ServerBrowser.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 7246c2571a9d9cdbea0be8972d568cd7

File Size: 19.0 KB

Uploaded At: March 3, 2026, 12:56 p.m.

Views: 19

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • CreateInterface (Ordinal: 1, Address: 0x453c)
  • JoiningSecureServerCall (Ordinal: 2, Address: 0x45a4)

Imported DLLs & Functions

kernel32.dll
  • DeleteCriticalSection (Address: 0x407078)
  • DeleteCriticalSection (Address: 0x40712c)
  • EnterCriticalSection (Address: 0x407080)
  • EnterCriticalSection (Address: 0x407128)
  • ExitProcess (Address: 0x4070b4)
  • FindClose (Address: 0x407124)
  • FindFirstFileA (Address: 0x407120)
  • FreeLibrary (Address: 0x4070b0)
  • GetCommandLineA (Address: 0x4070ac)
  • GetCurrentThreadId (Address: 0x40711c)
  • GetCurrentThreadId (Address: 0x40709c)
  • GetLocaleInfoA (Address: 0x4070a8)
  • GetModuleFileNameA (Address: 0x407118)
  • GetModuleHandleA (Address: 0x407114)
  • GetPrivateProfileStringA (Address: 0x407110)
  • GetProcAddress (Address: 0x40710c)
  • GetStartupInfoA (Address: 0x4070a4)
  • GetStdHandle (Address: 0x4070c8)
  • GetSystemTime (Address: 0x407108)
  • GetThreadLocale (Address: 0x4070a0)
  • GetVersion (Address: 0x407098)
  • InitializeCriticalSection (Address: 0x407104)
  • InitializeCriticalSection (Address: 0x407084)
  • LeaveCriticalSection (Address: 0x407100)
  • LeaveCriticalSection (Address: 0x40707c)
  • LoadLibraryA (Address: 0x4070fc)
  • LocalAlloc (Address: 0x4070ec)
  • LocalAlloc (Address: 0x407094)
  • LocalFree (Address: 0x4070e8)
  • LocalFree (Address: 0x407090)
  • RaiseException (Address: 0x4070c4)
  • ReadProcessMemory (Address: 0x4070f8)
  • RtlUnwind (Address: 0x4070c0)
  • TlsAlloc (Address: 0x4070e4)
  • TlsFree (Address: 0x4070e0)
  • TlsGetValue (Address: 0x4070dc)
  • TlsSetValue (Address: 0x4070d8)
  • UnhandledExceptionFilter (Address: 0x4070bc)
  • VirtualAlloc (Address: 0x40708c)
  • VirtualFree (Address: 0x407088)
  • WriteFile (Address: 0x4070b8)
  • WriteProcessMemory (Address: 0x4070f4)
user32.dll
  • CharUpperA (Address: 0x407134)
  • MessageBoxA (Address: 0x4070d0)