0xZeOn.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: d1141b04fa7f36987ae69176710df25b

File Size: 9.5 MB

Uploaded At: March 31, 2026, 9:34 a.m.

Views: 5

Exported Functions

  • ZCloseHandle (Ordinal: 1, Address: 0x10b0)
  • ZCreateFileA (Ordinal: 2, Address: 0x1090)
  • ZCreateThreadAddr (Ordinal: 3, Address: 0x1180)
  • ZCryptAcquireContextAAddr (Ordinal: 4, Address: 0x1150)
  • ZGetComputerNameWAddr (Ordinal: 5, Address: 0x1140)
  • ZGetCurrentProcessId (Ordinal: 6, Address: 0x1060)
  • ZGetModuleFileNameW (Ordinal: 7, Address: 0x1110)
  • ZGetModuleHandleA (Ordinal: 8, Address: 0x1040)
  • ZGetProcAddress (Ordinal: 9, Address: 0x1010)
  • ZGetSystemInfo (Ordinal: 10, Address: 0x10f0)
  • ZGetThreadContextAddr (Ordinal: 11, Address: 0x1190)
  • ZGetUserNameWAddr (Ordinal: 12, Address: 0x1160)
  • ZGetVolumeInformationWAddr (Ordinal: 13, Address: 0x1120)
  • ZGetWindowsDirectoryWAddr (Ordinal: 14, Address: 0x1130)
  • ZPathFileExistsW (Ordinal: 15, Address: 0x1100)
  • ZReadFile (Ordinal: 16, Address: 0x10a0)
  • ZRegCloseKey (Ordinal: 17, Address: 0x10e0)
  • ZRegOpenKeyExA (Ordinal: 18, Address: 0x10c0)
  • ZRegQueryValueExA (Ordinal: 19, Address: 0x10d0)
  • ZRtlAddVectoredContinueHandlerAddr (Ordinal: 20, Address: 0x1000)
  • ZSetThreadContextAddr (Ordinal: 21, Address: 0x1170)
  • ZSleep (Ordinal: 22, Address: 0x1030)
  • ZTerminateProcess (Ordinal: 23, Address: 0x1020)
  • ZVirtualAlloc (Ordinal: 24, Address: 0x1070)
  • ZVirtualFree (Ordinal: 25, Address: 0x1080)
  • ZVirtualProtect (Ordinal: 26, Address: 0x1050)
  • ZeOn (Ordinal: 27, Address: 0x11a0)

Imported DLLs & Functions

ADVAPI32.dll
  • CryptAcquireContextA (Address: 0x13002020)
  • GetUserNameW (Address: 0x13002018)
  • RegCloseKey (Address: 0x13002000)
  • RegOpenKeyExA (Address: 0x13002010)
  • RegQueryValueExA (Address: 0x13002008)
KERNEL32.dll
  • CloseHandle (Address: 0x13002050)
  • CreateFileA (Address: 0x13002048)
  • CreateThread (Address: 0x130020c0)
  • GetComputerNameW (Address: 0x13002080)
  • GetCurrentProcess (Address: 0x13002098)
  • GetCurrentProcessId (Address: 0x13002088)
  • GetModuleFileNameW (Address: 0x13002030)
  • GetModuleHandleA (Address: 0x13002038)
  • GetProcAddress (Address: 0x13002078)
  • GetSystemInfo (Address: 0x13002058)
  • GetThreadContext (Address: 0x13002068)
  • GetVolumeInformationW (Address: 0x130020b8)
  • GetWindowsDirectoryW (Address: 0x13002070)
  • IsProcessorFeaturePresent (Address: 0x130020f8)
  • ReadFile (Address: 0x130020c8)
  • RtlCaptureContext (Address: 0x130020f0)
  • RtlLookupFunctionEntry (Address: 0x130020e8)
  • RtlVirtualUnwind (Address: 0x130020e0)
  • SetThreadContext (Address: 0x13002090)
  • SetUnhandledExceptionFilter (Address: 0x130020d0)
  • Sleep (Address: 0x13002040)
  • TerminateProcess (Address: 0x13002060)
  • UnhandledExceptionFilter (Address: 0x130020d8)
  • VirtualAlloc (Address: 0x130020a0)
  • VirtualFree (Address: 0x130020a8)
  • VirtualProtect (Address: 0x130020b0)
ntdll.dll
  • RtlAddVectoredContinueHandler (Address: 0x13002118)
SHLWAPI.dll
  • PathFileExistsW (Address: 0x13002108)