FileTracker32.dll

Description: FileTracker

Authors: © Microsoft Corporation. All rights reserved.

Version: 17.0.36015.10

Architecture: 32-bit

Operating System: Windows

SHA256: c1923e7e363a7c6cd3ca94e3d3df9055

File Size: 244.1 KB

Uploaded At: Dec. 2, 2025, 2:44 p.m.

Views: 5

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, VirtualAllocEx

Exported Functions

  • (Ordinal: 1, Address: 0x14220)
  • StartTrackingContext (Ordinal: 2, Address: 0xf7e0)
  • StartTrackingContextWithRoot (Ordinal: 3, Address: 0xf880)
  • EndTrackingContext (Ordinal: 4, Address: 0xf910)
  • StopTrackingAndCleanup (Ordinal: 5, Address: 0xf950)
  • SuspendTracking (Ordinal: 6, Address: 0xf990)
  • ResumeTracking (Ordinal: 7, Address: 0xf9c0)
  • WriteAllTLogs (Ordinal: 8, Address: 0xfa00)
  • WriteContextTLogs (Ordinal: 9, Address: 0xfa90)
  • SetThreadCount (Ordinal: 10, Address: 0xfb90)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x10038130)
  • CompareFileTime (Address: 0x10038150)
  • CopyFileA (Address: 0x10038030)
  • CopyFileExA (Address: 0x10038038)
  • CopyFileExW (Address: 0x1003803c)
  • CopyFileW (Address: 0x10038034)
  • CreateDirectoryA (Address: 0x10038088)
  • CreateDirectoryW (Address: 0x10038084)
  • CreateEventW (Address: 0x1003812c)
  • CreateFile2 (Address: 0x1003802c)
  • CreateFileA (Address: 0x10038024)
  • CreateFileW (Address: 0x10038028)
  • CreateHardLinkA (Address: 0x10038058)
  • CreateHardLinkW (Address: 0x1003805c)
  • CreateProcessA (Address: 0x10038060)
  • CreateProcessW (Address: 0x10038064)
  • CreateThread (Address: 0x10038068)
  • DecodePointer (Address: 0x10038158)
  • DeleteCriticalSection (Address: 0x1003811c)
  • DeleteFileA (Address: 0x10038090)
  • DeleteFileW (Address: 0x1003808c)
  • DeleteProcThreadAttributeList (Address: 0x10038204)
  • DisableThreadLibraryCalls (Address: 0x1003809c)
  • EncodePointer (Address: 0x1003818c)
  • EnterCriticalSection (Address: 0x1003801c)
  • ExitProcess (Address: 0x10038098)
  • FindClose (Address: 0x100381bc)
  • FindFirstFileExW (Address: 0x100381c0)
  • FindFirstFileW (Address: 0x10038240)
  • FindNextFileW (Address: 0x100381c4)
  • FindResourceExW (Address: 0x100380dc)
  • FindResourceW (Address: 0x100380d8)
  • FlushFileBuffers (Address: 0x100381a4)
  • FlushInstructionCache (Address: 0x10038230)
  • FormatMessageW (Address: 0x1003824c)
  • FreeEnvironmentStringsA (Address: 0x10038118)
  • FreeEnvironmentStringsW (Address: 0x1003810c)
  • FreeLibrary (Address: 0x10038198)
  • GetACP (Address: 0x100381cc)
  • GetCommandLineA (Address: 0x100381d8)
  • GetCommandLineW (Address: 0x100380fc)
  • GetConsoleCP (Address: 0x100381a8)
  • GetConsoleMode (Address: 0x100381ac)
  • GetConsoleOutputCP (Address: 0x10038254)
  • GetCPInfo (Address: 0x100381d4)
  • GetCurrentProcess (Address: 0x10038168)
  • GetCurrentProcessId (Address: 0x100380a4)
  • GetCurrentThread (Address: 0x100380c8)
  • GetCurrentThreadId (Address: 0x100380e8)
  • GetEnvironmentStrings (Address: 0x10038114)
  • GetEnvironmentStringsW (Address: 0x10038108)
  • GetEnvironmentVariableA (Address: 0x10038110)
  • GetEnvironmentVariableW (Address: 0x10038018)
  • GetExitCodeProcess (Address: 0x10038218)
  • GetFileAttributesA (Address: 0x10038070)
  • GetFileAttributesExA (Address: 0x10038078)
  • GetFileAttributesExW (Address: 0x10038074)
  • GetFileAttributesW (Address: 0x1003806c)
  • GetFileType (Address: 0x100380b0)
  • GetFinalPathNameByHandleW (Address: 0x100380b8)
  • GetFullPathNameW (Address: 0x10038244)
  • GetLastError (Address: 0x100380ac)
  • GetLocaleInfoW (Address: 0x100381b4)
  • GetModuleFileNameA (Address: 0x10038104)
  • GetModuleFileNameW (Address: 0x100380c4)
  • GetModuleHandleExW (Address: 0x100381a0)
  • GetModuleHandleW (Address: 0x1003817c)
  • GetOEMCP (Address: 0x100381d0)
  • GetProcAddress (Address: 0x10038128)
  • GetProcessHeap (Address: 0x10038014)
  • GetProcessId (Address: 0x100380bc)
  • GetStartupInfoW (Address: 0x10038178)
  • GetStdHandle (Address: 0x100381b8)
  • GetStringTypeW (Address: 0x100381dc)
  • GetSystemTimeAsFileTime (Address: 0x10038140)
  • GetThreadContext (Address: 0x1003822c)
  • GetUserDefaultUILanguage (Address: 0x10038250)
  • HeapAlloc (Address: 0x10038010)
  • HeapDestroy (Address: 0x10038000)
  • HeapFree (Address: 0x1003800c)
  • HeapReAlloc (Address: 0x10038008)
  • HeapSize (Address: 0x10038004)
  • InitializeCriticalSection (Address: 0x100380f8)
  • InitializeCriticalSectionAndSpinCount (Address: 0x10038190)
  • InitializeCriticalSectionEx (Address: 0x10038154)
  • InitializeProcThreadAttributeList (Address: 0x100381f8)
  • InitializeSListHead (Address: 0x10038170)
  • InterlockedFlushSList (Address: 0x10038184)
  • IsDebuggerPresent (Address: 0x10038174)
  • IsProcessorFeaturePresent (Address: 0x1003816c)
  • IsValidCodePage (Address: 0x100381c8)
  • IsWow64Process (Address: 0x1003823c)
  • LCMapStringW (Address: 0x100381b0)
  • LeaveCriticalSection (Address: 0x10038020)
  • LoadLibraryExW (Address: 0x1003819c)
  • LoadLibraryW (Address: 0x100380c0)
  • LoadResource (Address: 0x100380d4)
  • LocalFree (Address: 0x10038248)
  • LockResource (Address: 0x100380d0)
  • MoveFileA (Address: 0x10038048)
  • MoveFileExA (Address: 0x10038040)
  • MoveFileExW (Address: 0x10038044)
  • MoveFileW (Address: 0x1003804c)
  • MultiByteToWideChar (Address: 0x10038120)
  • OpenProcess (Address: 0x100381fc)
  • OutputDebugStringA (Address: 0x100381f4)
  • OutputDebugStringW (Address: 0x100381ec)
  • QueryPerformanceCounter (Address: 0x100380ec)
  • QueryPerformanceFrequency (Address: 0x100380f0)
  • RaiseException (Address: 0x10038188)
  • ReadConsoleW (Address: 0x1003815c)
  • ReadFile (Address: 0x10038148)
  • ReadProcessMemory (Address: 0x10038210)
  • RemoveDirectoryA (Address: 0x10038080)
  • RemoveDirectoryW (Address: 0x1003807c)
  • ReplaceFileW (Address: 0x10038054)
  • ResetEvent (Address: 0x10038138)
  • ResumeThread (Address: 0x100380a8)
  • RtlUnwind (Address: 0x10038180)
  • SetDllDirectoryW (Address: 0x10038100)
  • SetEndOfFile (Address: 0x10038258)
  • SetEnvironmentVariableW (Address: 0x100380a0)
  • SetEvent (Address: 0x1003813c)
  • SetFileInformationByHandle (Address: 0x10038050)
  • SetFilePointer (Address: 0x1003814c)
  • SetFilePointerEx (Address: 0x100381e4)
  • SetLastError (Address: 0x100380b4)
  • SetStdHandle (Address: 0x100381e0)
  • SetThreadContext (Address: 0x10038234)
  • SetUnhandledExceptionFilter (Address: 0x10038164)
  • SizeofResource (Address: 0x100380cc)
  • SuspendThread (Address: 0x10038228)
  • TerminateProcess (Address: 0x10038094)
  • TlsAlloc (Address: 0x100380f4)
  • TlsFree (Address: 0x10038194)
  • TlsGetValue (Address: 0x100380e0)
  • TlsSetValue (Address: 0x100380e4)
  • UnhandledExceptionFilter (Address: 0x10038160)
  • UpdateProcThreadAttribute (Address: 0x10038200)
  • VirtualAlloc (Address: 0x10038224)
  • VirtualAllocEx (Address: 0x1003820c)
  • VirtualFree (Address: 0x10038220)
  • VirtualProtect (Address: 0x1003821c)
  • VirtualProtectEx (Address: 0x10038208)
  • VirtualQuery (Address: 0x10038238)
  • VirtualQueryEx (Address: 0x10038214)
  • WaitForSingleObject (Address: 0x10038134)
  • WideCharToMultiByte (Address: 0x10038124)
  • WriteConsoleW (Address: 0x100381e8)
  • WriteFile (Address: 0x10038144)
  • WriteProcessMemory (Address: 0x100381f0)