aseprite-thumbnailer-x64.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: e86b0ceee9683c42c3c4fe9e3406c771

File Size: 2.2 MB

Uploaded At: Feb. 15, 2026, 4:22 a.m.

Views: 13

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x9a7f)
  • DllGetClassObject (Ordinal: 2, Address: 0xc7ed)
  • DllMain (Ordinal: 3, Address: 0x74c3)
  • DllRegisterServer (Ordinal: 4, Address: 0x1f28)
  • DllUnregisterServer (Ordinal: 5, Address: 0xad3a)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x180238020)
  • RegCreateKeyExW (Address: 0x180238018)
  • RegDeleteTreeW (Address: 0x180238028)
  • RegOpenKeyExW (Address: 0x180238010)
  • RegQueryValueExW (Address: 0x180238008)
  • RegSetValueExW (Address: 0x180238000)
GDI32.dll
  • CreateDIBSection (Address: 0x180238090)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180238190)
  • CloseHandle (Address: 0x180238530)
  • CloseThreadpoolTimer (Address: 0x1802382c0)
  • CloseThreadpoolWait (Address: 0x1802382d8)
  • CloseThreadpoolWork (Address: 0x1802382a0)
  • CompareStringEx (Address: 0x180238310)
  • CompareStringW (Address: 0x180238450)
  • CopyFileW (Address: 0x180238588)
  • CreateDirectoryW (Address: 0x180238548)
  • CreateEventExW (Address: 0x180238258)
  • CreateFileW (Address: 0x180238538)
  • CreateSemaphoreExW (Address: 0x180238260)
  • CreateSymbolicLinkW (Address: 0x1802382f8)
  • CreateThreadpoolTimer (Address: 0x1802382a8)
  • CreateThreadpoolWait (Address: 0x1802382c8)
  • CreateThreadpoolWork (Address: 0x180238290)
  • DecodePointer (Address: 0x1802381d8)
  • DeleteCriticalSection (Address: 0x1802381c0)
  • DeleteFileW (Address: 0x180238550)
  • DisableThreadLibraryCalls (Address: 0x180238138)
  • EncodePointer (Address: 0x1802381d0)
  • EnterCriticalSection (Address: 0x1802381a8)
  • EnumSystemLocalesW (Address: 0x180238478)
  • ExitProcess (Address: 0x1802383f8)
  • FileTimeToSystemTime (Address: 0x180238168)
  • FindClose (Address: 0x1802384c0)
  • FindFirstFileExW (Address: 0x1802384c8)
  • FindFirstFileW (Address: 0x180238558)
  • FindNextFileW (Address: 0x1802384d0)
  • FlsAlloc (Address: 0x180238200)
  • FlsFree (Address: 0x180238218)
  • FlsGetValue (Address: 0x180238208)
  • FlsSetValue (Address: 0x180238210)
  • FlushFileBuffers (Address: 0x1802384b0)
  • FlushProcessWriteBuffers (Address: 0x180238268)
  • FormatMessageA (Address: 0x180238180)
  • FormatMessageW (Address: 0x180238108)
  • FreeEnvironmentStringsW (Address: 0x180238508)
  • FreeLibrary (Address: 0x1802383d8)
  • FreeLibraryWhenCallbackReturns (Address: 0x180238288)
  • GetACP (Address: 0x1802384e0)
  • GetCommandLineA (Address: 0x1802384f0)
  • GetCommandLineW (Address: 0x1802384f8)
  • GetConsoleMode (Address: 0x180238430)
  • GetConsoleOutputCP (Address: 0x180238498)
  • GetCPInfo (Address: 0x180238318)
  • GetCurrentDirectoryW (Address: 0x180238540)
  • GetCurrentProcess (Address: 0x180238158)
  • GetCurrentProcessId (Address: 0x180238360)
  • GetCurrentProcessorNumber (Address: 0x180238270)
  • GetCurrentThread (Address: 0x180238408)
  • GetCurrentThreadId (Address: 0x1802381a0)
  • GetDateFormatW (Address: 0x180238440)
  • GetDriveTypeW (Address: 0x180238120)
  • GetEnvironmentStringsW (Address: 0x180238500)
  • GetFileAttributesExW (Address: 0x180238568)
  • GetFileAttributesW (Address: 0x180238560)
  • GetFileInformationByHandle (Address: 0x180238118)
  • GetFileInformationByHandleEx (Address: 0x1802382f0)
  • GetFileSizeEx (Address: 0x180238480)
  • GetFileType (Address: 0x1802383f0)
  • GetFullPathNameW (Address: 0x180238570)
  • GetLastError (Address: 0x180238140)
  • GetLocaleInfoEx (Address: 0x1802381c8)
  • GetLocaleInfoW (Address: 0x180238460)
  • GetModuleFileNameW (Address: 0x180238130)
  • GetModuleHandleExW (Address: 0x180238400)
  • GetModuleHandleW (Address: 0x1802382e0)
  • GetOEMCP (Address: 0x1802384e8)
  • GetProcAddress (Address: 0x1802382e8)
  • GetProcessHeap (Address: 0x180238518)
  • GetStartupInfoW (Address: 0x180238378)
  • GetStdHandle (Address: 0x180238420)
  • GetStringTypeW (Address: 0x180238308)
  • GetSystemTimeAsFileTime (Address: 0x180238278)
  • GetTempPathW (Address: 0x1802381f8)
  • GetTickCount64 (Address: 0x180238280)
  • GetTimeFormatW (Address: 0x180238448)
  • GetTimeZoneInformation (Address: 0x1802384b8)
  • GetUserDefaultLCID (Address: 0x180238470)
  • HeapAlloc (Address: 0x180238418)
  • HeapFree (Address: 0x180238410)
  • HeapReAlloc (Address: 0x1802384a8)
  • HeapSize (Address: 0x180238528)
  • InitializeConditionVariable (Address: 0x180238230)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1802383b0)
  • InitializeCriticalSectionEx (Address: 0x1802381b8)
  • InitializeSListHead (Address: 0x180238368)
  • InitializeSRWLock (Address: 0x180238220)
  • InitOnceExecuteOnce (Address: 0x180238228)
  • InterlockedFlushSList (Address: 0x1802383a0)
  • InterlockedPushEntrySList (Address: 0x180238398)
  • IsDebuggerPresent (Address: 0x180238370)
  • IsProcessorFeaturePresent (Address: 0x180238358)
  • IsValidCodePage (Address: 0x1802384d8)
  • IsValidLocale (Address: 0x180238468)
  • LCMapStringEx (Address: 0x180238300)
  • LCMapStringW (Address: 0x180238458)
  • LeaveCriticalSection (Address: 0x1802381b0)
  • LoadLibraryExW (Address: 0x1802383e0)
  • LocalFree (Address: 0x180238110)
  • MoveFileW (Address: 0x180238178)
  • MultiByteToWideChar (Address: 0x180238128)
  • OutputDebugStringA (Address: 0x1802380f0)
  • OutputDebugStringW (Address: 0x180238520)
  • PeekNamedPipe (Address: 0x180238150)
  • QueryPerformanceCounter (Address: 0x1802381e0)
  • QueryPerformanceFrequency (Address: 0x1802381e8)
  • RaiseException (Address: 0x180238388)
  • ReadConsoleW (Address: 0x180238438)
  • ReadFile (Address: 0x180238428)
  • ReleaseSRWLockExclusive (Address: 0x180238188)
  • RemoveDirectoryW (Address: 0x180238578)
  • RtlCaptureContext (Address: 0x180238320)
  • RtlLookupFunctionEntry (Address: 0x180238328)
  • RtlPcToFileHeader (Address: 0x180238380)
  • RtlUnwind (Address: 0x180238160)
  • RtlUnwindEx (Address: 0x180238390)
  • RtlVirtualUnwind (Address: 0x180238330)
  • SetConsoleCtrlHandler (Address: 0x1802384a0)
  • SetCurrentDirectoryW (Address: 0x180238348)
  • SetEndOfFile (Address: 0x180238148)
  • SetEnvironmentVariableW (Address: 0x180238510)
  • SetFileAttributesW (Address: 0x180238580)
  • SetFileInformationByHandle (Address: 0x1802381f0)
  • SetFilePointerEx (Address: 0x180238488)
  • SetLastError (Address: 0x1802383a8)
  • SetStdHandle (Address: 0x1802383e8)
  • SetThreadpoolTimer (Address: 0x1802382b0)
  • SetThreadpoolWait (Address: 0x1802382d0)
  • SetUnhandledExceptionFilter (Address: 0x180238340)
  • SleepConditionVariableCS (Address: 0x180238248)
  • SleepConditionVariableSRW (Address: 0x180238250)
  • SubmitThreadpoolWork (Address: 0x180238298)
  • SystemTimeToTzSpecificLocalTime (Address: 0x180238170)
  • TerminateProcess (Address: 0x180238350)
  • TlsAlloc (Address: 0x1802383b8)
  • TlsFree (Address: 0x1802383d0)
  • TlsGetValue (Address: 0x1802383c0)
  • TlsSetValue (Address: 0x1802383c8)
  • TryAcquireSRWLockExclusive (Address: 0x180238198)
  • UnhandledExceptionFilter (Address: 0x180238338)
  • WaitForThreadpoolTimerCallbacks (Address: 0x1802382b8)
  • WakeAllConditionVariable (Address: 0x180238240)
  • WakeConditionVariable (Address: 0x180238238)
  • WideCharToMultiByte (Address: 0x1802380f8)
  • WriteConsoleW (Address: 0x180238100)
  • WriteFile (Address: 0x180238490)
ole32.dll
  • CLSIDFromString (Address: 0x180238800)
SHELL32.dll
  • SHGetFolderPathW (Address: 0x1802386d0)
SHLWAPI.dll
  • (Address: 0x180238730)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x180238790)
  • GetFileVersionInfoW (Address: 0x180238798)
  • VerQueryValueW (Address: 0x1802387a0)