OneTweak.dll
Description: OneTweak - One To Tweak Them All!
Authors: Copyright (C) 2013 virusek
Version: 2.1.0.4
Architecture: 32-bit
Operating System: Windows NT
SHA256: a014388b118ef5d5e75146884df82767
File Size: 169.5 KB
Uploaded At: March 24, 2026, 2:39 p.m.
Views: 9
Exported Functions
- FOSEPlugin_Load (Ordinal: 1, Address: 0x12b0)
- FOSEPlugin_Query (Ordinal: 2, Address: 0x1270)
- NVSEPlugin_Load (Ordinal: 3, Address: 0x1ae0)
- NVSEPlugin_Query (Ordinal: 4, Address: 0x1aa0)
- OBSEPlugin_Load (Ordinal: 5, Address: 0x1df0)
- OBSEPlugin_Query (Ordinal: 6, Address: 0x1db0)
- SKSEPlugin_Load (Ordinal: 7, Address: 0x7260)
- SKSEPlugin_Query (Ordinal: 8, Address: 0x7200)
Imported DLLs & Functions
ADVAPI32.dll
- RegCloseKey (Address: 0x1002000c)
- RegCreateKeyExW (Address: 0x10020008)
- RegFlushKey (Address: 0x10020000)
- RegSetValueExW (Address: 0x10020004)
KERNEL32.dll
- CloseHandle (Address: 0x10020070)
- CreateDirectoryW (Address: 0x10020164)
- CreateEventW (Address: 0x100200e8)
- CreateFileW (Address: 0x1002003c)
- CreateToolhelp32Snapshot (Address: 0x10020090)
- DecodePointer (Address: 0x10020054)
- DeleteCriticalSection (Address: 0x100200d8)
- EncodePointer (Address: 0x1002011c)
- EnterCriticalSection (Address: 0x100200cc)
- ExitProcess (Address: 0x10020138)
- FindClose (Address: 0x10020168)
- FindFirstFileExW (Address: 0x1002016c)
- FindNextFileW (Address: 0x10020170)
- FlushFileBuffers (Address: 0x10020158)
- FlushInstructionCache (Address: 0x100200b4)
- FreeEnvironmentStringsW (Address: 0x10020194)
- FreeLibrary (Address: 0x10020130)
- GetACP (Address: 0x10020178)
- GetCommandLineA (Address: 0x10020184)
- GetCommandLineW (Address: 0x10020188)
- GetConsoleMode (Address: 0x1002014c)
- GetConsoleOutputCP (Address: 0x1002015c)
- GetCPInfo (Address: 0x10020180)
- GetCurrentProcess (Address: 0x10020058)
- GetCurrentProcessId (Address: 0x100200ac)
- GetCurrentThreadId (Address: 0x10020084)
- GetEnvironmentStringsW (Address: 0x10020190)
- GetFileSizeEx (Address: 0x1002005c)
- GetFileType (Address: 0x10020148)
- GetLastError (Address: 0x1002001c)
- GetModuleFileNameA (Address: 0x10020028)
- GetModuleFileNameW (Address: 0x10020140)
- GetModuleHandleExA (Address: 0x1002002c)
- GetModuleHandleExW (Address: 0x1002013c)
- GetModuleHandleW (Address: 0x100200b0)
- GetOEMCP (Address: 0x1002017c)
- GetPrivateProfileIntA (Address: 0x10020024)
- GetProcAddress (Address: 0x100200a8)
- GetProcessHeap (Address: 0x10020044)
- GetStartupInfoW (Address: 0x10020100)
- GetStdHandle (Address: 0x10020144)
- GetStringTypeW (Address: 0x10020040)
- GetSystemTimeAsFileTime (Address: 0x10020108)
- GetThreadContext (Address: 0x100200a4)
- HeapAlloc (Address: 0x1002009c)
- HeapCreate (Address: 0x10020074)
- HeapDestroy (Address: 0x100200a0)
- HeapFree (Address: 0x10020078)
- HeapReAlloc (Address: 0x10020098)
- HeapSize (Address: 0x10020034)
- InitializeCriticalSectionAndSpinCount (Address: 0x100200d4)
- InitializeSListHead (Address: 0x1002010c)
- InterlockedFlushSList (Address: 0x10020118)
- IsDebuggerPresent (Address: 0x100200fc)
- IsProcessorFeaturePresent (Address: 0x100200f8)
- IsValidCodePage (Address: 0x10020174)
- LCMapStringW (Address: 0x10020154)
- LeaveCriticalSection (Address: 0x100200d0)
- LoadLibraryExW (Address: 0x10020134)
- lstrcpyW (Address: 0x1002004c)
- lstrlenW (Address: 0x10020048)
- MultiByteToWideChar (Address: 0x10020160)
- OpenThread (Address: 0x100200bc)
- QueryFullProcessImageNameW (Address: 0x10020050)
- QueryPerformanceCounter (Address: 0x10020104)
- RaiseException (Address: 0x10020114)
- ReadConsoleW (Address: 0x10020150)
- ReadFile (Address: 0x10020060)
- ResetEvent (Address: 0x100200e0)
- ResumeThread (Address: 0x1002008c)
- RtlUnwind (Address: 0x10020110)
- SetEndOfFile (Address: 0x10020064)
- SetEvent (Address: 0x100200dc)
- SetFilePointerEx (Address: 0x10020068)
- SetLastError (Address: 0x10020020)
- SetPriorityClass (Address: 0x10020014)
- SetStdHandle (Address: 0x10020038)
- SetThreadContext (Address: 0x100200b8)
- SetUnhandledExceptionFilter (Address: 0x100200f0)
- Sleep (Address: 0x10020094)
- SuspendThread (Address: 0x10020088)
- TerminateProcess (Address: 0x100200f4)
- Thread32First (Address: 0x10020080)
- Thread32Next (Address: 0x1002007c)
- TlsAlloc (Address: 0x10020120)
- TlsFree (Address: 0x1002012c)
- TlsGetValue (Address: 0x10020124)
- TlsSetValue (Address: 0x10020128)
- UnhandledExceptionFilter (Address: 0x100200ec)
- VirtualAlloc (Address: 0x100200c4)
- VirtualFree (Address: 0x100200c0)
- VirtualProtect (Address: 0x10020018)
- VirtualQuery (Address: 0x100200c8)
- WaitForSingleObjectEx (Address: 0x100200e4)
- WideCharToMultiByte (Address: 0x1002018c)
- WriteConsoleW (Address: 0x10020030)
- WriteFile (Address: 0x1002006c)
SHELL32.dll
- SHGetFolderPathA (Address: 0x1002019c)
USER32.dll
- CallWindowProcA (Address: 0x100201a4)
- CreateWindowExA (Address: 0x100201c0)
- DisableProcessWindowsGhosting (Address: 0x100201b8)
- GetClassNameA (Address: 0x100201b0)
- GetSystemMetrics (Address: 0x100201cc)
- GetWindowLongA (Address: 0x100201a8)
- GetWindowTextA (Address: 0x100201ac)
- MessageBoxA (Address: 0x100201c8)
- SetWindowLongA (Address: 0x100201c4)
- SetWindowPos (Address: 0x100201bc)
- ShowCursor (Address: 0x100201b4)