dd2.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: e2a09b866d3dbb39cb9a7c84623eda08
File Size: 51.9 KB
Uploaded At: March 18, 2026, 7:56 p.m.
Views: 11
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- GetPlayerAngles (Ordinal: 1, Address: 0x15ad)
- GetPlayerPosition (Ordinal: 2, Address: 0x14ef)
Imported DLLs & Functions
api-ms-win-crt-environment-l1-1-0.dll
- __p__environ (Address: 0x23ff192f0)
- __p__wenviron (Address: 0x23ff192f8)
api-ms-win-crt-heap-l1-1-0.dll
- _set_new_mode (Address: 0x23ff19308)
- calloc (Address: 0x23ff19310)
- free (Address: 0x23ff19318)
- malloc (Address: 0x23ff19320)
api-ms-win-crt-runtime-l1-1-0.dll
- __p___argc (Address: 0x23ff19330)
- __p___argv (Address: 0x23ff19338)
- __p___wargv (Address: 0x23ff19340)
- _configure_narrow_argv (Address: 0x23ff19348)
- _configure_wide_argv (Address: 0x23ff19350)
- _crt_at_quick_exit (Address: 0x23ff19358)
- _crt_atexit (Address: 0x23ff19360)
- _execute_onexit_table (Address: 0x23ff19368)
- _exit (Address: 0x23ff19370)
- _initialize_narrow_environment (Address: 0x23ff19378)
- _initialize_onexit_table (Address: 0x23ff19380)
- _initialize_wide_environment (Address: 0x23ff19388)
- _initterm (Address: 0x23ff19390)
- _register_onexit_function (Address: 0x23ff19398)
- abort (Address: 0x23ff193a0)
api-ms-win-crt-stdio-l1-1-0.dll
- __acrt_iob_func (Address: 0x23ff193b0)
- __stdio_common_vfprintf (Address: 0x23ff193b8)
- __stdio_common_vfwprintf (Address: 0x23ff193c0)
- fwrite (Address: 0x23ff193c8)
api-ms-win-crt-string-l1-1-0.dll
- _stricmp (Address: 0x23ff193d8)
- strlen (Address: 0x23ff193e0)
- strncmp (Address: 0x23ff193e8)
api-ms-win-crt-time-l1-1-0.dll
- __daylight (Address: 0x23ff193f8)
- __timezone (Address: 0x23ff19400)
- __tzname (Address: 0x23ff19408)
- _tzset (Address: 0x23ff19410)
KERNEL32.dll
- CloseHandle (Address: 0x23ff19260)
- CreateToolhelp32Snapshot (Address: 0x23ff19268)
- DeleteCriticalSection (Address: 0x23ff19270)
- EnterCriticalSection (Address: 0x23ff19278)
- GetLastError (Address: 0x23ff19280)
- InitializeCriticalSection (Address: 0x23ff19288)
- K32EnumProcessModules (Address: 0x23ff19290)
- K32GetModuleBaseNameA (Address: 0x23ff19298)
- LeaveCriticalSection (Address: 0x23ff192a0)
- OpenProcess (Address: 0x23ff192a8)
- Process32First (Address: 0x23ff192b0)
- Process32Next (Address: 0x23ff192b8)
- ReadProcessMemory (Address: 0x23ff192c0)
- Sleep (Address: 0x23ff192c8)
- TlsGetValue (Address: 0x23ff192d0)
- VirtualProtect (Address: 0x23ff192d8)
- VirtualQuery (Address: 0x23ff192e0)