TreeLauncherTargetInjection.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 31a58aaa5915aa72a825b334de3f6461

File Size: 1.3 MB

Uploaded At: Dec. 1, 2025, 2:53 p.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • QueryInjectionModuleClient (Ordinal: 1, Address: 0x12c70)

Imported DLLs & Functions

InterceptorInjectionTarget.dll
  • ?GetCallbackList@AfterCreateProcessData@InterceptorInjection@ProcessTree@NV@@CAAAV?$NeverDestroyedVector@U?$CallbackDescriptor@$00@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x100ea004)
  • ?GetCallbackList@AfterExitCodeFoundData@InterceptorInjection@ProcessTree@NV@@CAAAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0N@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x100ea018)
  • ?GetCallbackList@AfterExitData@InterceptorInjection@ProcessTree@NV@@CAAAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0O@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x100ea01c)
  • ?GetCallbackList@BeforeCatchableAllButCleanExitData@InterceptorInjection@ProcessTree@NV@@CAAAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0M@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x100ea014)
  • ?GetCallbackList@BeforeCatchableExitData@InterceptorInjection@ProcessTree@NV@@CAAAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0L@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x100ea010)
  • ?GetCallbackList@BeforeCleanExitData@InterceptorInjection@ProcessTree@NV@@CAAAV?$NeverDestroyedVector@U?$CallbackDescriptor@$09@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x100ea00c)
  • ?GetCallbackList@BeforeCreateProcessData@InterceptorInjection@ProcessTree@NV@@CAAAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0A@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x100ea000)
  • ?GetCallbackList@PidOfChildFoundData@InterceptorInjection@ProcessTree@NV@@CAAAV?$NeverDestroyedVector@U?$CallbackDescriptor@$08@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x100ea008)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x100ea0e4)
  • CloseHandle (Address: 0x100ea040)
  • CompareStringEx (Address: 0x100ea110)
  • CompareStringW (Address: 0x100ea19c)
  • ConnectNamedPipe (Address: 0x100ea048)
  • CreateEventA (Address: 0x100ea05c)
  • CreateEventW (Address: 0x100ea128)
  • CreateFileA (Address: 0x100ea09c)
  • CreateFileW (Address: 0x100ea034)
  • CreateNamedPipeW (Address: 0x100ea050)
  • CreateThread (Address: 0x100ea16c)
  • DecodePointer (Address: 0x100ea10c)
  • DeleteCriticalSection (Address: 0x100ea090)
  • EncodePointer (Address: 0x100ea108)
  • EnterCriticalSection (Address: 0x100ea088)
  • EnumSystemLocalesW (Address: 0x100ea1b0)
  • ExitProcess (Address: 0x100ea164)
  • ExitThread (Address: 0x100ea170)
  • FileTimeToSystemTime (Address: 0x100ea080)
  • FindClose (Address: 0x100ea0a0)
  • FindFirstFileExW (Address: 0x100ea1c8)
  • FindNextFileW (Address: 0x100ea0a4)
  • FlushFileBuffers (Address: 0x100ea1b4)
  • FreeEnvironmentStringsW (Address: 0x100ea1dc)
  • FreeLibrary (Address: 0x100ea15c)
  • FreeLibraryAndExitThread (Address: 0x100ea174)
  • GetACP (Address: 0x100ea1d0)
  • GetCommandLineA (Address: 0x100ea1d8)
  • GetCommandLineW (Address: 0x100ea0b4)
  • GetConsoleMode (Address: 0x100ea180)
  • GetConsoleOutputCP (Address: 0x100ea188)
  • GetCPInfo (Address: 0x100ea114)
  • GetCurrentProcess (Address: 0x100ea0b8)
  • GetCurrentProcessId (Address: 0x100ea028)
  • GetCurrentThreadId (Address: 0x100ea068)
  • GetEnvironmentStringsW (Address: 0x100ea024)
  • GetEnvironmentVariableW (Address: 0x100ea030)
  • GetFileSizeEx (Address: 0x100ea1c4)
  • GetFileType (Address: 0x100ea17c)
  • GetLastError (Address: 0x100ea044)
  • GetLocaleInfoW (Address: 0x100ea1a4)
  • GetModuleFileNameA (Address: 0x100ea074)
  • GetModuleFileNameW (Address: 0x100ea098)
  • GetModuleHandleExA (Address: 0x100ea078)
  • GetModuleHandleExW (Address: 0x100ea168)
  • GetModuleHandleW (Address: 0x100ea104)
  • GetOEMCP (Address: 0x100ea1d4)
  • GetOverlappedResult (Address: 0x100ea054)
  • GetProcAddress (Address: 0x100ea0c4)
  • GetProcessHeap (Address: 0x100ea0d8)
  • GetStartupInfoW (Address: 0x100ea138)
  • GetStdHandle (Address: 0x100ea194)
  • GetStringTypeW (Address: 0x100ea0f0)
  • GetSystemTimeAsFileTime (Address: 0x100ea070)
  • GetUserDefaultLCID (Address: 0x100ea1ac)
  • HeapAlloc (Address: 0x100ea190)
  • HeapFree (Address: 0x100ea18c)
  • HeapReAlloc (Address: 0x100ea198)
  • HeapSize (Address: 0x100ea0d0)
  • InitializeCriticalSection (Address: 0x100ea084)
  • InitializeCriticalSectionAndSpinCount (Address: 0x100ea11c)
  • InitializeCriticalSectionEx (Address: 0x100ea0e8)
  • InitializeSListHead (Address: 0x100ea13c)
  • InitializeSRWLock (Address: 0x100ea0dc)
  • InitOnceBeginInitialize (Address: 0x100ea0f8)
  • InitOnceComplete (Address: 0x100ea0fc)
  • InterlockedFlushSList (Address: 0x100ea140)
  • IsDebuggerPresent (Address: 0x100ea064)
  • IsProcessorFeaturePresent (Address: 0x100ea134)
  • IsValidCodePage (Address: 0x100ea1cc)
  • IsValidLocale (Address: 0x100ea1a8)
  • K32EnumProcessModules (Address: 0x100ea0c8)
  • K32GetModuleBaseNameA (Address: 0x100ea0cc)
  • LCMapStringEx (Address: 0x100ea118)
  • LCMapStringW (Address: 0x100ea1a0)
  • LeaveCriticalSection (Address: 0x100ea08c)
  • LoadLibraryExW (Address: 0x100ea160)
  • LoadLibraryW (Address: 0x100ea02c)
  • MultiByteToWideChar (Address: 0x100ea0ac)
  • OpenProcess (Address: 0x100ea0c0)
  • OutputDebugStringA (Address: 0x100ea094)
  • QueryPerformanceCounter (Address: 0x100ea100)
  • RaiseException (Address: 0x100ea144)
  • ReadConsoleW (Address: 0x100ea184)
  • ReadFile (Address: 0x100ea038)
  • ReleaseSRWLockExclusive (Address: 0x100ea0e0)
  • ResetEvent (Address: 0x100ea124)
  • RtlUnwind (Address: 0x100ea148)
  • SetEndOfFile (Address: 0x100ea1bc)
  • SetEnvironmentVariableW (Address: 0x100ea178)
  • SetEvent (Address: 0x100ea120)
  • SetFilePointerEx (Address: 0x100ea1c0)
  • SetLastError (Address: 0x100ea0a8)
  • SetNamedPipeHandleState (Address: 0x100ea04c)
  • SetStdHandle (Address: 0x100ea1b8)
  • SetUnhandledExceptionFilter (Address: 0x100ea130)
  • Sleep (Address: 0x100ea06c)
  • SwitchToThread (Address: 0x100ea060)
  • SystemTimeToTzSpecificLocalTime (Address: 0x100ea07c)
  • TerminateProcess (Address: 0x100ea0bc)
  • TlsAlloc (Address: 0x100ea14c)
  • TlsFree (Address: 0x100ea158)
  • TlsGetValue (Address: 0x100ea150)
  • TlsSetValue (Address: 0x100ea154)
  • TryEnterCriticalSection (Address: 0x100ea0ec)
  • UnhandledExceptionFilter (Address: 0x100ea12c)
  • WaitForSingleObject (Address: 0x100ea058)
  • WaitForSingleObjectEx (Address: 0x100ea0f4)
  • WideCharToMultiByte (Address: 0x100ea0b0)
  • WriteConsoleW (Address: 0x100ea0d4)
  • WriteFile (Address: 0x100ea03c)
USER32.dll
  • MessageBoxA (Address: 0x100ea1e4)