0xZeOn.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: d1141b04fa7f36987ae69176710df25b
File Size: 9.5 MB
Uploaded At: March 31, 2026, 9:34 a.m.
Views: 5
Exported Functions
- ZCloseHandle (Ordinal: 1, Address: 0x10b0)
- ZCreateFileA (Ordinal: 2, Address: 0x1090)
- ZCreateThreadAddr (Ordinal: 3, Address: 0x1180)
- ZCryptAcquireContextAAddr (Ordinal: 4, Address: 0x1150)
- ZGetComputerNameWAddr (Ordinal: 5, Address: 0x1140)
- ZGetCurrentProcessId (Ordinal: 6, Address: 0x1060)
- ZGetModuleFileNameW (Ordinal: 7, Address: 0x1110)
- ZGetModuleHandleA (Ordinal: 8, Address: 0x1040)
- ZGetProcAddress (Ordinal: 9, Address: 0x1010)
- ZGetSystemInfo (Ordinal: 10, Address: 0x10f0)
- ZGetThreadContextAddr (Ordinal: 11, Address: 0x1190)
- ZGetUserNameWAddr (Ordinal: 12, Address: 0x1160)
- ZGetVolumeInformationWAddr (Ordinal: 13, Address: 0x1120)
- ZGetWindowsDirectoryWAddr (Ordinal: 14, Address: 0x1130)
- ZPathFileExistsW (Ordinal: 15, Address: 0x1100)
- ZReadFile (Ordinal: 16, Address: 0x10a0)
- ZRegCloseKey (Ordinal: 17, Address: 0x10e0)
- ZRegOpenKeyExA (Ordinal: 18, Address: 0x10c0)
- ZRegQueryValueExA (Ordinal: 19, Address: 0x10d0)
- ZRtlAddVectoredContinueHandlerAddr (Ordinal: 20, Address: 0x1000)
- ZSetThreadContextAddr (Ordinal: 21, Address: 0x1170)
- ZSleep (Ordinal: 22, Address: 0x1030)
- ZTerminateProcess (Ordinal: 23, Address: 0x1020)
- ZVirtualAlloc (Ordinal: 24, Address: 0x1070)
- ZVirtualFree (Ordinal: 25, Address: 0x1080)
- ZVirtualProtect (Ordinal: 26, Address: 0x1050)
- ZeOn (Ordinal: 27, Address: 0x11a0)
Imported DLLs & Functions
ADVAPI32.dll
- CryptAcquireContextA (Address: 0x13002020)
- GetUserNameW (Address: 0x13002018)
- RegCloseKey (Address: 0x13002000)
- RegOpenKeyExA (Address: 0x13002010)
- RegQueryValueExA (Address: 0x13002008)
KERNEL32.dll
- CloseHandle (Address: 0x13002050)
- CreateFileA (Address: 0x13002048)
- CreateThread (Address: 0x130020c0)
- GetComputerNameW (Address: 0x13002080)
- GetCurrentProcess (Address: 0x13002098)
- GetCurrentProcessId (Address: 0x13002088)
- GetModuleFileNameW (Address: 0x13002030)
- GetModuleHandleA (Address: 0x13002038)
- GetProcAddress (Address: 0x13002078)
- GetSystemInfo (Address: 0x13002058)
- GetThreadContext (Address: 0x13002068)
- GetVolumeInformationW (Address: 0x130020b8)
- GetWindowsDirectoryW (Address: 0x13002070)
- IsProcessorFeaturePresent (Address: 0x130020f8)
- ReadFile (Address: 0x130020c8)
- RtlCaptureContext (Address: 0x130020f0)
- RtlLookupFunctionEntry (Address: 0x130020e8)
- RtlVirtualUnwind (Address: 0x130020e0)
- SetThreadContext (Address: 0x13002090)
- SetUnhandledExceptionFilter (Address: 0x130020d0)
- Sleep (Address: 0x13002040)
- TerminateProcess (Address: 0x13002060)
- UnhandledExceptionFilter (Address: 0x130020d8)
- VirtualAlloc (Address: 0x130020a0)
- VirtualFree (Address: 0x130020a8)
- VirtualProtect (Address: 0x130020b0)
ntdll.dll
- RtlAddVectoredContinueHandler (Address: 0x13002118)
SHLWAPI.dll
- PathFileExistsW (Address: 0x13002108)