TreeLauncherTargetInjection.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: c5129327d00ef5acc8dd2380c6b8f6e9

File Size: 1.5 MB

Uploaded At: Dec. 1, 2025, 2:55 p.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • QueryInjectionModuleClient (Ordinal: 1, Address: 0x15a00)

Imported DLLs & Functions

InterceptorInjectionTarget.dll
  • ?GetCallbackList@AfterCreateProcessData@InterceptorInjection@ProcessTree@NV@@CAAEAV?$NeverDestroyedVector@U?$CallbackDescriptor@$00@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x18010d008)
  • ?GetCallbackList@AfterExitCodeFoundData@InterceptorInjection@ProcessTree@NV@@CAAEAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0N@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x18010d030)
  • ?GetCallbackList@AfterExitData@InterceptorInjection@ProcessTree@NV@@CAAEAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0O@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x18010d038)
  • ?GetCallbackList@BeforeCatchableAllButCleanExitData@InterceptorInjection@ProcessTree@NV@@CAAEAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0M@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x18010d028)
  • ?GetCallbackList@BeforeCatchableExitData@InterceptorInjection@ProcessTree@NV@@CAAEAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0L@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x18010d020)
  • ?GetCallbackList@BeforeCleanExitData@InterceptorInjection@ProcessTree@NV@@CAAEAV?$NeverDestroyedVector@U?$CallbackDescriptor@$09@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x18010d018)
  • ?GetCallbackList@BeforeCreateProcessData@InterceptorInjection@ProcessTree@NV@@CAAEAV?$NeverDestroyedVector@U?$CallbackDescriptor@$0A@@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x18010d000)
  • ?GetCallbackList@PidOfChildFoundData@InterceptorInjection@ProcessTree@NV@@CAAEAV?$NeverDestroyedVector@U?$CallbackDescriptor@$08@InterceptorInjection@ProcessTree@NV@@@234@XZ (Address: 0x18010d010)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18010d1c0)
  • CloseHandle (Address: 0x18010d080)
  • CompareStringEx (Address: 0x18010d218)
  • CompareStringW (Address: 0x18010d350)
  • ConnectNamedPipe (Address: 0x18010d090)
  • CreateEventA (Address: 0x18010d0b8)
  • CreateEventW (Address: 0x18010d248)
  • CreateFileA (Address: 0x18010d138)
  • CreateFileW (Address: 0x18010d068)
  • CreateNamedPipeW (Address: 0x18010d0a0)
  • CreateThread (Address: 0x18010d2f0)
  • DecodePointer (Address: 0x18010d210)
  • DeleteCriticalSection (Address: 0x18010d120)
  • EncodePointer (Address: 0x18010d208)
  • EnterCriticalSection (Address: 0x18010d110)
  • EnumSystemLocalesW (Address: 0x18010d378)
  • ExitProcess (Address: 0x18010d2e0)
  • ExitThread (Address: 0x18010d2f8)
  • FileTimeToSystemTime (Address: 0x18010d100)
  • FindClose (Address: 0x18010d140)
  • FindFirstFileExW (Address: 0x18010d3a8)
  • FindNextFileW (Address: 0x18010d148)
  • FlushFileBuffers (Address: 0x18010d380)
  • FreeEnvironmentStringsW (Address: 0x18010d3d0)
  • FreeLibrary (Address: 0x18010d2d0)
  • FreeLibraryAndExitThread (Address: 0x18010d300)
  • GetACP (Address: 0x18010d3b8)
  • GetCommandLineA (Address: 0x18010d3c8)
  • GetCommandLineW (Address: 0x18010d168)
  • GetConsoleMode (Address: 0x18010d318)
  • GetConsoleOutputCP (Address: 0x18010d328)
  • GetCPInfo (Address: 0x18010d220)
  • GetCurrentProcess (Address: 0x18010d170)
  • GetCurrentProcessId (Address: 0x18010d050)
  • GetCurrentThreadId (Address: 0x18010d0d0)
  • GetEnvironmentStringsW (Address: 0x18010d048)
  • GetEnvironmentVariableW (Address: 0x18010d060)
  • GetFileSizeEx (Address: 0x18010d3a0)
  • GetFileType (Address: 0x18010d310)
  • GetLastError (Address: 0x18010d088)
  • GetLocaleInfoW (Address: 0x18010d360)
  • GetModuleFileNameA (Address: 0x18010d0e8)
  • GetModuleFileNameW (Address: 0x18010d130)
  • GetModuleHandleExA (Address: 0x18010d0f0)
  • GetModuleHandleExW (Address: 0x18010d2e8)
  • GetModuleHandleW (Address: 0x18010d200)
  • GetOEMCP (Address: 0x18010d3c0)
  • GetOverlappedResult (Address: 0x18010d0a8)
  • GetProcAddress (Address: 0x18010d188)
  • GetProcessHeap (Address: 0x18010d3d8)
  • GetStartupInfoW (Address: 0x18010d280)
  • GetStdHandle (Address: 0x18010d340)
  • GetStringTypeW (Address: 0x18010d1d8)
  • GetSystemTimeAsFileTime (Address: 0x18010d0e0)
  • GetUserDefaultLCID (Address: 0x18010d370)
  • HeapAlloc (Address: 0x18010d338)
  • HeapFree (Address: 0x18010d330)
  • HeapReAlloc (Address: 0x18010d348)
  • HeapSize (Address: 0x18010d1a0)
  • InitializeCriticalSection (Address: 0x18010d108)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18010d230)
  • InitializeCriticalSectionEx (Address: 0x18010d1c8)
  • InitializeSListHead (Address: 0x18010d288)
  • InitializeSRWLock (Address: 0x18010d1b0)
  • InitOnceBeginInitialize (Address: 0x18010d1e8)
  • InitOnceComplete (Address: 0x18010d1f0)
  • InterlockedFlushSList (Address: 0x18010d290)
  • IsDebuggerPresent (Address: 0x18010d0c8)
  • IsProcessorFeaturePresent (Address: 0x18010d278)
  • IsValidCodePage (Address: 0x18010d3b0)
  • IsValidLocale (Address: 0x18010d368)
  • K32EnumProcessModules (Address: 0x18010d190)
  • K32GetModuleBaseNameA (Address: 0x18010d198)
  • LCMapStringEx (Address: 0x18010d228)
  • LCMapStringW (Address: 0x18010d358)
  • LeaveCriticalSection (Address: 0x18010d118)
  • LoadLibraryExW (Address: 0x18010d2d8)
  • LoadLibraryW (Address: 0x18010d058)
  • MultiByteToWideChar (Address: 0x18010d158)
  • OpenProcess (Address: 0x18010d180)
  • OutputDebugStringA (Address: 0x18010d128)
  • QueryPerformanceCounter (Address: 0x18010d1f8)
  • RaiseException (Address: 0x18010d2a0)
  • ReadConsoleW (Address: 0x18010d320)
  • ReadFile (Address: 0x18010d070)
  • ReleaseSRWLockExclusive (Address: 0x18010d1b8)
  • ResetEvent (Address: 0x18010d240)
  • RtlCaptureContext (Address: 0x18010d250)
  • RtlLookupFunctionEntry (Address: 0x18010d258)
  • RtlPcToFileHeader (Address: 0x18010d298)
  • RtlUnwind (Address: 0x18010d3e0)
  • RtlUnwindEx (Address: 0x18010d2a8)
  • RtlVirtualUnwind (Address: 0x18010d260)
  • SetEndOfFile (Address: 0x18010d390)
  • SetEnvironmentVariableW (Address: 0x18010d308)
  • SetEvent (Address: 0x18010d238)
  • SetFilePointerEx (Address: 0x18010d398)
  • SetLastError (Address: 0x18010d150)
  • SetNamedPipeHandleState (Address: 0x18010d098)
  • SetStdHandle (Address: 0x18010d388)
  • SetUnhandledExceptionFilter (Address: 0x18010d270)
  • Sleep (Address: 0x18010d0d8)
  • SwitchToThread (Address: 0x18010d0c0)
  • SystemTimeToTzSpecificLocalTime (Address: 0x18010d0f8)
  • TerminateProcess (Address: 0x18010d178)
  • TlsAlloc (Address: 0x18010d2b0)
  • TlsFree (Address: 0x18010d2c8)
  • TlsGetValue (Address: 0x18010d2b8)
  • TlsSetValue (Address: 0x18010d2c0)
  • TryEnterCriticalSection (Address: 0x18010d1d0)
  • UnhandledExceptionFilter (Address: 0x18010d268)
  • WaitForSingleObject (Address: 0x18010d0b0)
  • WaitForSingleObjectEx (Address: 0x18010d1e0)
  • WideCharToMultiByte (Address: 0x18010d160)
  • WriteConsoleW (Address: 0x18010d1a8)
  • WriteFile (Address: 0x18010d078)
USER32.dll
  • MessageBoxA (Address: 0x18010d3f0)