HD2CheatMenu.dll
Description: HD2 Cheat Menu
Authors: Zodiac
Version: 2.6.0.0
Architecture: 64-bit
Operating System: Unknown (0x0)
SHA256: 9623f978cae987145493282a01e77906
File Size: 4.1 MB
Uploaded At: Feb. 11, 2026, 5:53 a.m.
Views: 8
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
No exported functions.
Imported DLLs & Functions
api-ms-win-core-synch-l1-2-0.dll
- WaitOnAddress (Address: 0x1803a4548)
- WakeByAddressAll (Address: 0x1803a4550)
d3d11.dll
- D3D11CreateDeviceAndSwapChain (Address: 0x1803a4560)
d3d12.dll
- (Address: 0x1803a4570)
D3DCOMPILER_47.dll
- D3DCompile (Address: 0x1803a4000)
dxgi.dll
- CreateDXGIFactory1 (Address: 0x1803a4580)
IMM32.dll
- ImmGetContext (Address: 0x1803a4020)
- ImmReleaseContext (Address: 0x1803a4018)
- ImmSetCandidateWindow (Address: 0x1803a4028)
- ImmSetCompositionWindow (Address: 0x1803a4010)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x1803a42d0)
- AreFileApisANSI (Address: 0x1803a42b0)
- Beep (Address: 0x1803a41c0)
- CloseHandle (Address: 0x1803a4218)
- CreateDirectoryW (Address: 0x1803a4278)
- CreateEventA (Address: 0x1803a4210)
- CreateFile2 (Address: 0x1803a42a8)
- CreateFileW (Address: 0x1803a40e8)
- CreateThread (Address: 0x1803a41c8)
- CreateToolhelp32Snapshot (Address: 0x1803a43c8)
- DecodePointer (Address: 0x1803a4350)
- DeleteCriticalSection (Address: 0x1803a4340)
- EncodePointer (Address: 0x1803a4348)
- EnterCriticalSection (Address: 0x1803a4328)
- EnumSystemLocalesW (Address: 0x1803a4180)
- ExitProcess (Address: 0x1803a41f8)
- ExitThread (Address: 0x1803a4258)
- FindClose (Address: 0x1803a4280)
- FindFirstFileExW (Address: 0x1803a4290)
- FindFirstFileW (Address: 0x1803a4288)
- FindNextFileW (Address: 0x1803a4298)
- FlsAlloc (Address: 0x1803a4430)
- FlsFree (Address: 0x1803a4260)
- FlsGetValue (Address: 0x1803a4270)
- FlsSetValue (Address: 0x1803a4268)
- FlushFileBuffers (Address: 0x1803a4158)
- FlushInstructionCache (Address: 0x1803a40c0)
- FormatMessageA (Address: 0x1803a4318)
- FreeEnvironmentStringsW (Address: 0x1803a4100)
- FreeLibrary (Address: 0x1803a4078)
- FreeLibraryAndExitThread (Address: 0x1803a4250)
- GetACP (Address: 0x1803a4128)
- GetCommandLineA (Address: 0x1803a4228)
- GetCommandLineW (Address: 0x1803a4110)
- GetConsoleMode (Address: 0x1803a4140)
- GetConsoleOutputCP (Address: 0x1803a4148)
- GetCPInfo (Address: 0x1803a4368)
- GetCurrentProcess (Address: 0x1803a40a0)
- GetCurrentProcessId (Address: 0x1803a4380)
- GetCurrentThreadId (Address: 0x1803a42e0)
- GetEnvironmentStringsW (Address: 0x1803a4108)
- GetExitCodeThread (Address: 0x1803a4308)
- GetFileAttributesExW (Address: 0x1803a42a0)
- GetFileInformationByHandleEx (Address: 0x1803a42c0)
- GetFileSizeEx (Address: 0x1803a4178)
- GetFileType (Address: 0x1803a4160)
- GetLastError (Address: 0x1803a42b8)
- GetLocaleInfoA (Address: 0x1803a4060)
- GetLocaleInfoEx (Address: 0x1803a4320)
- GetLocaleInfoW (Address: 0x1803a4198)
- GetModuleFileNameW (Address: 0x1803a40b0)
- GetModuleHandleA (Address: 0x1803a4208)
- GetModuleHandleExW (Address: 0x1803a4248)
- GetModuleHandleW (Address: 0x1803a4230)
- GetOEMCP (Address: 0x1803a4120)
- GetProcAddress (Address: 0x1803a41b8)
- GetProcessHeap (Address: 0x1803a40f8)
- GetStartupInfoW (Address: 0x1803a4378)
- GetStdHandle (Address: 0x1803a4168)
- GetStringTypeW (Address: 0x1803a4360)
- GetSystemInfo (Address: 0x1803a43f8)
- GetSystemTimeAsFileTime (Address: 0x1803a4388)
- GetSystemTimePreciseAsFileTime (Address: 0x1803a42f8)
- GetThreadContext (Address: 0x1803a43e0)
- GetUserDefaultLCID (Address: 0x1803a4188)
- GlobalAlloc (Address: 0x1803a4038)
- GlobalFree (Address: 0x1803a4040)
- GlobalLock (Address: 0x1803a4048)
- GlobalUnlock (Address: 0x1803a4050)
- HeapAlloc (Address: 0x1803a43d8)
- HeapCreate (Address: 0x1803a4398)
- HeapFree (Address: 0x1803a43a0)
- HeapReAlloc (Address: 0x1803a43d0)
- HeapSize (Address: 0x1803a40e0)
- InitializeCriticalSectionEx (Address: 0x1803a4338)
- InitializeSListHead (Address: 0x1803a4390)
- InterlockedFlushSList (Address: 0x1803a4420)
- IsDBCSLeadByte (Address: 0x1803a4070)
- IsDebuggerPresent (Address: 0x1803a41d8)
- IsProcessorFeaturePresent (Address: 0x1803a4238)
- IsValidCodePage (Address: 0x1803a4130)
- IsValidLocale (Address: 0x1803a4190)
- LCMapStringEx (Address: 0x1803a4358)
- LCMapStringW (Address: 0x1803a41a0)
- LeaveCriticalSection (Address: 0x1803a4330)
- LoadLibraryA (Address: 0x1803a4058)
- LoadLibraryExW (Address: 0x1803a41a8)
- LocalFree (Address: 0x1803a4310)
- MultiByteToWideChar (Address: 0x1803a4118)
- OpenThread (Address: 0x1803a43f0)
- QueryPerformanceCounter (Address: 0x1803a4080)
- QueryPerformanceFrequency (Address: 0x1803a4068)
- RaiseException (Address: 0x1803a4418)
- ReadConsoleW (Address: 0x1803a4138)
- ReadFile (Address: 0x1803a4240)
- ReadProcessMemory (Address: 0x1803a40b8)
- ReleaseSRWLockExclusive (Address: 0x1803a42c8)
- ResumeThread (Address: 0x1803a43c0)
- RtlCaptureContext (Address: 0x1803a41e8)
- RtlLookupFunctionEntry (Address: 0x1803a4400)
- RtlPcToFileHeader (Address: 0x1803a4410)
- RtlUnwind (Address: 0x1803a4438)
- RtlUnwindEx (Address: 0x1803a4408)
- RtlVirtualUnwind (Address: 0x1803a41e0)
- SetEndOfFile (Address: 0x1803a40d0)
- SetFilePointerEx (Address: 0x1803a4170)
- SetLastError (Address: 0x1803a4428)
- SetStdHandle (Address: 0x1803a40f0)
- SetThreadContext (Address: 0x1803a43e8)
- SetUnhandledExceptionFilter (Address: 0x1803a4370)
- Sleep (Address: 0x1803a4200)
- SleepConditionVariableSRW (Address: 0x1803a42f0)
- SuspendThread (Address: 0x1803a43b8)
- TerminateProcess (Address: 0x1803a41f0)
- Thread32First (Address: 0x1803a43b0)
- Thread32Next (Address: 0x1803a43a8)
- TryAcquireSRWLockExclusive (Address: 0x1803a42d8)
- UnhandledExceptionFilter (Address: 0x1803a41d0)
- VirtualAlloc (Address: 0x1803a40a8)
- VirtualFree (Address: 0x1803a4098)
- VirtualProtect (Address: 0x1803a4090)
- VirtualQuery (Address: 0x1803a40c8)
- WaitForSingleObject (Address: 0x1803a4220)
- WaitForSingleObjectEx (Address: 0x1803a4300)
- WakeAllConditionVariable (Address: 0x1803a42e8)
- WideCharToMultiByte (Address: 0x1803a41b0)
- WriteConsoleW (Address: 0x1803a40d8)
- WriteFile (Address: 0x1803a4150)
- WriteProcessMemory (Address: 0x1803a4088)
SHELL32.dll
- ShellExecuteW (Address: 0x1803a4448)
USER32.dll
- CallWindowProcA (Address: 0x1803a44b8)
- ClientToScreen (Address: 0x1803a44f0)
- CloseClipboard (Address: 0x1803a4490)
- CreateWindowExW (Address: 0x1803a4458)
- DefWindowProcW (Address: 0x1803a4468)
- DestroyWindow (Address: 0x1803a4460)
- EmptyClipboard (Address: 0x1803a4488)
- GetAsyncKeyState (Address: 0x1803a4470)
- GetCapture (Address: 0x1803a44e8)
- GetClientRect (Address: 0x1803a4520)
- GetClipboardData (Address: 0x1803a4480)
- GetCursorPos (Address: 0x1803a44a0)
- GetForegroundWindow (Address: 0x1803a4508)
- GetKeyboardLayout (Address: 0x1803a4500)
- GetKeyState (Address: 0x1803a44c8)
- GetMessageExtraInfo (Address: 0x1803a44d0)
- IsWindowUnicode (Address: 0x1803a4528)
- LoadCursorA (Address: 0x1803a44d8)
- OpenClipboard (Address: 0x1803a4498)
- RegisterClassExW (Address: 0x1803a4478)
- ReleaseCapture (Address: 0x1803a4530)
- ScreenToClient (Address: 0x1803a44e0)
- SetCapture (Address: 0x1803a4510)
- SetClipboardData (Address: 0x1803a44b0)
- SetCursor (Address: 0x1803a4518)
- SetCursorPos (Address: 0x1803a4538)
- SetWindowLongPtrA (Address: 0x1803a44c0)
- TrackMouseEvent (Address: 0x1803a44f8)
- UnregisterClassW (Address: 0x1803a44a8)