DitchTails.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: 7f7bc833c8bf990dec7942fe12ef47a1
File Size: 9.0 KB
Uploaded At: Feb. 17, 2026, 12:11 p.m.
Views: 7
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
- Init (Ordinal: 1, Address: 0x11c0)
- ManiaModInfo (Ordinal: 2, Address: 0x3018)
- OnFrame (Ordinal: 3, Address: 0x1100)
- OnScreenUpdate (Ordinal: 4, Address: 0x10f0)
Imported DLLs & Functions
api-ms-win-crt-runtime-l1-1-0.dll
- _cexit (Address: 0x10002060)
- _configure_narrow_argv (Address: 0x10002068)
- _execute_onexit_table (Address: 0x10002064)
- _initialize_narrow_environment (Address: 0x1000206c)
- _initialize_onexit_table (Address: 0x10002070)
- _initterm (Address: 0x1000205c)
- _initterm_e (Address: 0x10002058)
- _seh_filter_dll (Address: 0x10002054)
KERNEL32.dll
- GetCurrentDirectoryA (Address: 0x1000200c)
- GetCurrentProcess (Address: 0x10002004)
- GetCurrentProcessId (Address: 0x10002028)
- GetCurrentThreadId (Address: 0x10002024)
- GetModuleHandleW (Address: 0x10002000)
- GetSystemTimeAsFileTime (Address: 0x10002020)
- InitializeSListHead (Address: 0x1000201c)
- IsDebuggerPresent (Address: 0x10002018)
- IsProcessorFeaturePresent (Address: 0x10002030)
- QueryPerformanceCounter (Address: 0x1000202c)
- SetCurrentDirectoryA (Address: 0x10002010)
- SetUnhandledExceptionFilter (Address: 0x10002038)
- TerminateProcess (Address: 0x10002034)
- UnhandledExceptionFilter (Address: 0x1000203c)
- VirtualProtect (Address: 0x10002014)
- WriteProcessMemory (Address: 0x10002008)
VCRUNTIME140.dll
- __std_type_info_destroy_list (Address: 0x1000204c)
- _except_handler4_common (Address: 0x10002048)
- memset (Address: 0x10002044)