dd2.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: e2a09b866d3dbb39cb9a7c84623eda08

File Size: 51.9 KB

Uploaded At: March 18, 2026, 7:56 p.m.

Views: 11

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • GetPlayerAngles (Ordinal: 1, Address: 0x15ad)
  • GetPlayerPosition (Ordinal: 2, Address: 0x14ef)

Imported DLLs & Functions

api-ms-win-crt-environment-l1-1-0.dll
  • __p__environ (Address: 0x23ff192f0)
  • __p__wenviron (Address: 0x23ff192f8)
api-ms-win-crt-heap-l1-1-0.dll
  • _set_new_mode (Address: 0x23ff19308)
  • calloc (Address: 0x23ff19310)
  • free (Address: 0x23ff19318)
  • malloc (Address: 0x23ff19320)
api-ms-win-crt-runtime-l1-1-0.dll
  • __p___argc (Address: 0x23ff19330)
  • __p___argv (Address: 0x23ff19338)
  • __p___wargv (Address: 0x23ff19340)
  • _configure_narrow_argv (Address: 0x23ff19348)
  • _configure_wide_argv (Address: 0x23ff19350)
  • _crt_at_quick_exit (Address: 0x23ff19358)
  • _crt_atexit (Address: 0x23ff19360)
  • _execute_onexit_table (Address: 0x23ff19368)
  • _exit (Address: 0x23ff19370)
  • _initialize_narrow_environment (Address: 0x23ff19378)
  • _initialize_onexit_table (Address: 0x23ff19380)
  • _initialize_wide_environment (Address: 0x23ff19388)
  • _initterm (Address: 0x23ff19390)
  • _register_onexit_function (Address: 0x23ff19398)
  • abort (Address: 0x23ff193a0)
api-ms-win-crt-stdio-l1-1-0.dll
  • __acrt_iob_func (Address: 0x23ff193b0)
  • __stdio_common_vfprintf (Address: 0x23ff193b8)
  • __stdio_common_vfwprintf (Address: 0x23ff193c0)
  • fwrite (Address: 0x23ff193c8)
api-ms-win-crt-string-l1-1-0.dll
  • _stricmp (Address: 0x23ff193d8)
  • strlen (Address: 0x23ff193e0)
  • strncmp (Address: 0x23ff193e8)
api-ms-win-crt-time-l1-1-0.dll
  • __daylight (Address: 0x23ff193f8)
  • __timezone (Address: 0x23ff19400)
  • __tzname (Address: 0x23ff19408)
  • _tzset (Address: 0x23ff19410)
KERNEL32.dll
  • CloseHandle (Address: 0x23ff19260)
  • CreateToolhelp32Snapshot (Address: 0x23ff19268)
  • DeleteCriticalSection (Address: 0x23ff19270)
  • EnterCriticalSection (Address: 0x23ff19278)
  • GetLastError (Address: 0x23ff19280)
  • InitializeCriticalSection (Address: 0x23ff19288)
  • K32EnumProcessModules (Address: 0x23ff19290)
  • K32GetModuleBaseNameA (Address: 0x23ff19298)
  • LeaveCriticalSection (Address: 0x23ff192a0)
  • OpenProcess (Address: 0x23ff192a8)
  • Process32First (Address: 0x23ff192b0)
  • Process32Next (Address: 0x23ff192b8)
  • ReadProcessMemory (Address: 0x23ff192c0)
  • Sleep (Address: 0x23ff192c8)
  • TlsGetValue (Address: 0x23ff192d0)
  • VirtualProtect (Address: 0x23ff192d8)
  • VirtualQuery (Address: 0x23ff192e0)