ServerBrowser.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: 7246c2571a9d9cdbea0be8972d568cd7
File Size: 19.0 KB
Uploaded At: March 3, 2026, 12:56 p.m.
Views: 19
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
- CreateInterface (Ordinal: 1, Address: 0x453c)
- JoiningSecureServerCall (Ordinal: 2, Address: 0x45a4)
Imported DLLs & Functions
kernel32.dll
- DeleteCriticalSection (Address: 0x407078)
- DeleteCriticalSection (Address: 0x40712c)
- EnterCriticalSection (Address: 0x407080)
- EnterCriticalSection (Address: 0x407128)
- ExitProcess (Address: 0x4070b4)
- FindClose (Address: 0x407124)
- FindFirstFileA (Address: 0x407120)
- FreeLibrary (Address: 0x4070b0)
- GetCommandLineA (Address: 0x4070ac)
- GetCurrentThreadId (Address: 0x40711c)
- GetCurrentThreadId (Address: 0x40709c)
- GetLocaleInfoA (Address: 0x4070a8)
- GetModuleFileNameA (Address: 0x407118)
- GetModuleHandleA (Address: 0x407114)
- GetPrivateProfileStringA (Address: 0x407110)
- GetProcAddress (Address: 0x40710c)
- GetStartupInfoA (Address: 0x4070a4)
- GetStdHandle (Address: 0x4070c8)
- GetSystemTime (Address: 0x407108)
- GetThreadLocale (Address: 0x4070a0)
- GetVersion (Address: 0x407098)
- InitializeCriticalSection (Address: 0x407104)
- InitializeCriticalSection (Address: 0x407084)
- LeaveCriticalSection (Address: 0x407100)
- LeaveCriticalSection (Address: 0x40707c)
- LoadLibraryA (Address: 0x4070fc)
- LocalAlloc (Address: 0x4070ec)
- LocalAlloc (Address: 0x407094)
- LocalFree (Address: 0x4070e8)
- LocalFree (Address: 0x407090)
- RaiseException (Address: 0x4070c4)
- ReadProcessMemory (Address: 0x4070f8)
- RtlUnwind (Address: 0x4070c0)
- TlsAlloc (Address: 0x4070e4)
- TlsFree (Address: 0x4070e0)
- TlsGetValue (Address: 0x4070dc)
- TlsSetValue (Address: 0x4070d8)
- UnhandledExceptionFilter (Address: 0x4070bc)
- VirtualAlloc (Address: 0x40708c)
- VirtualFree (Address: 0x407088)
- WriteFile (Address: 0x4070b8)
- WriteProcessMemory (Address: 0x4070f4)
user32.dll
- CharUpperA (Address: 0x407134)
- MessageBoxA (Address: 0x4070d0)