version.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 394153206e3815ba38eef9a416fd424a

File Size: 118.5 KB

Uploaded At: April 12, 2026, 3:22 p.m.

Views: 4

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • GetFileVersionInfoA (Ordinal: 1, Address: 0x2fe0)
  • GetFileVersionInfoExA (Ordinal: 2, Address: 0x3040)
  • GetFileVersionInfoExW (Ordinal: 3, Address: 0x30a0)
  • GetFileVersionInfoSizeA (Ordinal: 4, Address: 0x3100)
  • GetFileVersionInfoSizeExA (Ordinal: 5, Address: 0x3150)
  • GetFileVersionInfoSizeExW (Ordinal: 6, Address: 0x31c0)
  • GetFileVersionInfoSizeW (Ordinal: 7, Address: 0x3230)
  • GetFileVersionInfoW (Ordinal: 8, Address: 0x3280)
  • VerFindFileA (Ordinal: 9, Address: 0x32e0)
  • VerFindFileW (Ordinal: 10, Address: 0x3340)
  • VerInstallFileA (Ordinal: 11, Address: 0x33a0)
  • VerInstallFileW (Ordinal: 12, Address: 0x3400)
  • VerLanguageNameA (Ordinal: 13, Address: 0x3460)
  • VerLanguageNameW (Ordinal: 14, Address: 0x34d0)
  • VerQueryValueA (Ordinal: 15, Address: 0x3540)
  • VerQueryValueW (Ordinal: 16, Address: 0x35a0)

Imported DLLs & Functions

KERNEL32.dll
  • AssignProcessToJobObject (Address: 0x1800110d8)
  • CloseHandle (Address: 0x180011020)
  • CreateEventW (Address: 0x180011058)
  • CreateFileW (Address: 0x180011010)
  • CreateJobObjectW (Address: 0x1800110d0)
  • CreateThread (Address: 0x180011078)
  • CreateToolhelp32Snapshot (Address: 0x180011138)
  • DeleteCriticalSection (Address: 0x180011040)
  • DisableThreadLibraryCalls (Address: 0x1800110e8)
  • EncodePointer (Address: 0x1800111f0)
  • EnterCriticalSection (Address: 0x180011028)
  • ExitProcess (Address: 0x1800111f8)
  • FindClose (Address: 0x180011250)
  • FindFirstFileExW (Address: 0x180011258)
  • FindNextFileW (Address: 0x180011260)
  • FlsAlloc (Address: 0x1800111c8)
  • FlsFree (Address: 0x1800111d8)
  • FlsGetValue (Address: 0x180011000)
  • FlsSetValue (Address: 0x1800111d0)
  • FlushFileBuffers (Address: 0x180011300)
  • FlushInstructionCache (Address: 0x180011098)
  • FreeEnvironmentStringsW (Address: 0x1800112b0)
  • FreeLibrary (Address: 0x1800110f0)
  • GetACP (Address: 0x180011270)
  • GetCommandLineA (Address: 0x180011288)
  • GetCommandLineW (Address: 0x180011290)
  • GetConsoleMode (Address: 0x180011190)
  • GetConsoleOutputCP (Address: 0x180011310)
  • GetCPInfo (Address: 0x180011280)
  • GetCurrentProcess (Address: 0x180011068)
  • GetCurrentProcessId (Address: 0x180011070)
  • GetCurrentThreadId (Address: 0x180011178)
  • GetEnvironmentStringsW (Address: 0x1800112a8)
  • GetFileType (Address: 0x1800112d8)
  • GetLastError (Address: 0x1800111b8)
  • GetModuleFileNameA (Address: 0x1800110f8)
  • GetModuleFileNameW (Address: 0x180011210)
  • GetModuleHandleA (Address: 0x180011100)
  • GetModuleHandleExW (Address: 0x180011208)
  • GetModuleHandleW (Address: 0x180011108)
  • GetOEMCP (Address: 0x180011278)
  • GetPrivateProfileIntA (Address: 0x180011120)
  • GetProcAddress (Address: 0x180011110)
  • GetProcessHeap (Address: 0x1800112c8)
  • GetStartupInfoW (Address: 0x180011168)
  • GetStdHandle (Address: 0x1800112d0)
  • GetStringTypeW (Address: 0x1800112e0)
  • GetSystemDirectoryA (Address: 0x1800110b0)
  • GetSystemTimeAsFileTime (Address: 0x180011180)
  • GetTickCount64 (Address: 0x1800110a8)
  • HeapAlloc (Address: 0x180011240)
  • HeapFree (Address: 0x180011248)
  • HeapReAlloc (Address: 0x1800112f0)
  • HeapSize (Address: 0x1800112e8)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180011038)
  • InitializeCriticalSectionEx (Address: 0x1800111e0)
  • InitializeSListHead (Address: 0x180011188)
  • InterlockedFlushSList (Address: 0x1800111b0)
  • IsDebuggerPresent (Address: 0x180011230)
  • IsProcessorFeaturePresent (Address: 0x180011218)
  • IsValidCodePage (Address: 0x180011268)
  • K32EnumProcessModules (Address: 0x180011128)
  • K32GetModuleInformation (Address: 0x180011130)
  • LCMapStringW (Address: 0x1800112c0)
  • LeaveCriticalSection (Address: 0x180011030)
  • LoadLibraryA (Address: 0x180011118)
  • LoadLibraryExW (Address: 0x1800112b8)
  • MultiByteToWideChar (Address: 0x180011298)
  • OpenProcess (Address: 0x1800110a0)
  • OpenThread (Address: 0x180011080)
  • Process32FirstW (Address: 0x180011140)
  • Process32NextW (Address: 0x180011148)
  • QueryPerformanceCounter (Address: 0x180011170)
  • QueueUserWorkItem (Address: 0x1800110c8)
  • RaiseException (Address: 0x1800111a0)
  • ResumeThread (Address: 0x180011090)
  • RtlCaptureContext (Address: 0x180011220)
  • RtlLookupFunctionEntry (Address: 0x1800111e8)
  • RtlPcToFileHeader (Address: 0x180011198)
  • RtlUnwindEx (Address: 0x1800111a8)
  • RtlVirtualUnwind (Address: 0x180011228)
  • SetEvent (Address: 0x180011048)
  • SetFilePointerEx (Address: 0x180011018)
  • SetInformationJobObject (Address: 0x1800110e0)
  • SetLastError (Address: 0x1800111c0)
  • SetProcessWorkingSetSize (Address: 0x1800110c0)
  • SetStdHandle (Address: 0x1800112f8)
  • SetUnhandledExceptionFilter (Address: 0x180011160)
  • Sleep (Address: 0x180011060)
  • SuspendThread (Address: 0x180011088)
  • TerminateProcess (Address: 0x180011200)
  • Thread32First (Address: 0x180011150)
  • Thread32Next (Address: 0x180011158)
  • UnhandledExceptionFilter (Address: 0x180011238)
  • VirtualProtect (Address: 0x1800110b8)
  • WaitForSingleObject (Address: 0x180011050)
  • WideCharToMultiByte (Address: 0x1800112a0)
  • WriteConsoleW (Address: 0x180011008)
  • WriteFile (Address: 0x180011308)
USER32.dll
  • DispatchMessageW (Address: 0x180011350)
  • GetWindowThreadProcessId (Address: 0x180011340)
  • MsgWaitForMultipleObjects (Address: 0x180011348)
  • PeekMessageW (Address: 0x180011320)
  • RealGetWindowClassW (Address: 0x180011328)
  • SetWinEventHook (Address: 0x180011338)
  • UnhookWinEvent (Address: 0x180011330)