FileTracker.dll

Description: FileTracker

Authors: © Microsoft Corporation. All rights reserved.

Version: 14.8.4084.0

Architecture: 32-bit

Operating System: Windows

SHA256: b33c25bfad7a75f50deca4d7e5e6530f

File Size: 233.8 KB

Uploaded At: Dec. 1, 2025, 8:48 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx

Exported Functions

  • TrackerExportOne (Ordinal: 1, Address: 0xf050)
  • StartTrackingContext (Ordinal: 2, Address: 0xf060)
  • StartTrackingContextWithRoot (Ordinal: 3, Address: 0xf100)
  • EndTrackingContext (Ordinal: 4, Address: 0xf190)
  • StopTrackingAndCleanup (Ordinal: 5, Address: 0xf1d0)
  • SuspendTracking (Ordinal: 6, Address: 0xf210)
  • ResumeTracking (Ordinal: 7, Address: 0xf240)
  • WriteAllTLogs (Ordinal: 8, Address: 0xf280)
  • WriteContextTLogs (Ordinal: 9, Address: 0xf310)
  • SetThreadCount (Ordinal: 10, Address: 0xf3b0)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x10035114)
  • CompareFileTime (Address: 0x10035134)
  • CopyFileA (Address: 0x1003502c)
  • CopyFileExA (Address: 0x10035034)
  • CopyFileExW (Address: 0x10035038)
  • CopyFileW (Address: 0x10035030)
  • CreateDirectoryA (Address: 0x1003506c)
  • CreateDirectoryW (Address: 0x10035068)
  • CreateEventW (Address: 0x10035110)
  • CreateFileA (Address: 0x10035024)
  • CreateFileW (Address: 0x10035028)
  • CreateHardLinkA (Address: 0x1003503c)
  • CreateHardLinkW (Address: 0x10035040)
  • CreateProcessA (Address: 0x10035044)
  • CreateProcessW (Address: 0x10035048)
  • CreateThread (Address: 0x1003504c)
  • DecodePointer (Address: 0x1003513c)
  • DeleteCriticalSection (Address: 0x10035104)
  • DeleteFileA (Address: 0x10035074)
  • DeleteFileW (Address: 0x10035070)
  • DisableThreadLibraryCalls (Address: 0x10035080)
  • EncodePointer (Address: 0x10035168)
  • EnterCriticalSection (Address: 0x1003501c)
  • ExitProcess (Address: 0x1003507c)
  • FindClose (Address: 0x100351a8)
  • FindFirstFileExA (Address: 0x100351ac)
  • FindFirstFileW (Address: 0x10035214)
  • FindNextFileA (Address: 0x100351b0)
  • FindNextFileW (Address: 0x100351b4)
  • FindResourceExW (Address: 0x100350bc)
  • FindResourceW (Address: 0x100350b8)
  • FlushFileBuffers (Address: 0x10035190)
  • FlushInstructionCache (Address: 0x100351fc)
  • FormatMessageW (Address: 0x10035220)
  • FreeEnvironmentStringsA (Address: 0x10035100)
  • FreeEnvironmentStringsW (Address: 0x100350f4)
  • FreeLibrary (Address: 0x10035174)
  • GetACP (Address: 0x1003518c)
  • GetCommandLineA (Address: 0x100351c4)
  • GetCommandLineW (Address: 0x100350e0)
  • GetConsoleCP (Address: 0x10035194)
  • GetConsoleMode (Address: 0x10035198)
  • GetConsoleOutputCP (Address: 0x10035228)
  • GetCPInfo (Address: 0x100351c0)
  • GetCurrentProcess (Address: 0x10035150)
  • GetCurrentProcessId (Address: 0x10035088)
  • GetCurrentThread (Address: 0x100350a8)
  • GetCurrentThreadId (Address: 0x100350c8)
  • GetEnvironmentStrings (Address: 0x100350fc)
  • GetEnvironmentStringsW (Address: 0x100350f0)
  • GetEnvironmentVariableA (Address: 0x100350f8)
  • GetEnvironmentVariableW (Address: 0x10035018)
  • GetFileAttributesA (Address: 0x10035054)
  • GetFileAttributesExA (Address: 0x1003505c)
  • GetFileAttributesExW (Address: 0x10035058)
  • GetFileAttributesW (Address: 0x10035050)
  • GetFileType (Address: 0x10035094)
  • GetFullPathNameW (Address: 0x10035218)
  • GetLastError (Address: 0x10035090)
  • GetLocaleInfoW (Address: 0x100351a0)
  • GetModuleFileNameA (Address: 0x100350ec)
  • GetModuleFileNameW (Address: 0x100350a4)
  • GetModuleHandleA (Address: 0x10035210)
  • GetModuleHandleExW (Address: 0x10035184)
  • GetModuleHandleW (Address: 0x10035144)
  • GetOEMCP (Address: 0x100351bc)
  • GetProcAddress (Address: 0x1003510c)
  • GetProcessHeap (Address: 0x10035014)
  • GetProcessId (Address: 0x1003509c)
  • GetStartupInfoW (Address: 0x10035160)
  • GetStdHandle (Address: 0x100351a4)
  • GetStringTypeW (Address: 0x100351c8)
  • GetSystemTimeAsFileTime (Address: 0x10035124)
  • GetThreadContext (Address: 0x100351f4)
  • GetTickCount (Address: 0x10035200)
  • GetUserDefaultUILanguage (Address: 0x10035224)
  • HeapAlloc (Address: 0x10035010)
  • HeapDestroy (Address: 0x10035000)
  • HeapFree (Address: 0x1003500c)
  • HeapReAlloc (Address: 0x10035008)
  • HeapSize (Address: 0x10035004)
  • InitializeCriticalSection (Address: 0x100350dc)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1003516c)
  • InitializeCriticalSectionEx (Address: 0x10035138)
  • InitializeSListHead (Address: 0x10035158)
  • InterlockedCompareExchange (Address: 0x100350e4)
  • InterlockedFlushSList (Address: 0x1003517c)
  • InterlockedIncrement (Address: 0x100350cc)
  • IsDebuggerPresent (Address: 0x1003515c)
  • IsProcessorFeaturePresent (Address: 0x10035154)
  • IsValidCodePage (Address: 0x100351b8)
  • LCMapStringW (Address: 0x1003519c)
  • LeaveCriticalSection (Address: 0x10035020)
  • LoadLibraryExW (Address: 0x10035178)
  • LoadLibraryW (Address: 0x100350a0)
  • LoadResource (Address: 0x100350b4)
  • LocalFree (Address: 0x1003521c)
  • LockResource (Address: 0x100350b0)
  • MultiByteToWideChar (Address: 0x10035108)
  • OutputDebugStringW (Address: 0x100351d8)
  • QueryPerformanceCounter (Address: 0x100350d0)
  • QueryPerformanceFrequency (Address: 0x100350d4)
  • RaiseException (Address: 0x10035180)
  • ReadConsoleW (Address: 0x1003522c)
  • ReadFile (Address: 0x1003512c)
  • ReadProcessMemory (Address: 0x100351e8)
  • RemoveDirectoryA (Address: 0x10035064)
  • RemoveDirectoryW (Address: 0x10035060)
  • ResetEvent (Address: 0x1003511c)
  • ResumeThread (Address: 0x1003508c)
  • RtlUnwind (Address: 0x10035164)
  • SetDllDirectoryW (Address: 0x100350e8)
  • SetEndOfFile (Address: 0x10035230)
  • SetEnvironmentVariableW (Address: 0x10035084)
  • SetEvent (Address: 0x10035120)
  • SetFilePointer (Address: 0x10035130)
  • SetFilePointerEx (Address: 0x100351d0)
  • SetLastError (Address: 0x10035098)
  • SetStdHandle (Address: 0x100351cc)
  • SetThreadContext (Address: 0x100351f8)
  • SetUnhandledExceptionFilter (Address: 0x1003514c)
  • SizeofResource (Address: 0x100350ac)
  • SuspendThread (Address: 0x100351f0)
  • TerminateProcess (Address: 0x10035078)
  • TlsAlloc (Address: 0x100350d8)
  • TlsFree (Address: 0x10035170)
  • TlsGetValue (Address: 0x100350c0)
  • TlsSetValue (Address: 0x100350c4)
  • UnhandledExceptionFilter (Address: 0x10035148)
  • VirtualAlloc (Address: 0x10035204)
  • VirtualAllocEx (Address: 0x100351dc)
  • VirtualProtect (Address: 0x10035208)
  • VirtualProtectEx (Address: 0x100351e0)
  • VirtualQuery (Address: 0x1003520c)
  • VirtualQueryEx (Address: 0x100351e4)
  • WaitForSingleObject (Address: 0x10035118)
  • WaitForSingleObjectEx (Address: 0x10035140)
  • WideCharToMultiByte (Address: 0x10035188)
  • WriteConsoleW (Address: 0x100351d4)
  • WriteFile (Address: 0x10035128)
  • WriteProcessMemory (Address: 0x100351ec)