1.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: c3e18a7b8b967d0c0a7bfe270ee16683
File Size: 129.5 KB
Uploaded At: March 13, 2026, 8:49 p.m.
Views: 11
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory
Exported Functions
No exported functions.
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x180015028)
- CreateFileA (Address: 0x180015060)
- CreateFileW (Address: 0x1800150d8)
- CreateThread (Address: 0x180015010)
- CreateToolhelp32Snapshot (Address: 0x180015030)
- DeleteCriticalSection (Address: 0x1800151a0)
- EncodePointer (Address: 0x180015188)
- EnterCriticalSection (Address: 0x180015190)
- ExitProcess (Address: 0x1800151e8)
- ExitThread (Address: 0x180015018)
- FindClose (Address: 0x180015210)
- FindFirstFileExW (Address: 0x180015218)
- FindNextFileW (Address: 0x180015220)
- FlushFileBuffers (Address: 0x1800152b8)
- FreeEnvironmentStringsW (Address: 0x180015270)
- FreeLibrary (Address: 0x1800151d0)
- GetACP (Address: 0x180015230)
- GetCommandLineA (Address: 0x180015248)
- GetCommandLineW (Address: 0x180015250)
- GetConsoleMode (Address: 0x1800152d0)
- GetConsoleOutputCP (Address: 0x1800152c8)
- GetCPInfo (Address: 0x180015240)
- GetCurrentProcess (Address: 0x180015108)
- GetCurrentProcessId (Address: 0x180015138)
- GetCurrentThread (Address: 0x180015080)
- GetCurrentThreadId (Address: 0x180015140)
- GetEnvironmentStringsW (Address: 0x180015268)
- GetFileType (Address: 0x180015290)
- GetLastError (Address: 0x180015178)
- GetModuleFileNameW (Address: 0x1800151f8)
- GetModuleHandleExW (Address: 0x1800151f0)
- GetModuleHandleW (Address: 0x180015008)
- GetOEMCP (Address: 0x180015238)
- GetProcAddress (Address: 0x180015000)
- GetProcessHeap (Address: 0x180015280)
- GetStartupInfoW (Address: 0x180015128)
- GetStdHandle (Address: 0x180015288)
- GetStringTypeW (Address: 0x180015298)
- GetSystemTimeAsFileTime (Address: 0x180015148)
- GetThreadId (Address: 0x1800150b0)
- HeapAlloc (Address: 0x180015200)
- HeapFree (Address: 0x180015208)
- HeapReAlloc (Address: 0x1800152a8)
- HeapSize (Address: 0x1800152a0)
- InitializeCriticalSectionAndSpinCount (Address: 0x1800151a8)
- InitializeSListHead (Address: 0x180015150)
- InterlockedFlushSList (Address: 0x180015170)
- IsDebuggerPresent (Address: 0x180015120)
- IsProcessorFeaturePresent (Address: 0x180015118)
- IsValidCodePage (Address: 0x180015228)
- LCMapStringW (Address: 0x180015278)
- LeaveCriticalSection (Address: 0x180015198)
- LoadLibraryExW (Address: 0x1800151d8)
- Module32FirstW (Address: 0x180015088)
- Module32NextW (Address: 0x180015090)
- MultiByteToWideChar (Address: 0x180015258)
- OpenProcess (Address: 0x180015050)
- OpenThread (Address: 0x1800150a8)
- Process32FirstW (Address: 0x180015038)
- Process32NextW (Address: 0x180015040)
- QueryPerformanceCounter (Address: 0x180015130)
- RaiseException (Address: 0x180015168)
- ReadFile (Address: 0x180015070)
- ReadProcessMemory (Address: 0x180015058)
- RtlCaptureContext (Address: 0x1800150e0)
- RtlLookupFunctionEntry (Address: 0x1800150e8)
- RtlPcToFileHeader (Address: 0x180015160)
- RtlUnwind (Address: 0x1800151e0)
- RtlUnwindEx (Address: 0x180015158)
- RtlVirtualUnwind (Address: 0x1800150f0)
- SetFilePointerEx (Address: 0x1800152d8)
- SetLastError (Address: 0x180015180)
- SetStdHandle (Address: 0x1800152b0)
- SetThreadPriority (Address: 0x180015078)
- SetUnhandledExceptionFilter (Address: 0x180015100)
- Sleep (Address: 0x180015048)
- TerminateProcess (Address: 0x180015110)
- TerminateThread (Address: 0x1800150c0)
- Thread32First (Address: 0x180015098)
- Thread32Next (Address: 0x1800150a0)
- TlsAlloc (Address: 0x1800151b0)
- TlsFree (Address: 0x1800151c8)
- TlsGetValue (Address: 0x1800151b8)
- TlsSetValue (Address: 0x1800151c0)
- UnhandledExceptionFilter (Address: 0x1800150f8)
- VirtualAlloc (Address: 0x180015068)
- VirtualFree (Address: 0x1800150d0)
- VirtualProtectEx (Address: 0x1800150c8)
- WaitForSingleObject (Address: 0x180015020)
- WideCharToMultiByte (Address: 0x180015260)
- WriteConsoleW (Address: 0x1800152e0)
- WriteFile (Address: 0x1800152c0)
- WriteProcessMemory (Address: 0x1800150b8)