UniversalUE5Unlocker.dll
Description: OPM Camera Tools Injectable DLL
Authors: Copyright (C) 2024 Frans 'Otis_Inf' Bouma / Solutions Design BV
Version: 5.7.7.0
Architecture: 64-bit
Operating System: Windows NT
SHA256: 0695b17ee04c2b5c3d9ffa91d0bfe8a8
File Size: 2.2 MB
Uploaded At: March 5, 2026, 12:33 a.m.
Views: 10
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory
Exported Functions
- IGCS_EndScreenshotSession (Ordinal: 1, Address: 0x17760)
- IGCS_MoveCameraMultishot (Ordinal: 2, Address: 0x17730)
- IGCS_MoveCameraPanorama (Ordinal: 3, Address: 0x17700)
- IGCS_StartScreenshotSession (Ordinal: 4, Address: 0x176d0)
Imported DLLs & Functions
ADVAPI32.dll
- InitializeSecurityDescriptor (Address: 0x180198008)
- SetSecurityDescriptorDacl (Address: 0x180198000)
d3d11.dll
- D3D11CreateDeviceAndSwapChain (Address: 0x1801986e8)
d3d12.dll
- (Address: 0x1801986f8)
D3DCOMPILER_47.dll
- D3DCompile (Address: 0x180198018)
dxgi.dll
- CreateDXGIFactory2 (Address: 0x180198708)
IMM32.dll
- ImmGetContext (Address: 0x180198028)
- ImmReleaseContext (Address: 0x180198040)
- ImmSetCandidateWindow (Address: 0x180198038)
- ImmSetCompositionWindow (Address: 0x180198030)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180198498)
- AcquireSRWLockShared (Address: 0x1801984c8)
- AllocConsole (Address: 0x1801980f0)
- AreFileApisANSI (Address: 0x180198520)
- AttachConsole (Address: 0x1801980f8)
- CloseHandle (Address: 0x180198060)
- CompareStringEx (Address: 0x1801983f8)
- CompareStringW (Address: 0x180198298)
- ConnectNamedPipe (Address: 0x180198180)
- CreateDirectoryW (Address: 0x1801984e0)
- CreateEventW (Address: 0x180198050)
- CreateFileA (Address: 0x1801980d0)
- CreateFileMappingW (Address: 0x1801980b8)
- CreateFileW (Address: 0x180198160)
- CreateNamedPipeW (Address: 0x180198178)
- CreateThread (Address: 0x180198140)
- CreateToolhelp32Snapshot (Address: 0x180198448)
- CreateWaitableTimerW (Address: 0x180198198)
- DecodePointer (Address: 0x180198550)
- DeleteCriticalSection (Address: 0x180198540)
- DisableThreadLibraryCalls (Address: 0x180198138)
- DisconnectNamedPipe (Address: 0x180198168)
- EncodePointer (Address: 0x180198548)
- EnterCriticalSection (Address: 0x180198148)
- EnumSystemLocalesW (Address: 0x180198270)
- ExitProcess (Address: 0x1801982d0)
- ExitThread (Address: 0x1801982e0)
- FindClose (Address: 0x1801984e8)
- FindFirstFileExW (Address: 0x1801984f8)
- FindFirstFileW (Address: 0x1801984f0)
- FindNextFileW (Address: 0x180198500)
- FlsAlloc (Address: 0x1801982c8)
- FlsFree (Address: 0x1801982b0)
- FlsGetValue (Address: 0x1801982c0)
- FlsSetValue (Address: 0x1801982b8)
- FlushFileBuffers (Address: 0x180198260)
- FlushInstructionCache (Address: 0x1801981c0)
- FormatMessageA (Address: 0x1801981c8)
- FreeConsole (Address: 0x180198110)
- FreeEnvironmentStringsW (Address: 0x180198200)
- FreeLibrary (Address: 0x180198090)
- FreeLibraryAndExitThread (Address: 0x180198130)
- GetACP (Address: 0x180198228)
- GetCommandLineA (Address: 0x180198218)
- GetCommandLineW (Address: 0x180198210)
- GetConsoleMode (Address: 0x180198250)
- GetConsoleOutputCP (Address: 0x180198258)
- GetCPInfo (Address: 0x1801983f0)
- GetCurrentDirectoryW (Address: 0x1801984d8)
- GetCurrentProcess (Address: 0x180198418)
- GetCurrentProcessId (Address: 0x180198398)
- GetCurrentThreadId (Address: 0x180198430)
- GetDateFormatW (Address: 0x1801982a8)
- GetDriveTypeA (Address: 0x1801980a0)
- GetEnvironmentStringsW (Address: 0x180198208)
- GetExitCodeThread (Address: 0x1801984b0)
- GetFileAttributesExW (Address: 0x180198508)
- GetFileInformationByHandleEx (Address: 0x180198528)
- GetFileSizeEx (Address: 0x1801980b0)
- GetFileType (Address: 0x180198268)
- GetFinalPathNameByHandleW (Address: 0x180198510)
- GetFullPathNameW (Address: 0x180198518)
- GetLastError (Address: 0x180198388)
- GetLocaleInfoA (Address: 0x180198078)
- GetLocaleInfoEx (Address: 0x1801984b8)
- GetLocaleInfoW (Address: 0x180198288)
- GetLogicalDrives (Address: 0x180198098)
- GetModuleFileNameW (Address: 0x1801981b0)
- GetModuleHandleA (Address: 0x180198068)
- GetModuleHandleExW (Address: 0x1801982d8)
- GetModuleHandleW (Address: 0x180198190)
- GetOEMCP (Address: 0x180198220)
- GetProcAddress (Address: 0x180198380)
- GetProcessHeap (Address: 0x1801981f0)
- GetStartupInfoW (Address: 0x180198370)
- GetStdHandle (Address: 0x180198108)
- GetStringTypeW (Address: 0x180198538)
- GetSystemInfo (Address: 0x1801980a8)
- GetSystemTimeAsFileTime (Address: 0x180198560)
- GetThreadContext (Address: 0x180198468)
- GetTimeFormatW (Address: 0x1801982a0)
- GetTimeZoneInformation (Address: 0x180198238)
- GetUserDefaultLCID (Address: 0x180198278)
- GlobalAlloc (Address: 0x180198330)
- GlobalFree (Address: 0x1801981e0)
- GlobalLock (Address: 0x180198348)
- GlobalUnlock (Address: 0x180198338)
- HeapAlloc (Address: 0x180198458)
- HeapCreate (Address: 0x180198400)
- HeapDestroy (Address: 0x180198460)
- HeapFree (Address: 0x180198410)
- HeapReAlloc (Address: 0x180198450)
- HeapSize (Address: 0x180198390)
- InitializeCriticalSectionAndSpinCount (Address: 0x180198158)
- InitializeCriticalSectionEx (Address: 0x180198128)
- InitializeSListHead (Address: 0x180198368)
- InterlockedFlushSList (Address: 0x180198318)
- IsDebuggerPresent (Address: 0x1801983b0)
- IsProcessorFeaturePresent (Address: 0x1801983b8)
- IsValidCodePage (Address: 0x180198230)
- IsValidLocale (Address: 0x180198280)
- K32EnumProcessModules (Address: 0x1801980d8)
- K32EnumProcessModulesEx (Address: 0x1801981b8)
- K32GetModuleBaseNameA (Address: 0x1801980e8)
- K32GetModuleInformation (Address: 0x1801980e0)
- LCMapStringEx (Address: 0x180198558)
- LCMapStringW (Address: 0x180198290)
- LeaveCriticalSection (Address: 0x180198150)
- LoadLibraryA (Address: 0x180198070)
- LoadLibraryExW (Address: 0x1801982e8)
- LocalFree (Address: 0x1801981a8)
- MapViewOfFile (Address: 0x1801980c0)
- MultiByteToWideChar (Address: 0x180198378)
- OpenProcess (Address: 0x1801981d0)
- OpenThread (Address: 0x180198478)
- QueryPerformanceCounter (Address: 0x180198088)
- QueryPerformanceFrequency (Address: 0x180198080)
- RaiseException (Address: 0x180198320)
- ReadConsoleW (Address: 0x180198240)
- ReadFile (Address: 0x180198188)
- ReleaseSRWLockExclusive (Address: 0x180198490)
- ReleaseSRWLockShared (Address: 0x1801984c0)
- ResumeThread (Address: 0x180198440)
- RtlCaptureContext (Address: 0x1801983e8)
- RtlLookupFunctionEntry (Address: 0x1801983e0)
- RtlPcToFileHeader (Address: 0x180198328)
- RtlUnwind (Address: 0x180198420)
- RtlUnwindEx (Address: 0x180198360)
- RtlVirtualUnwind (Address: 0x1801983d8)
- SetConsoleTextAttribute (Address: 0x180198100)
- SetEndOfFile (Address: 0x180198358)
- SetEnvironmentVariableW (Address: 0x1801981f8)
- SetFilePointerEx (Address: 0x180198248)
- SetLastError (Address: 0x180198310)
- SetStdHandle (Address: 0x1801981e8)
- SetThreadContext (Address: 0x180198470)
- SetThreadPriority (Address: 0x180198120)
- SetUnhandledExceptionFilter (Address: 0x1801983c8)
- SetWaitableTimer (Address: 0x1801981a0)
- Sleep (Address: 0x180198118)
- SleepConditionVariableSRW (Address: 0x1801984d0)
- SuspendThread (Address: 0x180198438)
- TerminateProcess (Address: 0x1801983c0)
- Thread32First (Address: 0x180198428)
- Thread32Next (Address: 0x1801983a8)
- TlsAlloc (Address: 0x180198308)
- TlsFree (Address: 0x1801982f0)
- TlsGetValue (Address: 0x180198300)
- TlsSetValue (Address: 0x1801982f8)
- TryAcquireSRWLockExclusive (Address: 0x1801984a0)
- UnhandledExceptionFilter (Address: 0x1801983d0)
- UnmapViewOfFile (Address: 0x1801980c8)
- VirtualAlloc (Address: 0x180198488)
- VirtualFree (Address: 0x180198480)
- VirtualProtect (Address: 0x180198408)
- VirtualQuery (Address: 0x1801983a0)
- WaitForSingleObject (Address: 0x180198058)
- WaitForSingleObjectEx (Address: 0x1801984a8)
- WakeAllConditionVariable (Address: 0x180198530)
- WideCharToMultiByte (Address: 0x180198340)
- WriteConsoleW (Address: 0x1801981d8)
- WriteFile (Address: 0x180198170)
- WriteProcessMemory (Address: 0x180198350)
OLEAUT32.dll
- SysAllocString (Address: 0x180198570)
- SysFreeString (Address: 0x180198578)
USER32.dll
- CallWindowProcW (Address: 0x180198610)
- ClientToScreen (Address: 0x180198698)
- ClipCursor (Address: 0x180198630)
- CloseClipboard (Address: 0x180198588)
- CloseWindow (Address: 0x1801985e0)
- CreateWindowExA (Address: 0x1801985e8)
- DestroyWindow (Address: 0x1801985d8)
- EmptyClipboard (Address: 0x180198598)
- EnumWindows (Address: 0x1801985a8)
- GetAsyncKeyState (Address: 0x1801985a0)
- GetCapture (Address: 0x180198660)
- GetClassNameW (Address: 0x1801985c8)
- GetClientRect (Address: 0x180198678)
- GetClipboardData (Address: 0x1801986c8)
- GetCursorPos (Address: 0x180198688)
- GetForegroundWindow (Address: 0x1801986a0)
- GetKeyboardLayout (Address: 0x1801986c0)
- GetKeyState (Address: 0x1801986a8)
- GetMessageExtraInfo (Address: 0x180198670)
- GetRawInputData (Address: 0x180198620)
- GetWindow (Address: 0x1801985d0)
- GetWindowRect (Address: 0x180198618)
- GetWindowTextLengthW (Address: 0x1801985c0)
- GetWindowTextW (Address: 0x1801985b8)
- GetWindowThreadProcessId (Address: 0x1801985b0)
- IsWindow (Address: 0x180198600)
- IsWindowUnicode (Address: 0x180198648)
- IsWindowVisible (Address: 0x1801985f8)
- LoadCursorW (Address: 0x1801986b0)
- MapWindowPoints (Address: 0x180198638)
- OpenClipboard (Address: 0x180198590)
- RegisterClassExA (Address: 0x1801985f0)
- RegisterRawInputDevices (Address: 0x180198628)
- ReleaseCapture (Address: 0x180198650)
- ScreenToClient (Address: 0x180198680)
- SetCapture (Address: 0x180198658)
- SetClipboardData (Address: 0x180198640)
- SetCursor (Address: 0x1801986b8)
- SetCursorPos (Address: 0x180198690)
- SetWindowLongPtrW (Address: 0x180198608)
- TrackMouseEvent (Address: 0x180198668)
XINPUT9_1_0.dll
- XInputGetState (Address: 0x1801986d8)