FileTrackerA4.dll
Description: FileTracker
Authors: © Microsoft Corporation. All rights reserved.
Version: 17.0.36015.10
Architecture: Unknown (0xaa64)
Operating System: Windows
SHA256: 77ba8279feeaca3c2c10f1f5514ec9f1
File Size: 314.1 KB
Uploaded At: Dec. 2, 2025, 2:44 p.m.
Views: 5
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess, VirtualAllocEx
Exported Functions
- (Ordinal: 1, Address: 0x11b10)
- StartTrackingContext (Ordinal: 2, Address: 0xa8c0)
- StartTrackingContextWithRoot (Ordinal: 3, Address: 0xa9e0)
- EndTrackingContext (Ordinal: 4, Address: 0xab00)
- StopTrackingAndCleanup (Ordinal: 5, Address: 0xabb0)
- SuspendTracking (Ordinal: 6, Address: 0xac10)
- ResumeTracking (Ordinal: 7, Address: 0xac50)
- WriteAllTLogs (Ordinal: 8, Address: 0xacb0)
- WriteContextTLogs (Ordinal: 9, Address: 0xaf70)
- SetThreadCount (Ordinal: 10, Address: 0xb0f0)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x180037260)
- CompareFileTime (Address: 0x1800372a0)
- CopyFileA (Address: 0x180037060)
- CopyFileExA (Address: 0x180037070)
- CopyFileExW (Address: 0x180037078)
- CopyFileW (Address: 0x180037068)
- CreateDirectoryA (Address: 0x180037110)
- CreateDirectoryW (Address: 0x180037108)
- CreateEventW (Address: 0x180037258)
- CreateFile2 (Address: 0x180037058)
- CreateFileA (Address: 0x180037048)
- CreateFileW (Address: 0x180037050)
- CreateHardLinkA (Address: 0x1800370b0)
- CreateHardLinkW (Address: 0x1800370b8)
- CreateProcessA (Address: 0x1800370c0)
- CreateProcessW (Address: 0x1800370c8)
- CreateThread (Address: 0x1800370d0)
- DeleteCriticalSection (Address: 0x180037238)
- DeleteFileA (Address: 0x180037120)
- DeleteFileW (Address: 0x180037118)
- DeleteProcThreadAttributeList (Address: 0x180037430)
- DisableThreadLibraryCalls (Address: 0x180037138)
- EncodePointer (Address: 0x180037320)
- EnterCriticalSection (Address: 0x180037038)
- ExitProcess (Address: 0x180037130)
- FindClose (Address: 0x180037388)
- FindFirstFileExW (Address: 0x180037390)
- FindFirstFileW (Address: 0x1800374a8)
- FindNextFileW (Address: 0x180037398)
- FindResourceExW (Address: 0x1800371b8)
- FindResourceW (Address: 0x1800371b0)
- FlsAlloc (Address: 0x180037300)
- FlsFree (Address: 0x180037318)
- FlsGetValue (Address: 0x180037308)
- FlsSetValue (Address: 0x180037310)
- FlushFileBuffers (Address: 0x180037340)
- FlushInstructionCache (Address: 0x180037490)
- FormatMessageW (Address: 0x1800374c0)
- FreeEnvironmentStringsA (Address: 0x180037230)
- FreeEnvironmentStringsW (Address: 0x180037218)
- FreeLibrary (Address: 0x180037330)
- GetACP (Address: 0x1800373a8)
- GetCommandLineA (Address: 0x1800373c0)
- GetCommandLineW (Address: 0x1800371f8)
- GetConsoleMode (Address: 0x180037350)
- GetConsoleOutputCP (Address: 0x180037348)
- GetCPInfo (Address: 0x1800373b8)
- GetCurrentProcess (Address: 0x180037328)
- GetCurrentProcessId (Address: 0x180037148)
- GetCurrentThread (Address: 0x180037190)
- GetCurrentThreadId (Address: 0x1800371d0)
- GetEnvironmentStrings (Address: 0x180037228)
- GetEnvironmentStringsW (Address: 0x180037210)
- GetEnvironmentVariableA (Address: 0x180037220)
- GetEnvironmentVariableW (Address: 0x180037030)
- GetExitCodeProcess (Address: 0x180037460)
- GetFileAttributesA (Address: 0x1800370e0)
- GetFileAttributesExA (Address: 0x1800370f0)
- GetFileAttributesExW (Address: 0x1800370e8)
- GetFileAttributesW (Address: 0x1800370d8)
- GetFileSizeEx (Address: 0x1800373e8)
- GetFileType (Address: 0x180037160)
- GetFinalPathNameByHandleW (Address: 0x180037170)
- GetFullPathNameW (Address: 0x1800374b0)
- GetLastError (Address: 0x180037158)
- GetLocaleInfoW (Address: 0x180037378)
- GetModuleFileNameA (Address: 0x180037208)
- GetModuleFileNameW (Address: 0x180037188)
- GetModuleHandleExW (Address: 0x180037338)
- GetModuleHandleW (Address: 0x1800372c0)
- GetOEMCP (Address: 0x1800373b0)
- GetProcAddress (Address: 0x180037250)
- GetProcessHeap (Address: 0x180037028)
- GetProcessId (Address: 0x180037178)
- GetStartupInfoW (Address: 0x1800372b8)
- GetStdHandle (Address: 0x180037380)
- GetStringTypeW (Address: 0x1800373c8)
- GetSystemTimeAsFileTime (Address: 0x180037280)
- GetThreadContext (Address: 0x180037488)
- GetUserDefaultUILanguage (Address: 0x1800374c8)
- HeapAlloc (Address: 0x180037020)
- HeapDestroy (Address: 0x180037000)
- HeapFree (Address: 0x180037018)
- HeapReAlloc (Address: 0x180037010)
- HeapSize (Address: 0x180037008)
- InitializeCriticalSection (Address: 0x1800371f0)
- InitializeCriticalSectionAndSpinCount (Address: 0x180037358)
- InitializeCriticalSectionEx (Address: 0x1800372a8)
- InitializeProcThreadAttributeList (Address: 0x180037418)
- InitializeSListHead (Address: 0x1800372b0)
- InterlockedFlushSList (Address: 0x1800372e8)
- IsDebuggerPresent (Address: 0x1800373f8)
- IsValidCodePage (Address: 0x1800373a0)
- IsWow64Process (Address: 0x180037450)
- LCMapStringW (Address: 0x180037370)
- LeaveCriticalSection (Address: 0x180037040)
- LoadLibraryExW (Address: 0x180037368)
- LoadLibraryW (Address: 0x180037180)
- LoadResource (Address: 0x1800371a8)
- LocalFree (Address: 0x1800374b8)
- LockResource (Address: 0x1800371a0)
- MoveFileA (Address: 0x180037090)
- MoveFileExA (Address: 0x180037080)
- MoveFileExW (Address: 0x180037088)
- MoveFileW (Address: 0x180037098)
- MultiByteToWideChar (Address: 0x180037240)
- OpenProcess (Address: 0x180037420)
- OutputDebugStringA (Address: 0x180037410)
- OutputDebugStringW (Address: 0x180037400)
- QueryPerformanceCounter (Address: 0x1800371d8)
- QueryPerformanceFrequency (Address: 0x1800371e0)
- RaiseException (Address: 0x1800372f8)
- ReadConsoleW (Address: 0x1800373e0)
- ReadFile (Address: 0x180037290)
- ReadProcessMemory (Address: 0x180037448)
- RemoveDirectoryA (Address: 0x180037100)
- RemoveDirectoryW (Address: 0x1800370f8)
- ReplaceFileW (Address: 0x1800370a8)
- ResetEvent (Address: 0x180037270)
- ResumeThread (Address: 0x180037150)
- RtlLookupFunctionEntry (Address: 0x1800372c8)
- RtlPcToFileHeader (Address: 0x1800372f0)
- RtlUnwindEx (Address: 0x1800372d0)
- SetDllDirectoryW (Address: 0x180037200)
- SetEndOfFile (Address: 0x1800374d0)
- SetEnvironmentVariableW (Address: 0x180037140)
- SetEvent (Address: 0x180037278)
- SetFileInformationByHandle (Address: 0x1800370a0)
- SetFilePointer (Address: 0x180037298)
- SetFilePointerEx (Address: 0x1800373d8)
- SetLastError (Address: 0x180037168)
- SetStdHandle (Address: 0x1800373d0)
- SetThreadContext (Address: 0x180037498)
- SizeofResource (Address: 0x180037198)
- SuspendThread (Address: 0x180037480)
- TerminateProcess (Address: 0x180037128)
- TlsAlloc (Address: 0x1800371e8)
- TlsFree (Address: 0x180037360)
- TlsGetValue (Address: 0x1800371c0)
- TlsSetValue (Address: 0x1800371c8)
- UpdateProcThreadAttribute (Address: 0x180037428)
- VerifyVersionInfoW (Address: 0x1800372e0)
- VerSetConditionMask (Address: 0x1800372d8)
- VirtualAlloc (Address: 0x180037478)
- VirtualAllocEx (Address: 0x180037440)
- VirtualFree (Address: 0x180037470)
- VirtualProtect (Address: 0x180037468)
- VirtualProtectEx (Address: 0x180037438)
- VirtualQuery (Address: 0x1800374a0)
- VirtualQueryEx (Address: 0x180037458)
- WaitForSingleObject (Address: 0x180037268)
- WideCharToMultiByte (Address: 0x180037248)
- WriteConsoleW (Address: 0x1800373f0)
- WriteFile (Address: 0x180037288)
- WriteProcessMemory (Address: 0x180037408)