose (Address: 0x1803a4280)
  • FindFirstFileExW (Address: 0x1803a4290)
  • FindFirstFileW (Address: 0x1803a4288)
  • FindNextFileW (Address: 0x1803a4298)
  • FlsAlloc (Address: 0x1803a4430)
  • FlsFree (Address: 0x1803a4260)
  • FlsGetValue (Address: 0x1803a4270)
  • FlsSetValue (Address: 0x1803a4268)
  • FlushFileBuffers (Address: 0x1803a4158)
  • FlushInstructionCache (Address: 0x1803a40c0)
  • FormatMessageA (Address: 0x1803a4318)
  • FreeEnvironmentStringsW (Address: 0x1803a4100)
  • FreeLibrary (Address: 0x1803a4078)
  • FreeLibraryAndExitThread (Address: 0x1803a4250)
  • GetACP (Address: 0x1803a4128)
  • GetCommandLineA (Address: 0x1803a4228)
  • GetCommandLineW (Address: 0x1803a4110)
  • GetConsoleMode (Address: 0x1803a4140)
  • GetConsoleOutputCP (Address: 0x1803a4148)
  • GetCPInfo (Address: 0x1803a4368)
  • GetCurrentProcess (Address: 0x1803a40a0)
  • GetCurrentProcessId (Address: 0x1803a4380)
  • GetCurrentThreadId (Address: 0x1803a42e0)
  • GetEnvironmentStringsW (Address: 0x1803a4108)
  • GetExitCodeThread (Address: 0x1803a4308)
  • GetFileAttributesExW (Address: 0x1803a42a0)
  • GetFileInformationByHandleEx (Address: 0x1803a42c0)
  • GetFileSizeEx (Address: 0x1803a4178)
  • GetFileType (Address: 0x1803a4160)
  • GetLastError (Address: 0x1803a42b8)
  • GetLocaleInfoA (Address: 0x1803a4060)
  • GetLocaleInfoEx (Address: 0x1803a4320)
  • GetLocaleInfoW (Address: 0x1803a4198)
  • GetModuleFileNameW (Address: 0x1803a40b0)
  • GetModuleHandleA (Address: 0x1803a4208)
  • GetModuleHandleExW (Address: 0x1803a4248)
  • GetModuleHandleW (Address: 0x1803a4230)
  • GetOEMCP (Address: 0x1803a4120)
  • GetProcAddress (Address: 0x1803a41b8)
  • GetProcessHeap (Address: 0x1803a40f8)
  • GetStartupInfoW (Address: 0x1803a4378)
  • GetStdHandle (Address: 0x1803a4168)
  • GetStringTypeW (Address: 0x1803a4360)
  • GetSystemInfo (Address: 0x1803a43f8)
  • GetSystemTimeAsFileTime (Address: 0x1803a4388)
  • GetSystemTimePreciseAsFileTime (Address: 0x1803a42f8)
  • GetThreadContext (Address: 0x1803a43e0)
  • GetUserDefaultLCID (Address: 0x1803a4188)
  • GlobalAlloc (Address: 0x1803a4038)
  • GlobalFree (Address: 0x1803a4040)
  • GlobalLock (Address: 0x1803a4048)
  • GlobalUnlock (Address: 0x1803a4050)
  • HeapAlloc (Address: 0x1803a43d8)
  • HeapCreate (Address: 0x1803a4398)
  • HeapFree (Address: 0x1803a43a0)
  • HeapReAlloc (Address: 0x1803a43d0)
  • HeapSize (Address: 0x1803a40e0)
  • InitializeCriticalSectionEx (Address: 0x1803a4338)
  • InitializeSListHead (Address: 0x1803a4390)
  • InterlockedFlushSList (Address: 0x1803a4420)
  • IsDBCSLeadByte (Address: 0x1803a4070)
  • IsDebuggerPresent (Address: 0x1803a41d8)
  • IsProcessorFeaturePresent (Address: 0x1803a4238)
  • IsValidCodePage (Address: 0x1803a4130)
  • IsValidLocale (Address: 0x1803a4190)
  • LCMapStringEx (Address: 0x1803a4358)
  • LCMapStringW (Address: 0x1803a41a0)
  • LeaveCriticalSection (Address: 0x1803a4330)
  • LoadLibraryA (Address: 0x1803a4058)
  • LoadLibraryExW (Address: 0x1803a41a8)
  • LocalFree (Address: 0x1803a4310)
  • MultiByteToWideChar (Address: 0x1803a4118)
  • OpenThread (Address: 0x1803a43f0)
  • QueryPerformanceCounter (Address: 0x1803a4080)
  • QueryPerformanceFrequency (Address: 0x1803a4068)
  • RaiseException (Address: 0x1803a4418)
  • ReadConsoleW (Address: 0x1803a4138)
  • ReadFile (Address: 0x1803a4240)
  • ReadProcessMemory (Address: 0x1803a40b8)
  • ReleaseSRWLockExclusive (Address: 0x1803a42c8)
  • ResumeThread (Address: 0x1803a43c0)
  • RtlCaptureContext (Address: 0x1803a41e8)
  • RtlLookupFunctionEntry (Address: 0x1803a4400)
  • RtlPcToFileHeader (Address: 0x1803a4410)
  • RtlUnwind (Address: 0x1803a4438)
  • RtlUnwindEx (Address: 0x1803a4408)
  • RtlVirtualUnwind (Address: 0x1803a41e0)
  • SetEndOfFile (Address: 0x1803a40d0)
  • SetFilePointerEx (Address: 0x1803a4170)
  • SetLastError (Address: 0x1803a4428)
  • SetStdHandle (Address: 0x1803a40f0)
  • SetThreadContext (Address: 0x1803a43e8)
  • SetUnhandledExceptionFilter (Address: 0x1803a4370)
  • Sleep (Address: 0x1803a4200)
  • SleepConditionVariableSRW (Address: 0x1803a42f0)
  • SuspendThread (Address: 0x1803a43b8)
  • TerminateProcess (Address: 0x1803a41f0)
  • Thread32First (Address: 0x1803a43b0)
  • Thread32Next (Address: 0x1803a43a8)
  • TryAcquireSRWLockExclusive (Address: 0x1803a42d8)
  • UnhandledExceptionFilter (Address: 0x1803a41d0)
  • VirtualAlloc (Address: 0x1803a40a8)
  • VirtualFree (Address: 0x1803a4098)
  • VirtualProtect (Address: 0x1803a4090)
  • VirtualQuery (Address: 0x1803a40c8)
  • WaitForSingleObject (Address: 0x1803a4220)
  • WaitForSingleObjectEx (Address: 0x1803a4300)
  • WakeAllConditionVariable (Address: 0x1803a42e8)
  • WideCharToMultiByte (Address: 0x1803a41b0)
  • WriteConsoleW (Address: 0x1803a40d8)
  • WriteFile (Address: 0x1803a4150)
  • WriteProcessMemory (Address: 0x1803a4088)
SHELL32.dll
  • ShellExecuteW (Address: 0x1803a4448)
USER32.dll
  • CallWindowProcA (Address: 0x1803a44b8)
  • ClientToScreen (Address: 0x1803a44f0)
  • CloseClipboard (Address: 0x1803a4490)
  • CreateWindowExW (Address: 0x1803a4458)
  • DefWindowProcW (Address: 0x1803a4468)
  • DestroyWindow (Address: 0x1803a4460)
  • EmptyClipboard (Address: 0x1803a4488)
  • GetAsyncKeyState (Address: 0x1803a4470)
  • GetCapture (Address: 0x1803a44e8)
  • GetClientRect (Address: 0x1803a4520)
  • GetClipboardData (Address: 0x1803a4480)
  • GetCursorPos (Address: 0x1803a44a0)
  • GetForegroundWindow (Address: 0x1803a4508)
  • GetKeyboardLayout (Address: 0x1803a4500)
  • GetKeyState (Address: 0x1803a44c8)
  • GetMessageExtraInfo (Address: 0x1803a44d0)
  • IsWindowUnicode (Address: 0x1803a4528)
  • LoadCursorA (Address: 0x1803a44d8)
  • OpenClipboard (Address: 0x1803a4498)
  • RegisterClassExW (Address: 0x1803a4478)
  • ReleaseCapture (Address: 0x1803a4530)
  • ScreenToClient (Address: 0x1803a44e0)
  • SetCapture (Address: 0x1803a4510)
  • SetClipboardData (Address: 0x1803a44b0)
  • SetCursor (Address: 0x1803a4518)
  • SetCursorPos (Address: 0x1803a4538)
  • SetWindowLongPtrA (Address: 0x1803a44c0)
  • TrackMouseEvent (Address: 0x1803a44f8)
  • UnregisterClassW (Address: 0x1803a44a8)