version.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: dd02fcdca635d7bae5d65f08fc8ad354

File Size: 1.7 MB

Uploaded At: Feb. 18, 2026, 7:15 p.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory

Exported Functions

  • GetFileVersionInfoA (Ordinal: 1, Address: 0x47e0)
  • GetFileVersionInfoByHandle (Ordinal: 2, Address: 0x47e6)
  • GetFileVersionInfoExA (Ordinal: 3, Address: 0x47ec)
  • GetFileVersionInfoExW (Ordinal: 4, Address: 0x47f2)
  • GetFileVersionInfoSizeA (Ordinal: 5, Address: 0x47f8)
  • GetFileVersionInfoSizeExA (Ordinal: 6, Address: 0x47fe)
  • GetFileVersionInfoSizeExW (Ordinal: 7, Address: 0x4804)
  • GetFileVersionInfoSizeW (Ordinal: 8, Address: 0x480a)
  • GetFileVersionInfoW (Ordinal: 9, Address: 0x4810)
  • VerFindFileA (Ordinal: 10, Address: 0x4816)
  • VerFindFileW (Ordinal: 11, Address: 0x481c)
  • VerInstallFileA (Ordinal: 12, Address: 0x4822)
  • VerInstallFileW (Ordinal: 13, Address: 0x4828)
  • VerLanguageNameA (Ordinal: 14, Address: 0x2942c)
  • VerLanguageNameW (Ordinal: 15, Address: 0x29457)
  • VerQueryValueA (Ordinal: 16, Address: 0x482e)
  • VerQueryValueW (Ordinal: 17, Address: 0x4834)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x18001c030)
  • CreateFileW (Address: 0x18001c0f0)
  • CreateMutexW (Address: 0x18001c070)
  • CreateToolhelp32Snapshot (Address: 0x18001c028)
  • DeleteCriticalSection (Address: 0x18001c1f0)
  • DisableThreadLibraryCalls (Address: 0x18001c090)
  • EncodePointer (Address: 0x18001c1d8)
  • EnterCriticalSection (Address: 0x18001c1e0)
  • ExitProcess (Address: 0x18001c0d8)
  • FindClose (Address: 0x18001c240)
  • FindFirstFileExW (Address: 0x18001c248)
  • FindNextFileW (Address: 0x18001c250)
  • FlsAlloc (Address: 0x18001c2a8)
  • FlsFree (Address: 0x18001c2c0)
  • FlsGetValue (Address: 0x18001c2b0)
  • FlsSetValue (Address: 0x18001c2b8)
  • FlushFileBuffers (Address: 0x18001c2f8)
  • FlushInstructionCache (Address: 0x18001c140)
  • FreeEnvironmentStringsW (Address: 0x18001c2a0)
  • FreeLibrary (Address: 0x18001c0e0)
  • GetACP (Address: 0x18001c260)
  • GetCommandLineA (Address: 0x18001c278)
  • GetCommandLineW (Address: 0x18001c280)
  • GetConsoleMode (Address: 0x18001c0f8)
  • GetConsoleOutputCP (Address: 0x18001c100)
  • GetCPInfo (Address: 0x18001c270)
  • GetCurrentProcess (Address: 0x18001c068)
  • GetCurrentProcessId (Address: 0x18001c040)
  • GetCurrentThreadId (Address: 0x18001c010)
  • GetEnvironmentStringsW (Address: 0x18001c298)
  • GetFileType (Address: 0x18001c238)
  • GetLastError (Address: 0x18001c088)
  • GetModuleFileNameW (Address: 0x18001c228)
  • GetModuleHandleExW (Address: 0x18001c220)
  • GetModuleHandleW (Address: 0x18001c0a8)
  • GetOEMCP (Address: 0x18001c268)
  • GetProcAddress (Address: 0x18001c0d0)
  • GetProcessHeap (Address: 0x18001c2d0)
  • GetStartupInfoW (Address: 0x18001c190)
  • GetStdHandle (Address: 0x18001c230)
  • GetStringTypeW (Address: 0x18001c2d8)
  • GetSystemDirectoryW (Address: 0x18001c0b8)
  • GetSystemInfo (Address: 0x18001c158)
  • GetSystemTimeAsFileTime (Address: 0x18001c1a0)
  • GetThreadContext (Address: 0x18001c038)
  • HeapAlloc (Address: 0x18001c130)
  • HeapCreate (Address: 0x18001c110)
  • HeapDestroy (Address: 0x18001c138)
  • HeapFree (Address: 0x18001c118)
  • HeapReAlloc (Address: 0x18001c128)
  • HeapSize (Address: 0x18001c2f0)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18001c1f8)
  • InitializeSListHead (Address: 0x18001c1a8)
  • InterlockedFlushSList (Address: 0x18001c1c8)
  • IsDebuggerPresent (Address: 0x18001c188)
  • IsProcessorFeaturePresent (Address: 0x18001c180)
  • IsValidCodePage (Address: 0x18001c258)
  • K32GetModuleInformation (Address: 0x18001c098)
  • LCMapStringW (Address: 0x18001c2c8)
  • LeaveCriticalSection (Address: 0x18001c1e8)
  • LoadLibraryExW (Address: 0x18001c0b0)
  • LoadLibraryW (Address: 0x18001c0c8)
  • lstrcatW (Address: 0x18001c0c0)
  • MultiByteToWideChar (Address: 0x18001c288)
  • OpenProcess (Address: 0x18001c080)
  • OpenThread (Address: 0x18001c050)
  • QueryPerformanceCounter (Address: 0x18001c198)
  • RaiseException (Address: 0x18001c1c0)
  • ReadProcessMemory (Address: 0x18001c0a0)
  • ReleaseMutex (Address: 0x18001c078)
  • ResumeThread (Address: 0x18001c020)
  • RtlPcToFileHeader (Address: 0x18001c1b8)
  • RtlUnwindEx (Address: 0x18001c1b0)
  • SetFilePointerEx (Address: 0x18001c2e0)
  • SetLastError (Address: 0x18001c1d0)
  • SetStdHandle (Address: 0x18001c2e8)
  • SetThreadContext (Address: 0x18001c048)
  • SetUnhandledExceptionFilter (Address: 0x18001c170)
  • Sleep (Address: 0x18001c120)
  • SuspendThread (Address: 0x18001c018)
  • TerminateProcess (Address: 0x18001c178)
  • Thread32First (Address: 0x18001c008)
  • Thread32Next (Address: 0x18001c000)
  • TlsAlloc (Address: 0x18001c200)
  • TlsFree (Address: 0x18001c218)
  • TlsGetValue (Address: 0x18001c208)
  • TlsSetValue (Address: 0x18001c210)
  • UnhandledExceptionFilter (Address: 0x18001c168)
  • VirtualAlloc (Address: 0x18001c150)
  • VirtualFree (Address: 0x18001c148)
  • VirtualProtect (Address: 0x18001c060)
  • VirtualQuery (Address: 0x18001c160)
  • WideCharToMultiByte (Address: 0x18001c290)
  • WriteConsoleW (Address: 0x18001c0e8)
  • WriteFile (Address: 0x18001c108)
  • WriteProcessMemory (Address: 0x18001c058)
ntdll.dll
  • RtlCaptureContext (Address: 0x18001c330)
  • RtlLookupFunctionEntry (Address: 0x18001c320)
  • RtlVirtualUnwind (Address: 0x18001c328)