ToolsInjectionHelper32.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 658c4d694f51bd2204772fe3cc1e2e0c

File Size: 671.5 KB

Uploaded At: Dec. 1, 2025, 2:54 p.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, VirtualAllocEx

Exported Functions

  • DetourFinishHelperProcess (Ordinal: 1, Address: 0x2b220)
  • FakeEntryPoint (Ordinal: 2, Address: 0xc980)
  • GetExportTable (Ordinal: 3, Address: 0xca70)

Imported DLLs & Functions

ADVAPI32.dll
  • InitializeSecurityDescriptor (Address: 0x10082010)
  • RegCloseKey (Address: 0x10082008)
  • RegOpenKeyExA (Address: 0x10082004)
  • RegQueryValueExA (Address: 0x10082000)
  • SetSecurityDescriptorDacl (Address: 0x1008200c)
KERNEL32.dll
  • AreFileApisANSI (Address: 0x10082180)
  • CloseHandle (Address: 0x100821d0)
  • CompareStringEx (Address: 0x10082200)
  • CompareStringW (Address: 0x10082254)
  • CreateDirectoryA (Address: 0x10082090)
  • CreateEventW (Address: 0x10082210)
  • CreateFileA (Address: 0x10082094)
  • CreateFileMappingA (Address: 0x100820f8)
  • CreateFileW (Address: 0x1008216c)
  • CreateMutexA (Address: 0x100820cc)
  • CreatePipe (Address: 0x1008201c)
  • CreateProcessW (Address: 0x10082058)
  • CreateSemaphoreA (Address: 0x100820f4)
  • CreateSemaphoreW (Address: 0x10082190)
  • CreateThread (Address: 0x10082194)
  • DecodePointer (Address: 0x100821f4)
  • DeleteCriticalSection (Address: 0x1008202c)
  • DeleteFileA (Address: 0x1008213c)
  • DuplicateHandle (Address: 0x100821cc)
  • EncodePointer (Address: 0x100821f0)
  • EnterCriticalSection (Address: 0x10082024)
  • EnumSystemLocalesW (Address: 0x10082268)
  • ExitProcess (Address: 0x10082148)
  • ExitThread (Address: 0x10082230)
  • FileTimeToSystemTime (Address: 0x10082108)
  • FindClose (Address: 0x10082098)
  • FindFirstFileA (Address: 0x1008209c)
  • FindFirstFileExW (Address: 0x10082280)
  • FindNextFileA (Address: 0x100820a0)
  • FindNextFileW (Address: 0x1008217c)
  • FlushFileBuffers (Address: 0x10082170)
  • FlushInstructionCache (Address: 0x100821e0)
  • FormatMessageA (Address: 0x100820f0)
  • FormatMessageW (Address: 0x10082178)
  • FreeEnvironmentStringsW (Address: 0x1008229c)
  • FreeLibrary (Address: 0x10082060)
  • FreeLibraryAndExitThread (Address: 0x10082234)
  • GetACP (Address: 0x10082288)
  • GetCommandLineA (Address: 0x10082290)
  • GetCommandLineW (Address: 0x10082294)
  • GetConsoleMode (Address: 0x10082270)
  • GetConsoleOutputCP (Address: 0x1008226c)
  • GetCPInfo (Address: 0x10082204)
  • GetCurrentDirectoryW (Address: 0x10082168)
  • GetCurrentProcess (Address: 0x10082034)
  • GetCurrentProcessId (Address: 0x10082038)
  • GetCurrentThread (Address: 0x10082040)
  • GetCurrentThreadId (Address: 0x10082044)
  • GetDateFormatW (Address: 0x1008224c)
  • GetEnvironmentStringsW (Address: 0x10082298)
  • GetEnvironmentVariableW (Address: 0x100821e4)
  • GetExitCodeProcess (Address: 0x1008214c)
  • GetFileAttributesW (Address: 0x100821dc)
  • GetFileSizeEx (Address: 0x100820a4)
  • GetFileType (Address: 0x10082248)
  • GetLastError (Address: 0x10082120)
  • GetLocaleInfoEx (Address: 0x100821fc)
  • GetLocaleInfoW (Address: 0x1008225c)
  • GetModuleFileNameA (Address: 0x10082084)
  • GetModuleFileNameW (Address: 0x10082088)
  • GetModuleHandleA (Address: 0x100820e8)
  • GetModuleHandleExA (Address: 0x10082100)
  • GetModuleHandleExW (Address: 0x10082238)
  • GetModuleHandleW (Address: 0x10082064)
  • GetNativeSystemInfo (Address: 0x10082164)
  • GetOEMCP (Address: 0x1008228c)
  • GetProcAddress (Address: 0x10082068)
  • GetProcessHeap (Address: 0x100821c8)
  • GetProcessId (Address: 0x1008219c)
  • GetProcessTimes (Address: 0x100820d0)
  • GetStartupInfoW (Address: 0x10082220)
  • GetStdHandle (Address: 0x10082244)
  • GetStringTypeW (Address: 0x100821e8)
  • GetSystemInfo (Address: 0x100820d8)
  • GetSystemTimeAsFileTime (Address: 0x100820fc)
  • GetTempFileNameA (Address: 0x10082144)
  • GetTempPathA (Address: 0x10082140)
  • GetThreadContext (Address: 0x10082118)
  • GetThreadId (Address: 0x1008205c)
  • GetTickCount (Address: 0x100820dc)
  • GetTimeFormatW (Address: 0x10082250)
  • GetTimeZoneInformation (Address: 0x1008227c)
  • GetUserDefaultLCID (Address: 0x10082264)
  • HeapAlloc (Address: 0x10082240)
  • HeapFree (Address: 0x1008223c)
  • HeapReAlloc (Address: 0x10082278)
  • HeapSize (Address: 0x100821bc)
  • InitializeCriticalSection (Address: 0x10082020)
  • InitializeCriticalSectionAndSpinCount (Address: 0x10082208)
  • InitializeCriticalSectionEx (Address: 0x100821ec)
  • InitializeSListHead (Address: 0x10082214)
  • InterlockedFlushSList (Address: 0x10082228)
  • InterlockedPushEntrySList (Address: 0x10082224)
  • IsDebuggerPresent (Address: 0x100821d4)
  • IsProcessorFeaturePresent (Address: 0x1008221c)
  • IsValidCodePage (Address: 0x10082284)
  • IsValidLocale (Address: 0x10082260)
  • IsWow64Process (Address: 0x10082160)
  • LCMapStringEx (Address: 0x100821f8)
  • LCMapStringW (Address: 0x10082258)
  • LeaveCriticalSection (Address: 0x10082028)
  • LoadLibraryA (Address: 0x10082074)
  • LoadLibraryExA (Address: 0x1008206c)
  • LoadLibraryExW (Address: 0x10082070)
  • LoadLibraryW (Address: 0x10082078)
  • LocalFree (Address: 0x100820ec)
  • MapViewOfFileEx (Address: 0x100820e0)
  • MultiByteToWideChar (Address: 0x10082184)
  • OpenProcess (Address: 0x10082150)
  • OutputDebugStringA (Address: 0x1008210c)
  • QueryFullProcessImageNameA (Address: 0x1008207c)
  • QueryPerformanceCounter (Address: 0x100820b8)
  • QueryPerformanceFrequency (Address: 0x100820bc)
  • RaiseException (Address: 0x1008208c)
  • ReadConsoleW (Address: 0x100821c0)
  • ReadFile (Address: 0x100821d8)
  • ReadProcessMemory (Address: 0x10082158)
  • ReleaseMutex (Address: 0x100820c4)
  • ReleaseSemaphore (Address: 0x100820c0)
  • RemoveDirectoryA (Address: 0x100820a8)
  • ResetEvent (Address: 0x100821b0)
  • ResumeThread (Address: 0x10082114)
  • RtlCaptureContext (Address: 0x10082188)
  • RtlUnwind (Address: 0x1008222c)
  • SetEndOfFile (Address: 0x100820ac)
  • SetEnvironmentVariableW (Address: 0x10082274)
  • SetEvent (Address: 0x100821ac)
  • SetFilePointer (Address: 0x100820b0)
  • SetFilePointerEx (Address: 0x10082174)
  • SetLastError (Address: 0x10082018)
  • SetNamedPipeHandleState (Address: 0x100821a0)
  • SetStdHandle (Address: 0x100821c4)
  • SetThreadContext (Address: 0x1008211c)
  • SetUnhandledExceptionFilter (Address: 0x1008218c)
  • Sleep (Address: 0x10082030)
  • SuspendThread (Address: 0x10082110)
  • SwitchToThread (Address: 0x100820d4)
  • SystemTimeToTzSpecificLocalTime (Address: 0x10082104)
  • TerminateProcess (Address: 0x1008203c)
  • TerminateThread (Address: 0x10082198)
  • TlsAlloc (Address: 0x10082048)
  • TlsFree (Address: 0x10082054)
  • TlsGetValue (Address: 0x1008204c)
  • TlsSetValue (Address: 0x10082050)
  • TransactNamedPipe (Address: 0x100821a4)
  • UnhandledExceptionFilter (Address: 0x10082218)
  • UnmapViewOfFile (Address: 0x100820e4)
  • VirtualAlloc (Address: 0x10082124)
  • VirtualAllocEx (Address: 0x10082154)
  • VirtualFree (Address: 0x1008212c)
  • VirtualProtect (Address: 0x10082128)
  • VirtualProtectEx (Address: 0x10082134)
  • VirtualQuery (Address: 0x10082130)
  • VirtualQueryEx (Address: 0x10082138)
  • WaitForMultipleObjects (Address: 0x100821b4)
  • WaitForSingleObject (Address: 0x100820c8)
  • WaitForSingleObjectEx (Address: 0x1008220c)
  • WaitNamedPipeW (Address: 0x100821a8)
  • WideCharToMultiByte (Address: 0x10082080)
  • WriteConsoleW (Address: 0x100821b8)
  • WriteFile (Address: 0x100820b4)
  • WriteProcessMemory (Address: 0x1008215c)
ole32.dll
  • CoCreateGuid (Address: 0x100822bc)
USER32.dll
  • MessageBoxA (Address: 0x100822a8)
  • RegisterClassA (Address: 0x100822a4)
  • RegisterClassExA (Address: 0x100822b0)
  • RegisterClassExW (Address: 0x100822ac)
  • RegisterClassW (Address: 0x100822b4)