Andromeda-DeadLock-Base.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: c9984a247ac091952bf65c4a1ea13afe

File Size: 6.3 MB

Uploaded At: March 26, 2026, 7:47 p.m.

Views: 16

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • FW1CreateFactory (Ordinal: 1, Address: 0x2e80e0)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x180443010)
  • RegCreateKeyExA (Address: 0x180443008)
  • RegOpenKeyExA (Address: 0x180443020)
  • RegQueryValueExA (Address: 0x180443018)
  • RegSetValueExA (Address: 0x180443000)
d3d11.dll
  • D3D11CreateDeviceAndSwapChain (Address: 0x180443620)
D3DCOMPILER_47.dll
  • D3DCompile (Address: 0x180443030)
GDI32.dll
  • CreateSolidBrush (Address: 0x180443048)
  • DeleteObject (Address: 0x180443040)
  • GetCurrentObject (Address: 0x180443050)
  • GetObjectW (Address: 0x180443058)
IMM32.dll
  • ImmGetContext (Address: 0x180443080)
  • ImmReleaseContext (Address: 0x180443078)
  • ImmSetCandidateWindow (Address: 0x180443070)
  • ImmSetCompositionWindow (Address: 0x180443068)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180443330)
  • AddVectoredExceptionHandler (Address: 0x180443270)
  • AreFileApisANSI (Address: 0x180443398)
  • CloseHandle (Address: 0x180443278)
  • CreateFileA (Address: 0x1804432e8)
  • CreateFileMappingA (Address: 0x180443470)
  • CreateFileW (Address: 0x180443368)
  • CreateThread (Address: 0x180443178)
  • CreateToolhelp32Snapshot (Address: 0x180443120)
  • DecodePointer (Address: 0x1804433d0)
  • DeleteCriticalSection (Address: 0x1804433c0)
  • DeleteFileA (Address: 0x1804432b0)
  • DisableThreadLibraryCalls (Address: 0x180443180)
  • EncodePointer (Address: 0x1804433c8)
  • EnterCriticalSection (Address: 0x1804433a8)
  • EnumSystemLocalesW (Address: 0x180443200)
  • ExitProcess (Address: 0x180443318)
  • FindClose (Address: 0x180443370)
  • FindFirstFileExW (Address: 0x180443380)
  • FindFirstFileW (Address: 0x180443378)
  • FindNextFileW (Address: 0x180443388)
  • FlsAlloc (Address: 0x180443240)
  • FlsFree (Address: 0x180443228)
  • FlsGetValue (Address: 0x180443238)
  • FlsSetValue (Address: 0x180443230)
  • FlushFileBuffers (Address: 0x180443248)
  • FlushInstructionCache (Address: 0x180443150)
  • FormatMessageA (Address: 0x180443340)
  • FreeEnvironmentStringsW (Address: 0x1804431c8)
  • FreeLibrary (Address: 0x1804430b8)
  • GetACP (Address: 0x1804431f0)
  • GetCommandLineA (Address: 0x1804431e0)
  • GetCommandLineW (Address: 0x1804431d8)
  • GetConsoleMode (Address: 0x1804432c0)
  • GetConsoleOutputCP (Address: 0x180443260)
  • GetCPInfo (Address: 0x1804433f0)
  • GetCurrentProcess (Address: 0x1804430f8)
  • GetCurrentProcessId (Address: 0x180443268)
  • GetCurrentThreadId (Address: 0x180443298)
  • GetEnvironmentStringsW (Address: 0x1804431d0)
  • GetFileAttributesExW (Address: 0x180443390)
  • GetFileInformationByHandleEx (Address: 0x1804433a0)
  • GetFileSizeEx (Address: 0x180443448)
  • GetFileType (Address: 0x180443300)
  • GetLastError (Address: 0x180443168)
  • GetLocaleInfoEx (Address: 0x180443360)
  • GetLocaleInfoW (Address: 0x180443218)
  • GetModuleFileNameA (Address: 0x180443170)
  • GetModuleFileNameW (Address: 0x180443308)
  • GetModuleHandleA (Address: 0x1804432f0)
  • GetModuleHandleExW (Address: 0x180443310)
  • GetModuleHandleW (Address: 0x180443148)
  • GetOEMCP (Address: 0x1804431e8)
  • GetProcAddress (Address: 0x1804430b0)
  • GetProcessHeap (Address: 0x180443458)
  • GetStartupInfoW (Address: 0x180443438)
  • GetStdHandle (Address: 0x180443258)
  • GetStringTypeW (Address: 0x1804433e8)
  • GetSystemInfo (Address: 0x1804430d8)
  • GetSystemTimeAsFileTime (Address: 0x1804433e0)
  • GetThreadContext (Address: 0x180443140)
  • GetTickCount64 (Address: 0x1804432f8)
  • GetUserDefaultLCID (Address: 0x180443208)
  • GlobalAlloc (Address: 0x180443280)
  • GlobalFree (Address: 0x1804431c0)
  • GlobalLock (Address: 0x180443090)
  • GlobalUnlock (Address: 0x180443098)
  • HeapAlloc (Address: 0x180443130)
  • HeapCreate (Address: 0x1804430e0)
  • HeapDestroy (Address: 0x180443138)
  • HeapFree (Address: 0x1804430f0)
  • HeapReAlloc (Address: 0x180443128)
  • HeapSize (Address: 0x1804431b0)
  • InitializeCriticalSection (Address: 0x180443478)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1804434b8)
  • InitializeCriticalSectionEx (Address: 0x1804433b8)
  • InitializeSListHead (Address: 0x180443440)
  • InitOnceBeginInitialize (Address: 0x180443188)
  • InitOnceComplete (Address: 0x1804434e0)
  • InterlockedFlushSList (Address: 0x1804434a8)
  • IsDebuggerPresent (Address: 0x180443430)
  • IsProcessorFeaturePresent (Address: 0x180443428)
  • IsValidCodePage (Address: 0x1804431f8)
  • IsValidLocale (Address: 0x180443210)
  • K32GetMappedFileNameA (Address: 0x1804432a0)
  • LCMapStringEx (Address: 0x1804433d8)
  • LCMapStringW (Address: 0x180443220)
  • LeaveCriticalSection (Address: 0x1804433b0)
  • LoadLibraryA (Address: 0x1804430a0)
  • LoadLibraryExW (Address: 0x180443320)
  • LoadLibraryW (Address: 0x180443480)
  • LocalFree (Address: 0x180443358)
  • lstrlenA (Address: 0x180443190)
  • MapViewOfFile (Address: 0x180443460)
  • MultiByteToWideChar (Address: 0x1804432d0)
  • OpenProcess (Address: 0x180443288)
  • OpenThread (Address: 0x180443160)
  • QueryPerformanceCounter (Address: 0x1804430c0)
  • QueryPerformanceFrequency (Address: 0x1804430a8)
  • RaiseException (Address: 0x1804434a0)
  • ReadConsoleW (Address: 0x1804432b8)
  • ReadFile (Address: 0x180443450)
  • ReleaseSRWLockExclusive (Address: 0x180443328)
  • RemoveVectoredExceptionHandler (Address: 0x1804432a8)
  • ResumeThread (Address: 0x180443118)
  • RtlCaptureContext (Address: 0x1804433f8)
  • RtlCaptureStackBackTrace (Address: 0x180443290)
  • RtlLookupFunctionEntry (Address: 0x180443400)
  • RtlPcToFileHeader (Address: 0x180443498)
  • RtlUnwind (Address: 0x1804434b0)
  • RtlUnwindEx (Address: 0x180443490)
  • RtlVirtualUnwind (Address: 0x180443408)
  • SetEndOfFile (Address: 0x1804431b8)
  • SetFilePointerEx (Address: 0x180443250)
  • SetLastError (Address: 0x180443488)
  • SetStdHandle (Address: 0x1804432e0)
  • SetThreadContext (Address: 0x180443158)
  • SetUnhandledExceptionFilter (Address: 0x180443418)
  • Sleep (Address: 0x1804432d8)
  • SleepConditionVariableSRW (Address: 0x180443350)
  • SuspendThread (Address: 0x180443110)
  • TerminateProcess (Address: 0x180443420)
  • Thread32First (Address: 0x180443108)
  • Thread32Next (Address: 0x180443100)
  • TlsAlloc (Address: 0x1804434c0)
  • TlsFree (Address: 0x1804434d8)
  • TlsGetValue (Address: 0x1804434c8)
  • TlsSetValue (Address: 0x1804434d0)
  • TryAcquireSRWLockExclusive (Address: 0x180443338)
  • UnhandledExceptionFilter (Address: 0x180443410)
  • UnmapViewOfFile (Address: 0x180443468)
  • VirtualAlloc (Address: 0x1804430d0)
  • VirtualFree (Address: 0x1804430c8)
  • VirtualProtect (Address: 0x1804430e8)
  • VirtualQuery (Address: 0x1804431a0)
  • WakeAllConditionVariable (Address: 0x180443348)
  • WideCharToMultiByte (Address: 0x1804432c8)
  • WriteConsoleW (Address: 0x1804431a8)
  • WriteFile (Address: 0x180443198)
ole32.dll
  • CoTaskMemFree (Address: 0x180443630)
SHELL32.dll
  • ShellExecuteA (Address: 0x1804434f0)
  • SHGetKnownFolderPath (Address: 0x1804434f8)
USER32.dll
  • CallWindowProcA (Address: 0x180443530)
  • ClientToScreen (Address: 0x1804435a0)
  • CloseClipboard (Address: 0x1804435f8)
  • CreateWindowExA (Address: 0x180443560)
  • DefWindowProcA (Address: 0x180443558)
  • DestroyWindow (Address: 0x180443550)
  • EmptyClipboard (Address: 0x180443600)
  • FillRect (Address: 0x180443528)
  • GetAsyncKeyState (Address: 0x180443510)
  • GetCapture (Address: 0x180443598)
  • GetClientRect (Address: 0x1804435c8)
  • GetClipboardData (Address: 0x180443548)
  • GetCursorPos (Address: 0x1804435e8)
  • GetForegroundWindow (Address: 0x1804435b0)
  • GetKeyState (Address: 0x180443578)
  • GetMessageExtraInfo (Address: 0x180443580)
  • IsWindowUnicode (Address: 0x1804435d0)
  • LoadCursorA (Address: 0x180443588)
  • MessageBoxW (Address: 0x180443518)
  • OpenClipboard (Address: 0x1804435f0)
  • RegisterClassExA (Address: 0x180443570)
  • ReleaseCapture (Address: 0x1804435d8)
  • ScreenToClient (Address: 0x180443590)
  • SetCapture (Address: 0x1804435b8)
  • SetClipboardData (Address: 0x180443520)
  • SetCursor (Address: 0x1804435c0)
  • SetCursorPos (Address: 0x1804435e0)
  • SetRect (Address: 0x180443540)
  • SetWindowLongPtrA (Address: 0x180443508)
  • ShowCursor (Address: 0x180443538)
  • TrackMouseEvent (Address: 0x1804435a8)
  • UnregisterClassA (Address: 0x180443568)
WINMM.dll
  • PlaySoundA (Address: 0x180443610)