DitchTails.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 7f7bc833c8bf990dec7942fe12ef47a1

File Size: 9.0 KB

Uploaded At: Feb. 17, 2026, 12:11 p.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • Init (Ordinal: 1, Address: 0x11c0)
  • ManiaModInfo (Ordinal: 2, Address: 0x3018)
  • OnFrame (Ordinal: 3, Address: 0x1100)
  • OnScreenUpdate (Ordinal: 4, Address: 0x10f0)

Imported DLLs & Functions

api-ms-win-crt-runtime-l1-1-0.dll
  • _cexit (Address: 0x10002060)
  • _configure_narrow_argv (Address: 0x10002068)
  • _execute_onexit_table (Address: 0x10002064)
  • _initialize_narrow_environment (Address: 0x1000206c)
  • _initialize_onexit_table (Address: 0x10002070)
  • _initterm (Address: 0x1000205c)
  • _initterm_e (Address: 0x10002058)
  • _seh_filter_dll (Address: 0x10002054)
KERNEL32.dll
  • GetCurrentDirectoryA (Address: 0x1000200c)
  • GetCurrentProcess (Address: 0x10002004)
  • GetCurrentProcessId (Address: 0x10002028)
  • GetCurrentThreadId (Address: 0x10002024)
  • GetModuleHandleW (Address: 0x10002000)
  • GetSystemTimeAsFileTime (Address: 0x10002020)
  • InitializeSListHead (Address: 0x1000201c)
  • IsDebuggerPresent (Address: 0x10002018)
  • IsProcessorFeaturePresent (Address: 0x10002030)
  • QueryPerformanceCounter (Address: 0x1000202c)
  • SetCurrentDirectoryA (Address: 0x10002010)
  • SetUnhandledExceptionFilter (Address: 0x10002038)
  • TerminateProcess (Address: 0x10002034)
  • UnhandledExceptionFilter (Address: 0x1000203c)
  • VirtualProtect (Address: 0x10002014)
  • WriteProcessMemory (Address: 0x10002008)
VCRUNTIME140.dll
  • __std_type_info_destroy_list (Address: 0x1000204c)
  • _except_handler4_common (Address: 0x10002048)
  • memset (Address: 0x10002044)