ServerBrowser.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 32aa55403b7f5aa3e816ae05b1ea7624

File Size: 1.1 MB

Uploaded At: Dec. 3, 2025, 2:33 a.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • CreateInterface (Ordinal: 1, Address: 0x9230)
  • JoiningSecureServerCall (Ordinal: 2, Address: 0x3bf0)

Imported DLLs & Functions

ADVAPI32.dll
  • AccessCheck (Address: 0x100d5004)
  • AddAccessAllowedAce (Address: 0x100d5018)
  • AllocateAndInitializeSid (Address: 0x100d5030)
  • FreeSid (Address: 0x100d5000)
  • GetLengthSid (Address: 0x100d5038)
  • ImpersonateSelf (Address: 0x100d5024)
  • InitializeAcl (Address: 0x100d5020)
  • InitializeSecurityDescriptor (Address: 0x100d5034)
  • IsValidSecurityDescriptor (Address: 0x100d5008)
  • OpenProcessToken (Address: 0x100d502c)
  • OpenThreadToken (Address: 0x100d5028)
  • RevertToSelf (Address: 0x100d501c)
  • SetSecurityDescriptorDacl (Address: 0x100d5014)
  • SetSecurityDescriptorGroup (Address: 0x100d5010)
  • SetSecurityDescriptorOwner (Address: 0x100d500c)
KERNEL32.dll
  • CloseHandle (Address: 0x100d5060)
  • CompareStringA (Address: 0x100d5210)
  • CompareStringW (Address: 0x100d5214)
  • CopyFileA (Address: 0x100d50e4)
  • CopyFileExA (Address: 0x100d5108)
  • CreateDirectoryA (Address: 0x100d50e0)
  • CreateEventA (Address: 0x100d5054)
  • CreateFileA (Address: 0x100d50b0)
  • CreateFileMappingA (Address: 0x100d5228)
  • CreateProcessA (Address: 0x100d50b4)
  • CreateThread (Address: 0x100d5078)
  • DeleteCriticalSection (Address: 0x100d505c)
  • DeleteFileA (Address: 0x100d511c)
  • EnterCriticalSection (Address: 0x100d5084)
  • EnumSystemLocalesA (Address: 0x100d51dc)
  • ExitProcess (Address: 0x100d5154)
  • ExitThread (Address: 0x100d507c)
  • FatalAppExitA (Address: 0x100d5178)
  • FileTimeToLocalFileTime (Address: 0x100d5148)
  • FileTimeToSystemTime (Address: 0x100d5144)
  • FindClose (Address: 0x100d50ec)
  • FindFirstFileA (Address: 0x100d50f4)
  • FindNextFileA (Address: 0x100d50f0)
  • FlushFileBuffers (Address: 0x100d520c)
  • FormatMessageA (Address: 0x100d508c)
  • FreeEnvironmentStringsA (Address: 0x100d51b8)
  • FreeEnvironmentStringsW (Address: 0x100d51bc)
  • FreeLibrary (Address: 0x100d504c)
  • GetACP (Address: 0x100d51f4)
  • GetCommandLineA (Address: 0x100d514c)
  • GetCPInfo (Address: 0x100d51cc)
  • GetCurrentDirectoryA (Address: 0x100d5100)
  • GetCurrentProcess (Address: 0x100d50ac)
  • GetCurrentProcessId (Address: 0x100d50bc)
  • GetCurrentThread (Address: 0x100d50d4)
  • GetCurrentThreadId (Address: 0x100d50b8)
  • GetDiskFreeSpaceExA (Address: 0x100d5110)
  • GetDriveTypeA (Address: 0x100d5174)
  • GetEnvironmentStrings (Address: 0x100d51c0)
  • GetEnvironmentStringsW (Address: 0x100d51c4)
  • GetEnvironmentVariableA (Address: 0x100d518c)
  • GetFileAttributesA (Address: 0x100d5118)
  • GetFileAttributesExA (Address: 0x100d5104)
  • GetFileInformationByHandle (Address: 0x100d5238)
  • GetFileSize (Address: 0x100d5120)
  • GetFileType (Address: 0x100d51b0)
  • GetFullPathNameA (Address: 0x100d5170)
  • GetLastError (Address: 0x100d5090)
  • GetLocaleInfoA (Address: 0x100d51d8)
  • GetLocaleInfoW (Address: 0x100d5220)
  • GetLocalTime (Address: 0x100d5140)
  • GetLongPathNameA (Address: 0x100d50f8)
  • GetModuleFileNameA (Address: 0x100d5094)
  • GetModuleHandleA (Address: 0x100d5050)
  • GetOEMCP (Address: 0x100d51f8)
  • GetProcAddress (Address: 0x100d5044)
  • GetStartupInfoA (Address: 0x100d51b4)
  • GetStdHandle (Address: 0x100d51ac)
  • GetStringTypeA (Address: 0x100d5200)
  • GetStringTypeW (Address: 0x100d5204)
  • GetSystemInfo (Address: 0x100d50dc)
  • GetSystemTime (Address: 0x100d513c)
  • GetSystemTimeAsFileTime (Address: 0x100d516c)
  • GetTempPathA (Address: 0x100d50c0)
  • GetTimeZoneInformation (Address: 0x100d5138)
  • GetUserDefaultLCID (Address: 0x100d51e0)
  • GetVersion (Address: 0x100d5150)
  • GetVersionExA (Address: 0x100d50d8)
  • HeapAlloc (Address: 0x100d512c)
  • HeapCreate (Address: 0x100d5194)
  • HeapDestroy (Address: 0x100d5190)
  • HeapFree (Address: 0x100d5134)
  • HeapReAlloc (Address: 0x100d5130)
  • HeapSize (Address: 0x100d51a4)
  • InitializeCriticalSection (Address: 0x100d5058)
  • InterlockedDecrement (Address: 0x100d5098)
  • InterlockedExchange (Address: 0x100d5040)
  • InterlockedIncrement (Address: 0x100d50c8)
  • IsBadCodePtr (Address: 0x100d50a0)
  • IsBadReadPtr (Address: 0x100d5124)
  • IsBadWritePtr (Address: 0x100d51a0)
  • IsValidCodePage (Address: 0x100d51d4)
  • IsValidLocale (Address: 0x100d51d0)
  • LCMapStringA (Address: 0x100d51e4)
  • LCMapStringW (Address: 0x100d51e8)
  • LeaveCriticalSection (Address: 0x100d5088)
  • LoadLibraryA (Address: 0x100d5048)
  • LocalAlloc (Address: 0x100d50d0)
  • LocalFree (Address: 0x100d50cc)
  • lstrcmpiA (Address: 0x100d5230)
  • MapViewOfFile (Address: 0x100d5224)
  • MoveFileExA (Address: 0x100d510c)
  • MultiByteToWideChar (Address: 0x100d5128)
  • OpenProcess (Address: 0x100d50c4)
  • OutputDebugStringA (Address: 0x100d50a4)
  • PeekNamedPipe (Address: 0x100d5160)
  • QueryPerformanceCounter (Address: 0x100d5070)
  • QueryPerformanceFrequency (Address: 0x100d5074)
  • RaiseException (Address: 0x100d50a8)
  • ReadFile (Address: 0x100d51f0)
  • RemoveDirectoryA (Address: 0x100d50e8)
  • ResumeThread (Address: 0x100d5240)
  • RtlUnwind (Address: 0x100d523c)
  • SetConsoleCtrlHandler (Address: 0x100d5168)
  • SetCurrentDirectoryA (Address: 0x100d50fc)
  • SetEndOfFile (Address: 0x100d521c)
  • SetEnvironmentVariableA (Address: 0x100d5218)
  • SetEnvironmentVariableW (Address: 0x100d5234)
  • SetEvent (Address: 0x100d506c)
  • SetFileAttributesA (Address: 0x100d5114)
  • SetFilePointer (Address: 0x100d51fc)
  • SetHandleCount (Address: 0x100d51a8)
  • SetLastError (Address: 0x100d5184)
  • SetStdHandle (Address: 0x100d5208)
  • SetUnhandledExceptionFilter (Address: 0x100d509c)
  • Sleep (Address: 0x100d5068)
  • TerminateProcess (Address: 0x100d5158)
  • TerminateThread (Address: 0x100d5064)
  • TlsAlloc (Address: 0x100d517c)
  • TlsFree (Address: 0x100d5180)
  • TlsGetValue (Address: 0x100d5188)
  • TlsSetValue (Address: 0x100d5164)
  • UnhandledExceptionFilter (Address: 0x100d51ec)
  • UnmapViewOfFile (Address: 0x100d522c)
  • VirtualAlloc (Address: 0x100d519c)
  • VirtualFree (Address: 0x100d5198)
  • WaitForSingleObject (Address: 0x100d5080)
  • WideCharToMultiByte (Address: 0x100d515c)
  • WriteFile (Address: 0x100d51c8)
USER32.dll
  • FindWindowA (Address: 0x100d524c)
  • MessageBoxA (Address: 0x100d5258)
  • PostMessageA (Address: 0x100d5248)
  • SetForegroundWindow (Address: 0x100d5250)
  • ShowWindow (Address: 0x100d5254)
WS2_32.dll
  • WSARecv (Address: 0x100d5260)
  • WSASend (Address: 0x100d5264)
WSOCK32.dll
  • __WSAFDIsSet (Address: 0x100d52a0)
  • bind (Address: 0x100d5294)
  • closesocket (Address: 0x100d5298)
  • connect (Address: 0x100d5274)
  • gethostbyname (Address: 0x100d52b4)
  • gethostname (Address: 0x100d52a4)
  • getsockname (Address: 0x100d52a8)
  • htonl (Address: 0x100d526c)
  • htons (Address: 0x100d52ac)
  • inet_addr (Address: 0x100d52b0)
  • ioctlsocket (Address: 0x100d528c)
  • ntohs (Address: 0x100d52b8)
  • recvfrom (Address: 0x100d527c)
  • select (Address: 0x100d529c)
  • sendto (Address: 0x100d5280)
  • setsockopt (Address: 0x100d5290)
  • shutdown (Address: 0x100d5284)
  • socket (Address: 0x100d5288)
  • WSAGetLastError (Address: 0x100d5278)
  • WSASetLastError (Address: 0x100d5270)