version.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: dd02fcdca635d7bae5d65f08fc8ad354
File Size: 1.7 MB
Uploaded At: Feb. 18, 2026, 7:15 p.m.
Views: 7
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory
Exported Functions
- GetFileVersionInfoA (Ordinal: 1, Address: 0x47e0)
- GetFileVersionInfoByHandle (Ordinal: 2, Address: 0x47e6)
- GetFileVersionInfoExA (Ordinal: 3, Address: 0x47ec)
- GetFileVersionInfoExW (Ordinal: 4, Address: 0x47f2)
- GetFileVersionInfoSizeA (Ordinal: 5, Address: 0x47f8)
- GetFileVersionInfoSizeExA (Ordinal: 6, Address: 0x47fe)
- GetFileVersionInfoSizeExW (Ordinal: 7, Address: 0x4804)
- GetFileVersionInfoSizeW (Ordinal: 8, Address: 0x480a)
- GetFileVersionInfoW (Ordinal: 9, Address: 0x4810)
- VerFindFileA (Ordinal: 10, Address: 0x4816)
- VerFindFileW (Ordinal: 11, Address: 0x481c)
- VerInstallFileA (Ordinal: 12, Address: 0x4822)
- VerInstallFileW (Ordinal: 13, Address: 0x4828)
- VerLanguageNameA (Ordinal: 14, Address: 0x2942c)
- VerLanguageNameW (Ordinal: 15, Address: 0x29457)
- VerQueryValueA (Ordinal: 16, Address: 0x482e)
- VerQueryValueW (Ordinal: 17, Address: 0x4834)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x18001c030)
- CreateFileW (Address: 0x18001c0f0)
- CreateMutexW (Address: 0x18001c070)
- CreateToolhelp32Snapshot (Address: 0x18001c028)
- DeleteCriticalSection (Address: 0x18001c1f0)
- DisableThreadLibraryCalls (Address: 0x18001c090)
- EncodePointer (Address: 0x18001c1d8)
- EnterCriticalSection (Address: 0x18001c1e0)
- ExitProcess (Address: 0x18001c0d8)
- FindClose (Address: 0x18001c240)
- FindFirstFileExW (Address: 0x18001c248)
- FindNextFileW (Address: 0x18001c250)
- FlsAlloc (Address: 0x18001c2a8)
- FlsFree (Address: 0x18001c2c0)
- FlsGetValue (Address: 0x18001c2b0)
- FlsSetValue (Address: 0x18001c2b8)
- FlushFileBuffers (Address: 0x18001c2f8)
- FlushInstructionCache (Address: 0x18001c140)
- FreeEnvironmentStringsW (Address: 0x18001c2a0)
- FreeLibrary (Address: 0x18001c0e0)
- GetACP (Address: 0x18001c260)
- GetCommandLineA (Address: 0x18001c278)
- GetCommandLineW (Address: 0x18001c280)
- GetConsoleMode (Address: 0x18001c0f8)
- GetConsoleOutputCP (Address: 0x18001c100)
- GetCPInfo (Address: 0x18001c270)
- GetCurrentProcess (Address: 0x18001c068)
- GetCurrentProcessId (Address: 0x18001c040)
- GetCurrentThreadId (Address: 0x18001c010)
- GetEnvironmentStringsW (Address: 0x18001c298)
- GetFileType (Address: 0x18001c238)
- GetLastError (Address: 0x18001c088)
- GetModuleFileNameW (Address: 0x18001c228)
- GetModuleHandleExW (Address: 0x18001c220)
- GetModuleHandleW (Address: 0x18001c0a8)
- GetOEMCP (Address: 0x18001c268)
- GetProcAddress (Address: 0x18001c0d0)
- GetProcessHeap (Address: 0x18001c2d0)
- GetStartupInfoW (Address: 0x18001c190)
- GetStdHandle (Address: 0x18001c230)
- GetStringTypeW (Address: 0x18001c2d8)
- GetSystemDirectoryW (Address: 0x18001c0b8)
- GetSystemInfo (Address: 0x18001c158)
- GetSystemTimeAsFileTime (Address: 0x18001c1a0)
- GetThreadContext (Address: 0x18001c038)
- HeapAlloc (Address: 0x18001c130)
- HeapCreate (Address: 0x18001c110)
- HeapDestroy (Address: 0x18001c138)
- HeapFree (Address: 0x18001c118)
- HeapReAlloc (Address: 0x18001c128)
- HeapSize (Address: 0x18001c2f0)
- InitializeCriticalSectionAndSpinCount (Address: 0x18001c1f8)
- InitializeSListHead (Address: 0x18001c1a8)
- InterlockedFlushSList (Address: 0x18001c1c8)
- IsDebuggerPresent (Address: 0x18001c188)
- IsProcessorFeaturePresent (Address: 0x18001c180)
- IsValidCodePage (Address: 0x18001c258)
- K32GetModuleInformation (Address: 0x18001c098)
- LCMapStringW (Address: 0x18001c2c8)
- LeaveCriticalSection (Address: 0x18001c1e8)
- LoadLibraryExW (Address: 0x18001c0b0)
- LoadLibraryW (Address: 0x18001c0c8)
- lstrcatW (Address: 0x18001c0c0)
- MultiByteToWideChar (Address: 0x18001c288)
- OpenProcess (Address: 0x18001c080)
- OpenThread (Address: 0x18001c050)
- QueryPerformanceCounter (Address: 0x18001c198)
- RaiseException (Address: 0x18001c1c0)
- ReadProcessMemory (Address: 0x18001c0a0)
- ReleaseMutex (Address: 0x18001c078)
- ResumeThread (Address: 0x18001c020)
- RtlPcToFileHeader (Address: 0x18001c1b8)
- RtlUnwindEx (Address: 0x18001c1b0)
- SetFilePointerEx (Address: 0x18001c2e0)
- SetLastError (Address: 0x18001c1d0)
- SetStdHandle (Address: 0x18001c2e8)
- SetThreadContext (Address: 0x18001c048)
- SetUnhandledExceptionFilter (Address: 0x18001c170)
- Sleep (Address: 0x18001c120)
- SuspendThread (Address: 0x18001c018)
- TerminateProcess (Address: 0x18001c178)
- Thread32First (Address: 0x18001c008)
- Thread32Next (Address: 0x18001c000)
- TlsAlloc (Address: 0x18001c200)
- TlsFree (Address: 0x18001c218)
- TlsGetValue (Address: 0x18001c208)
- TlsSetValue (Address: 0x18001c210)
- UnhandledExceptionFilter (Address: 0x18001c168)
- VirtualAlloc (Address: 0x18001c150)
- VirtualFree (Address: 0x18001c148)
- VirtualProtect (Address: 0x18001c060)
- VirtualQuery (Address: 0x18001c160)
- WideCharToMultiByte (Address: 0x18001c290)
- WriteConsoleW (Address: 0x18001c0e8)
- WriteFile (Address: 0x18001c108)
- WriteProcessMemory (Address: 0x18001c058)
ntdll.dll
- RtlCaptureContext (Address: 0x18001c330)
- RtlLookupFunctionEntry (Address: 0x18001c320)
- RtlVirtualUnwind (Address: 0x18001c328)