version.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: c3e8e9e537a7f81797020f4b0ee4bb4e

File Size: 2.1 MB

Uploaded At: March 2, 2026, 2:48 p.m.

Views: 18

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory

Exported Functions

  • GetFileVersionInfoA (Ordinal: 1, Address: 0xba50)
  • GetFileVersionInfoByHandle (Ordinal: 2, Address: 0xba56)
  • GetFileVersionInfoExA (Ordinal: 3, Address: 0xba5c)
  • GetFileVersionInfoExW (Ordinal: 4, Address: 0xba62)
  • GetFileVersionInfoSizeA (Ordinal: 5, Address: 0xba68)
  • GetFileVersionInfoSizeExA (Ordinal: 6, Address: 0xba6e)
  • GetFileVersionInfoSizeExW (Ordinal: 7, Address: 0xba74)
  • GetFileVersionInfoSizeW (Ordinal: 8, Address: 0xba7a)
  • GetFileVersionInfoW (Ordinal: 9, Address: 0xba80)
  • VerFindFileA (Ordinal: 10, Address: 0xba86)
  • VerFindFileW (Ordinal: 11, Address: 0xba8c)
  • VerInstallFileA (Ordinal: 12, Address: 0xba92)
  • VerInstallFileW (Ordinal: 13, Address: 0xba98)
  • VerLanguageNameA (Ordinal: 14, Address: 0x45f1c)
  • VerLanguageNameW (Ordinal: 15, Address: 0x45f47)
  • VerQueryValueA (Ordinal: 16, Address: 0xba9e)
  • VerQueryValueW (Ordinal: 17, Address: 0xbaa4)

Imported DLLs & Functions

ADVAPI32.dll
  • CryptAcquireContextA (Address: 0x180033028)
  • CryptCreateHash (Address: 0x180033000)
  • CryptDestroyHash (Address: 0x180033010)
  • CryptGetHashParam (Address: 0x180033018)
  • CryptHashData (Address: 0x180033008)
  • CryptReleaseContext (Address: 0x180033020)
KERNEL32.dll
  • CloseHandle (Address: 0x180033038)
  • CreateFileW (Address: 0x180033138)
  • CreateMutexW (Address: 0x180033078)
  • CreateToolhelp32Snapshot (Address: 0x180033090)
  • DecodePointer (Address: 0x1800331e8)
  • DeleteCriticalSection (Address: 0x1800331d8)
  • DisableThreadLibraryCalls (Address: 0x180033098)
  • EncodePointer (Address: 0x1800331e0)
  • EnterCriticalSection (Address: 0x1800331c0)
  • EnumSystemLocalesW (Address: 0x180033338)
  • ExitProcess (Address: 0x1800330a8)
  • FindClose (Address: 0x180033350)
  • FindFirstFileExW (Address: 0x180033358)
  • FindNextFileW (Address: 0x180033360)
  • FlsAlloc (Address: 0x1800332f8)
  • FlsFree (Address: 0x180033310)
  • FlsGetValue (Address: 0x180033300)
  • FlsSetValue (Address: 0x180033308)
  • FlushFileBuffers (Address: 0x1800332d8)
  • FlushInstructionCache (Address: 0x180033190)
  • FreeEnvironmentStringsW (Address: 0x180033150)
  • FreeLibrary (Address: 0x1800330e8)
  • GetACP (Address: 0x180033370)
  • GetCommandLineA (Address: 0x180033380)
  • GetCommandLineW (Address: 0x180033388)
  • GetConsoleMode (Address: 0x1800332f0)
  • GetConsoleOutputCP (Address: 0x1800332e8)
  • GetCPInfo (Address: 0x180033208)
  • GetCurrentProcess (Address: 0x180033070)
  • GetCurrentProcessId (Address: 0x180033048)
  • GetCurrentThreadId (Address: 0x180033110)
  • GetEnvironmentStringsW (Address: 0x180033158)
  • GetFileSizeEx (Address: 0x1800332b8)
  • GetFileType (Address: 0x1800332d0)
  • GetLastError (Address: 0x180033120)
  • GetLocaleInfoW (Address: 0x180033320)
  • GetModuleFileNameW (Address: 0x1800332b0)
  • GetModuleHandleExW (Address: 0x1800332a8)
  • GetModuleHandleW (Address: 0x1800330b8)
  • GetOEMCP (Address: 0x180033378)
  • GetProcAddress (Address: 0x1800330e0)
  • GetProcessHeap (Address: 0x180033148)
  • GetStartupInfoW (Address: 0x180033238)
  • GetStdHandle (Address: 0x1800332c8)
  • GetStringTypeW (Address: 0x180033200)
  • GetSystemDirectoryW (Address: 0x1800330c8)
  • GetSystemInfo (Address: 0x1800331a8)
  • GetSystemTimeAsFileTime (Address: 0x180033248)
  • GetThreadContext (Address: 0x180033040)
  • GetUserDefaultLCID (Address: 0x180033330)
  • HeapAlloc (Address: 0x180033180)
  • HeapCreate (Address: 0x180033160)
  • HeapDestroy (Address: 0x180033188)
  • HeapFree (Address: 0x180033168)
  • HeapReAlloc (Address: 0x180033178)
  • HeapSize (Address: 0x180033130)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180033280)
  • InitializeCriticalSectionEx (Address: 0x1800331d0)
  • InitializeSListHead (Address: 0x180033250)
  • InterlockedFlushSList (Address: 0x180033270)
  • IsDebuggerPresent (Address: 0x180033230)
  • IsProcessorFeaturePresent (Address: 0x180033228)
  • IsValidCodePage (Address: 0x180033368)
  • IsValidLocale (Address: 0x180033328)
  • K32GetModuleInformation (Address: 0x1800330a0)
  • LCMapStringEx (Address: 0x1800331f8)
  • LCMapStringW (Address: 0x180033318)
  • LeaveCriticalSection (Address: 0x1800331c8)
  • LoadLibraryExW (Address: 0x1800330c0)
  • LoadLibraryW (Address: 0x1800330d8)
  • lstrcatW (Address: 0x1800330d0)
  • MultiByteToWideChar (Address: 0x1800331f0)
  • OpenProcess (Address: 0x180033088)
  • OpenThread (Address: 0x180033058)
  • QueryPerformanceCounter (Address: 0x180033240)
  • RaiseException (Address: 0x180033268)
  • ReadConsoleW (Address: 0x180033348)
  • ReadFile (Address: 0x180033340)
  • ReadProcessMemory (Address: 0x1800330b0)
  • ReleaseMutex (Address: 0x180033080)
  • ResumeThread (Address: 0x180033100)
  • RtlPcToFileHeader (Address: 0x180033260)
  • RtlUnwind (Address: 0x180033390)
  • RtlUnwindEx (Address: 0x180033258)
  • SetEndOfFile (Address: 0x1800330f0)
  • SetFilePointerEx (Address: 0x1800332c0)
  • SetLastError (Address: 0x180033278)
  • SetStdHandle (Address: 0x180033140)
  • SetThreadContext (Address: 0x180033050)
  • SetUnhandledExceptionFilter (Address: 0x180033218)
  • Sleep (Address: 0x180033170)
  • SuspendThread (Address: 0x180033108)
  • TerminateProcess (Address: 0x180033220)
  • Thread32First (Address: 0x180033118)
  • Thread32Next (Address: 0x180033128)
  • TlsAlloc (Address: 0x180033288)
  • TlsFree (Address: 0x1800332a0)
  • TlsGetValue (Address: 0x180033290)
  • TlsSetValue (Address: 0x180033298)
  • UnhandledExceptionFilter (Address: 0x180033210)
  • VirtualAlloc (Address: 0x1800331a0)
  • VirtualFree (Address: 0x180033198)
  • VirtualProtect (Address: 0x180033068)
  • VirtualQuery (Address: 0x1800331b0)
  • WideCharToMultiByte (Address: 0x1800331b8)
  • WriteConsoleW (Address: 0x1800330f8)
  • WriteFile (Address: 0x1800332e0)
  • WriteProcessMemory (Address: 0x180033060)
ntdll.dll
  • RtlCaptureContext (Address: 0x1800333d8)
  • RtlLookupFunctionEntry (Address: 0x1800333c8)
  • RtlVirtualUnwind (Address: 0x1800333d0)
USER32.dll
  • MessageBoxW (Address: 0x1800333a0)