OneTweak.dll

Description: OneTweak - One To Tweak Them All!

Authors: Copyright (C) 2013 virusek

Version: 2.1.0.4

Architecture: 32-bit

Operating System: Windows NT

SHA256: a014388b118ef5d5e75146884df82767

File Size: 169.5 KB

Uploaded At: March 24, 2026, 2:39 p.m.

Views: 9

Exported Functions

  • FOSEPlugin_Load (Ordinal: 1, Address: 0x12b0)
  • FOSEPlugin_Query (Ordinal: 2, Address: 0x1270)
  • NVSEPlugin_Load (Ordinal: 3, Address: 0x1ae0)
  • NVSEPlugin_Query (Ordinal: 4, Address: 0x1aa0)
  • OBSEPlugin_Load (Ordinal: 5, Address: 0x1df0)
  • OBSEPlugin_Query (Ordinal: 6, Address: 0x1db0)
  • SKSEPlugin_Load (Ordinal: 7, Address: 0x7260)
  • SKSEPlugin_Query (Ordinal: 8, Address: 0x7200)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x1002000c)
  • RegCreateKeyExW (Address: 0x10020008)
  • RegFlushKey (Address: 0x10020000)
  • RegSetValueExW (Address: 0x10020004)
KERNEL32.dll
  • CloseHandle (Address: 0x10020070)
  • CreateDirectoryW (Address: 0x10020164)
  • CreateEventW (Address: 0x100200e8)
  • CreateFileW (Address: 0x1002003c)
  • CreateToolhelp32Snapshot (Address: 0x10020090)
  • DecodePointer (Address: 0x10020054)
  • DeleteCriticalSection (Address: 0x100200d8)
  • EncodePointer (Address: 0x1002011c)
  • EnterCriticalSection (Address: 0x100200cc)
  • ExitProcess (Address: 0x10020138)
  • FindClose (Address: 0x10020168)
  • FindFirstFileExW (Address: 0x1002016c)
  • FindNextFileW (Address: 0x10020170)
  • FlushFileBuffers (Address: 0x10020158)
  • FlushInstructionCache (Address: 0x100200b4)
  • FreeEnvironmentStringsW (Address: 0x10020194)
  • FreeLibrary (Address: 0x10020130)
  • GetACP (Address: 0x10020178)
  • GetCommandLineA (Address: 0x10020184)
  • GetCommandLineW (Address: 0x10020188)
  • GetConsoleMode (Address: 0x1002014c)
  • GetConsoleOutputCP (Address: 0x1002015c)
  • GetCPInfo (Address: 0x10020180)
  • GetCurrentProcess (Address: 0x10020058)
  • GetCurrentProcessId (Address: 0x100200ac)
  • GetCurrentThreadId (Address: 0x10020084)
  • GetEnvironmentStringsW (Address: 0x10020190)
  • GetFileSizeEx (Address: 0x1002005c)
  • GetFileType (Address: 0x10020148)
  • GetLastError (Address: 0x1002001c)
  • GetModuleFileNameA (Address: 0x10020028)
  • GetModuleFileNameW (Address: 0x10020140)
  • GetModuleHandleExA (Address: 0x1002002c)
  • GetModuleHandleExW (Address: 0x1002013c)
  • GetModuleHandleW (Address: 0x100200b0)
  • GetOEMCP (Address: 0x1002017c)
  • GetPrivateProfileIntA (Address: 0x10020024)
  • GetProcAddress (Address: 0x100200a8)
  • GetProcessHeap (Address: 0x10020044)
  • GetStartupInfoW (Address: 0x10020100)
  • GetStdHandle (Address: 0x10020144)
  • GetStringTypeW (Address: 0x10020040)
  • GetSystemTimeAsFileTime (Address: 0x10020108)
  • GetThreadContext (Address: 0x100200a4)
  • HeapAlloc (Address: 0x1002009c)
  • HeapCreate (Address: 0x10020074)
  • HeapDestroy (Address: 0x100200a0)
  • HeapFree (Address: 0x10020078)
  • HeapReAlloc (Address: 0x10020098)
  • HeapSize (Address: 0x10020034)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100200d4)
  • InitializeSListHead (Address: 0x1002010c)
  • InterlockedFlushSList (Address: 0x10020118)
  • IsDebuggerPresent (Address: 0x100200fc)
  • IsProcessorFeaturePresent (Address: 0x100200f8)
  • IsValidCodePage (Address: 0x10020174)
  • LCMapStringW (Address: 0x10020154)
  • LeaveCriticalSection (Address: 0x100200d0)
  • LoadLibraryExW (Address: 0x10020134)
  • lstrcpyW (Address: 0x1002004c)
  • lstrlenW (Address: 0x10020048)
  • MultiByteToWideChar (Address: 0x10020160)
  • OpenThread (Address: 0x100200bc)
  • QueryFullProcessImageNameW (Address: 0x10020050)
  • QueryPerformanceCounter (Address: 0x10020104)
  • RaiseException (Address: 0x10020114)
  • ReadConsoleW (Address: 0x10020150)
  • ReadFile (Address: 0x10020060)
  • ResetEvent (Address: 0x100200e0)
  • ResumeThread (Address: 0x1002008c)
  • RtlUnwind (Address: 0x10020110)
  • SetEndOfFile (Address: 0x10020064)
  • SetEvent (Address: 0x100200dc)
  • SetFilePointerEx (Address: 0x10020068)
  • SetLastError (Address: 0x10020020)
  • SetPriorityClass (Address: 0x10020014)
  • SetStdHandle (Address: 0x10020038)
  • SetThreadContext (Address: 0x100200b8)
  • SetUnhandledExceptionFilter (Address: 0x100200f0)
  • Sleep (Address: 0x10020094)
  • SuspendThread (Address: 0x10020088)
  • TerminateProcess (Address: 0x100200f4)
  • Thread32First (Address: 0x10020080)
  • Thread32Next (Address: 0x1002007c)
  • TlsAlloc (Address: 0x10020120)
  • TlsFree (Address: 0x1002012c)
  • TlsGetValue (Address: 0x10020124)
  • TlsSetValue (Address: 0x10020128)
  • UnhandledExceptionFilter (Address: 0x100200ec)
  • VirtualAlloc (Address: 0x100200c4)
  • VirtualFree (Address: 0x100200c0)
  • VirtualProtect (Address: 0x10020018)
  • VirtualQuery (Address: 0x100200c8)
  • WaitForSingleObjectEx (Address: 0x100200e4)
  • WideCharToMultiByte (Address: 0x1002018c)
  • WriteConsoleW (Address: 0x10020030)
  • WriteFile (Address: 0x1002006c)
SHELL32.dll
  • SHGetFolderPathA (Address: 0x1002019c)
USER32.dll
  • CallWindowProcA (Address: 0x100201a4)
  • CreateWindowExA (Address: 0x100201c0)
  • DisableProcessWindowsGhosting (Address: 0x100201b8)
  • GetClassNameA (Address: 0x100201b0)
  • GetSystemMetrics (Address: 0x100201cc)
  • GetWindowLongA (Address: 0x100201a8)
  • GetWindowTextA (Address: 0x100201ac)
  • MessageBoxA (Address: 0x100201c8)
  • SetWindowLongA (Address: 0x100201c4)
  • SetWindowPos (Address: 0x100201bc)
  • ShowCursor (Address: 0x100201b4)