ADDL_COMMON.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 670edebfe54f2833bf7108405e843ff8

File Size: 2.0 MB

Uploaded At: April 1, 2026, 9:03 a.m.

Views: 5

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • ADDL_init (Ordinal: 1, Address: 0x3ad10)
  • DoesSystemHaveProduct (Ordinal: 2, Address: 0x3ad50)
  • DownloadAndCreatePatchedInstallBuild (Ordinal: 3, Address: 0x3afc0)
  • DownloadDriver (Ordinal: 4, Address: 0x3e520)
  • DownloadDriverandInstall (Ordinal: 5, Address: 0x42060)
  • DownloadFile (Ordinal: 6, Address: 0x45260)
  • GetEligibleDriverDetails (Ordinal: 7, Address: 0x46220)
  • GetEligibleDriverDetailsSize (Ordinal: 8, Address: 0x46770)
  • IsSmartBlurAvailable (Ordinal: 9, Address: 0x49d50)
  • IsThirdPartyToolAvailable (Ordinal: 10, Address: 0x49d90)
  • IsThirdPartyToolAvailable2 (Ordinal: 11, Address: 0x49ef0)
  • SetFilterDevicesList (Ordinal: 12, Address: 0x4a700)
  • copyCachedInstaller (Ordinal: 13, Address: 0x4ab00)
  • copyCachedSmartBlurInstaller (Ordinal: 14, Address: 0x4b450)
  • downloadThirdPartyTool (Ordinal: 15, Address: 0x4b730)
  • downloadandInstallSmartBlur (Ordinal: 16, Address: 0x4c420)
  • downloadandInstallThirdPartyTool (Ordinal: 17, Address: 0x4c710)
  • downloadandSmartBlur (Ordinal: 18, Address: 0x4d5b0)
  • isThirdPartyToolLoaded (Ordinal: 19, Address: 0x4d8c0)
  • isWorkstationASIC (Ordinal: 20, Address: 0x4def0)
  • setCallerLoggingFunction (Ordinal: 21, Address: 0x4df30)
  • uninstallSmartBlur (Ordinal: 22, Address: 0x4dff0)
  • uninstallThirdPartyTools (Ordinal: 23, Address: 0x4e720)

Imported DLLs & Functions

ADVAPI32.dll
  • ConvertSidToStringSidW (Address: 0x180141038)
  • ConvertStringSidToSidW (Address: 0x180141030)
  • CreateWellKnownSid (Address: 0x180141090)
  • DeregisterEventSource (Address: 0x180141020)
  • GetTokenInformation (Address: 0x180141088)
  • InitializeSecurityDescriptor (Address: 0x180141080)
  • OpenProcessToken (Address: 0x180141008)
  • RegCloseKey (Address: 0x180141048)
  • RegCreateKeyExW (Address: 0x180141070)
  • RegDeleteValueW (Address: 0x180141028)
  • RegEnumValueW (Address: 0x180141068)
  • RegGetValueW (Address: 0x180141000)
  • RegisterEventSourceW (Address: 0x180141018)
  • RegOpenKeyExW (Address: 0x180141060)
  • RegQueryInfoKeyW (Address: 0x180141058)
  • RegSetValueExW (Address: 0x180141050)
  • ReportEventW (Address: 0x180141010)
  • SetEntriesInAclW (Address: 0x180141040)
  • SetSecurityDescriptorDacl (Address: 0x180141078)
api-ms-win-core-path-l1-1-0.dll
  • PathCchRemoveBackslash (Address: 0x180141728)
CRYPT32.dll
  • CertGetNameStringW (Address: 0x1801410a0)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1801414b8)
  • AreFileApisANSI (Address: 0x180141550)
  • CloseHandle (Address: 0x1801412b0)
  • CloseThreadpoolWork (Address: 0x180141580)
  • CompareFileTime (Address: 0x1801410c0)
  • CompareStringEx (Address: 0x1801415e8)
  • CompareStringW (Address: 0x1801413a0)
  • CopyFileW (Address: 0x180141558)
  • CreateDirectoryW (Address: 0x1801410c8)
  • CreateFileW (Address: 0x1801412c0)
  • CreatePipe (Address: 0x180141220)
  • CreateProcessW (Address: 0x180141130)
  • CreateSymbolicLinkW (Address: 0x180141228)
  • CreateThread (Address: 0x180141320)
  • CreateThreadpoolWork (Address: 0x180141570)
  • CreateToolhelp32Snapshot (Address: 0x1801411b0)
  • DecodePointer (Address: 0x1801415d8)
  • DeleteCriticalSection (Address: 0x1801415c0)
  • DeleteFileW (Address: 0x180141230)
  • DeviceIoControl (Address: 0x180141108)
  • EncodePointer (Address: 0x1801415d0)
  • EnterCriticalSection (Address: 0x1801415a8)
  • EnumSystemLocalesW (Address: 0x180141438)
  • ExitProcess (Address: 0x1801412d8)
  • ExitThread (Address: 0x180141280)
  • FileTimeToSystemTime (Address: 0x180141190)
  • FindClose (Address: 0x1801414f8)
  • FindFirstFileExW (Address: 0x180141508)
  • FindFirstFileW (Address: 0x180141500)
  • FindNextFileW (Address: 0x180141510)
  • FindResourceW (Address: 0x180141250)
  • FlsAlloc (Address: 0x1801412f0)
  • FlsFree (Address: 0x180141308)
  • FlsGetValue (Address: 0x1801412f8)
  • FlsSetValue (Address: 0x180141300)
  • FlushFileBuffers (Address: 0x1801410d0)
  • FormatMessageA (Address: 0x180141480)
  • FormatMessageW (Address: 0x180141180)
  • FreeEnvironmentStringsW (Address: 0x180141360)
  • FreeLibrary (Address: 0x180141200)
  • FreeLibraryAndExitThread (Address: 0x1801412d0)
  • FreeLibraryWhenCallbackReturns (Address: 0x180141568)
  • GetACP (Address: 0x1801413e8)
  • GetCommandLineA (Address: 0x180141378)
  • GetCommandLineW (Address: 0x180141370)
  • GetConsoleMode (Address: 0x180141428)
  • GetConsoleOutputCP (Address: 0x180141418)
  • GetCPInfo (Address: 0x1801415f0)
  • GetCurrentProcess (Address: 0x180141118)
  • GetCurrentProcessId (Address: 0x180141120)
  • GetCurrentThreadId (Address: 0x1801414c8)
  • GetDateFormatEx (Address: 0x180141268)
  • GetDateFormatW (Address: 0x180141310)
  • GetDiskFreeSpaceExW (Address: 0x180141518)
  • GetEnvironmentStringsW (Address: 0x180141368)
  • GetEnvironmentVariableW (Address: 0x1801410b8)
  • GetExitCodeProcess (Address: 0x180141128)
  • GetExitCodeThread (Address: 0x1801415a0)
  • GetFileAttributesExW (Address: 0x180141528)
  • GetFileAttributesW (Address: 0x180141520)
  • GetFileInformationByHandle (Address: 0x180141530)
  • GetFileInformationByHandleEx (Address: 0x180141560)
  • GetFileSize (Address: 0x1801410d8)
  • GetFileSizeEx (Address: 0x180141410)
  • GetFileTime (Address: 0x1801410e0)
  • GetFileType (Address: 0x1801412e8)
  • GetFinalPathNameByHandleW (Address: 0x180141538)
  • GetFullPathNameW (Address: 0x180141540)
  • GetGeoInfoW (Address: 0x1801411a0)
  • GetLastError (Address: 0x1801412a8)
  • GetLocaleInfoEx (Address: 0x180141488)
  • GetLocaleInfoW (Address: 0x180141450)
  • GetLocalTime (Address: 0x180141278)
  • GetModuleFileNameW (Address: 0x180141160)
  • GetModuleHandleExW (Address: 0x180141588)
  • GetModuleHandleW (Address: 0x180141168)
  • GetNativeSystemInfo (Address: 0x1801411f8)
  • GetOEMCP (Address: 0x1801413e0)
  • GetPhysicallyInstalledSystemMemory (Address: 0x180141158)
  • GetProcAddress (Address: 0x180141208)
  • GetProcessHeap (Address: 0x180141298)
  • GetStartupInfoW (Address: 0x1801413c0)
  • GetStdHandle (Address: 0x1801410b0)
  • GetStringTypeW (Address: 0x1801414f0)
  • GetSystemTimeAsFileTime (Address: 0x1801415c8)
  • GetTempPathW (Address: 0x180141100)
  • GetTimeFormatEx (Address: 0x180141260)
  • GetTimeFormatW (Address: 0x180141318)
  • GetTimeZoneInformation (Address: 0x180141430)
  • GetUserDefaultLCID (Address: 0x180141440)
  • GetUserGeoID (Address: 0x1801411a8)
  • GetWindowsDirectoryW (Address: 0x180141150)
  • GlobalMemoryStatusEx (Address: 0x180141148)
  • HeapAlloc (Address: 0x1801412a0)
  • HeapFree (Address: 0x1801412e0)
  • HeapReAlloc (Address: 0x180141400)
  • HeapSize (Address: 0x180141348)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180141390)
  • InitializeCriticalSectionEx (Address: 0x1801415b8)
  • InitializeSListHead (Address: 0x1801413b8)
  • InitOnceBeginInitialize (Address: 0x180141490)
  • InitOnceComplete (Address: 0x180141498)
  • InterlockedFlushSList (Address: 0x1801413b0)
  • IsDebuggerPresent (Address: 0x1801413c8)
  • IsProcessorFeaturePresent (Address: 0x180141590)
  • IsValidCodePage (Address: 0x1801413f0)
  • IsValidLocale (Address: 0x180141448)
  • K32EnumProcessModules (Address: 0x1801411d8)
  • K32GetModuleFileNameExW (Address: 0x1801411e0)
  • LCMapStringEx (Address: 0x1801415e0)
  • LCMapStringW (Address: 0x180141458)
  • LeaveCriticalSection (Address: 0x1801415b0)
  • LoadLibraryExA (Address: 0x180141210)
  • LoadLibraryExW (Address: 0x180141328)
  • LoadResource (Address: 0x180141238)
  • LocalAlloc (Address: 0x180141170)
  • LocalFree (Address: 0x180141178)
  • LockResource (Address: 0x180141240)
  • Module32FirstW (Address: 0x1801411c8)
  • Module32NextW (Address: 0x1801411d0)
  • MoveFileExW (Address: 0x180141188)
  • MoveFileW (Address: 0x180141258)
  • MulDiv (Address: 0x180141288)
  • MultiByteToWideChar (Address: 0x1801414e8)
  • OpenProcess (Address: 0x180141140)
  • OutputDebugStringA (Address: 0x1801411f0)
  • OutputDebugStringW (Address: 0x180141270)
  • Process32FirstW (Address: 0x1801411b8)
  • Process32NextW (Address: 0x1801411c0)
  • ProcessIdToSessionId (Address: 0x180141138)
  • QueryPerformanceCounter (Address: 0x1801414a0)
  • QueryPerformanceFrequency (Address: 0x1801414a8)
  • RaiseException (Address: 0x180141478)
  • ReadConsoleW (Address: 0x180141420)
  • ReadFile (Address: 0x1801410e8)
  • ReleaseSRWLockExclusive (Address: 0x1801414b0)
  • RemoveDirectoryW (Address: 0x180141218)
  • RtlCaptureContext (Address: 0x1801415f8)
  • RtlLookupFunctionEntry (Address: 0x180141600)
  • RtlPcToFileHeader (Address: 0x180141470)
  • RtlUnwind (Address: 0x180141468)
  • RtlUnwindEx (Address: 0x1801413a8)
  • RtlVirtualUnwind (Address: 0x180141608)
  • SetEndOfFile (Address: 0x180141340)
  • SetEnvironmentVariableW (Address: 0x180141358)
  • SetFileInformationByHandle (Address: 0x180141548)
  • SetFilePointer (Address: 0x1801410f0)
  • SetFilePointerEx (Address: 0x180141408)
  • SetFileTime (Address: 0x1801410f8)
  • SetHandleInformation (Address: 0x180141460)
  • SetLastError (Address: 0x180141398)
  • SetStdHandle (Address: 0x180141350)
  • SetUnhandledExceptionFilter (Address: 0x1801413d8)
  • SizeofResource (Address: 0x180141248)
  • Sleep (Address: 0x180141290)
  • SleepConditionVariableSRW (Address: 0x1801414e0)
  • SubmitThreadpoolWork (Address: 0x180141578)
  • SystemTimeToFileTime (Address: 0x180141198)
  • TerminateProcess (Address: 0x1801413d0)
  • TlsAlloc (Address: 0x180141388)
  • TlsFree (Address: 0x180141330)
  • TlsGetValue (Address: 0x180141380)
  • TlsSetValue (Address: 0x180141338)
  • TryAcquireSRWLockExclusive (Address: 0x1801414c0)
  • UnhandledExceptionFilter (Address: 0x1801413f8)
  • WaitForSingleObject (Address: 0x180141110)
  • WaitForSingleObjectEx (Address: 0x180141598)
  • WakeAllConditionVariable (Address: 0x1801414d8)
  • WakeConditionVariable (Address: 0x1801414d0)
  • WideCharToMultiByte (Address: 0x1801411e8)
  • WriteConsoleW (Address: 0x1801412c8)
  • WriteFile (Address: 0x1801412b8)
msi.dll
  • (Address: 0x180141738)
  • (Address: 0x180141740)
  • (Address: 0x180141748)
  • (Address: 0x180141750)
  • (Address: 0x180141758)
  • (Address: 0x180141760)
  • (Address: 0x180141768)
  • (Address: 0x180141770)
ole32.dll
  • CoCreateInstance (Address: 0x180141790)
  • CoInitializeEx (Address: 0x180141780)
  • CoTaskMemFree (Address: 0x180141798)
  • CoUninitialize (Address: 0x180141788)
SETUPAPI.dll
  • SetupDiDestroyDeviceInfoList (Address: 0x180141630)
  • SetupDiEnumDeviceInfo (Address: 0x180141638)
  • SetupDiGetClassDevsW (Address: 0x180141628)
  • SetupDiGetDeviceInstanceIdW (Address: 0x180141618)
  • SetupDiGetDeviceRegistryPropertyW (Address: 0x180141620)
SHELL32.dll
  • ShellExecuteExW (Address: 0x180141658)
  • SHGetFolderPathW (Address: 0x180141650)
  • SHGetKnownFolderPath (Address: 0x180141648)
WININET.dll
  • HttpAddRequestHeadersW (Address: 0x180141678)
  • HttpOpenRequestA (Address: 0x180141680)
  • HttpOpenRequestW (Address: 0x1801416b8)
  • HttpQueryInfoW (Address: 0x180141670)
  • HttpSendRequestW (Address: 0x1801416b0)
  • InternetCheckConnectionW (Address: 0x180141668)
  • InternetCloseHandle (Address: 0x1801416d0)
  • InternetConnectW (Address: 0x1801416c8)
  • InternetCrackUrlW (Address: 0x1801416a8)
  • InternetGetLastResponseInfoW (Address: 0x180141688)
  • InternetOpenW (Address: 0x1801416d8)
  • InternetReadFile (Address: 0x1801416a0)
  • InternetSetFilePointer (Address: 0x180141698)
  • InternetSetOptionA (Address: 0x180141690)
  • InternetSetOptionW (Address: 0x1801416c0)
WINTRUST.dll
  • WinVerifyTrust (Address: 0x1801416f8)
  • WTHelperGetProvCertFromChain (Address: 0x1801416e8)
  • WTHelperGetProvSignerFromChain (Address: 0x1801416f0)
  • WTHelperProvDataFromStateData (Address: 0x180141700)
WTSAPI32.dll
  • WTSFreeMemory (Address: 0x180141710)
  • WTSQuerySessionInformationW (Address: 0x180141718)