version.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: 394153206e3815ba38eef9a416fd424a
File Size: 118.5 KB
Uploaded At: April 12, 2026, 3:22 p.m.
Views: 4
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- GetFileVersionInfoA (Ordinal: 1, Address: 0x2fe0)
- GetFileVersionInfoExA (Ordinal: 2, Address: 0x3040)
- GetFileVersionInfoExW (Ordinal: 3, Address: 0x30a0)
- GetFileVersionInfoSizeA (Ordinal: 4, Address: 0x3100)
- GetFileVersionInfoSizeExA (Ordinal: 5, Address: 0x3150)
- GetFileVersionInfoSizeExW (Ordinal: 6, Address: 0x31c0)
- GetFileVersionInfoSizeW (Ordinal: 7, Address: 0x3230)
- GetFileVersionInfoW (Ordinal: 8, Address: 0x3280)
- VerFindFileA (Ordinal: 9, Address: 0x32e0)
- VerFindFileW (Ordinal: 10, Address: 0x3340)
- VerInstallFileA (Ordinal: 11, Address: 0x33a0)
- VerInstallFileW (Ordinal: 12, Address: 0x3400)
- VerLanguageNameA (Ordinal: 13, Address: 0x3460)
- VerLanguageNameW (Ordinal: 14, Address: 0x34d0)
- VerQueryValueA (Ordinal: 15, Address: 0x3540)
- VerQueryValueW (Ordinal: 16, Address: 0x35a0)
Imported DLLs & Functions
KERNEL32.dll
- AssignProcessToJobObject (Address: 0x1800110d8)
- CloseHandle (Address: 0x180011020)
- CreateEventW (Address: 0x180011058)
- CreateFileW (Address: 0x180011010)
- CreateJobObjectW (Address: 0x1800110d0)
- CreateThread (Address: 0x180011078)
- CreateToolhelp32Snapshot (Address: 0x180011138)
- DeleteCriticalSection (Address: 0x180011040)
- DisableThreadLibraryCalls (Address: 0x1800110e8)
- EncodePointer (Address: 0x1800111f0)
- EnterCriticalSection (Address: 0x180011028)
- ExitProcess (Address: 0x1800111f8)
- FindClose (Address: 0x180011250)
- FindFirstFileExW (Address: 0x180011258)
- FindNextFileW (Address: 0x180011260)
- FlsAlloc (Address: 0x1800111c8)
- FlsFree (Address: 0x1800111d8)
- FlsGetValue (Address: 0x180011000)
- FlsSetValue (Address: 0x1800111d0)
- FlushFileBuffers (Address: 0x180011300)
- FlushInstructionCache (Address: 0x180011098)
- FreeEnvironmentStringsW (Address: 0x1800112b0)
- FreeLibrary (Address: 0x1800110f0)
- GetACP (Address: 0x180011270)
- GetCommandLineA (Address: 0x180011288)
- GetCommandLineW (Address: 0x180011290)
- GetConsoleMode (Address: 0x180011190)
- GetConsoleOutputCP (Address: 0x180011310)
- GetCPInfo (Address: 0x180011280)
- GetCurrentProcess (Address: 0x180011068)
- GetCurrentProcessId (Address: 0x180011070)
- GetCurrentThreadId (Address: 0x180011178)
- GetEnvironmentStringsW (Address: 0x1800112a8)
- GetFileType (Address: 0x1800112d8)
- GetLastError (Address: 0x1800111b8)
- GetModuleFileNameA (Address: 0x1800110f8)
- GetModuleFileNameW (Address: 0x180011210)
- GetModuleHandleA (Address: 0x180011100)
- GetModuleHandleExW (Address: 0x180011208)
- GetModuleHandleW (Address: 0x180011108)
- GetOEMCP (Address: 0x180011278)
- GetPrivateProfileIntA (Address: 0x180011120)
- GetProcAddress (Address: 0x180011110)
- GetProcessHeap (Address: 0x1800112c8)
- GetStartupInfoW (Address: 0x180011168)
- GetStdHandle (Address: 0x1800112d0)
- GetStringTypeW (Address: 0x1800112e0)
- GetSystemDirectoryA (Address: 0x1800110b0)
- GetSystemTimeAsFileTime (Address: 0x180011180)
- GetTickCount64 (Address: 0x1800110a8)
- HeapAlloc (Address: 0x180011240)
- HeapFree (Address: 0x180011248)
- HeapReAlloc (Address: 0x1800112f0)
- HeapSize (Address: 0x1800112e8)
- InitializeCriticalSectionAndSpinCount (Address: 0x180011038)
- InitializeCriticalSectionEx (Address: 0x1800111e0)
- InitializeSListHead (Address: 0x180011188)
- InterlockedFlushSList (Address: 0x1800111b0)
- IsDebuggerPresent (Address: 0x180011230)
- IsProcessorFeaturePresent (Address: 0x180011218)
- IsValidCodePage (Address: 0x180011268)
- K32EnumProcessModules (Address: 0x180011128)
- K32GetModuleInformation (Address: 0x180011130)
- LCMapStringW (Address: 0x1800112c0)
- LeaveCriticalSection (Address: 0x180011030)
- LoadLibraryA (Address: 0x180011118)
- LoadLibraryExW (Address: 0x1800112b8)
- MultiByteToWideChar (Address: 0x180011298)
- OpenProcess (Address: 0x1800110a0)
- OpenThread (Address: 0x180011080)
- Process32FirstW (Address: 0x180011140)
- Process32NextW (Address: 0x180011148)
- QueryPerformanceCounter (Address: 0x180011170)
- QueueUserWorkItem (Address: 0x1800110c8)
- RaiseException (Address: 0x1800111a0)
- ResumeThread (Address: 0x180011090)
- RtlCaptureContext (Address: 0x180011220)
- RtlLookupFunctionEntry (Address: 0x1800111e8)
- RtlPcToFileHeader (Address: 0x180011198)
- RtlUnwindEx (Address: 0x1800111a8)
- RtlVirtualUnwind (Address: 0x180011228)
- SetEvent (Address: 0x180011048)
- SetFilePointerEx (Address: 0x180011018)
- SetInformationJobObject (Address: 0x1800110e0)
- SetLastError (Address: 0x1800111c0)
- SetProcessWorkingSetSize (Address: 0x1800110c0)
- SetStdHandle (Address: 0x1800112f8)
- SetUnhandledExceptionFilter (Address: 0x180011160)
- Sleep (Address: 0x180011060)
- SuspendThread (Address: 0x180011088)
- TerminateProcess (Address: 0x180011200)
- Thread32First (Address: 0x180011150)
- Thread32Next (Address: 0x180011158)
- UnhandledExceptionFilter (Address: 0x180011238)
- VirtualProtect (Address: 0x1800110b8)
- WaitForSingleObject (Address: 0x180011050)
- WideCharToMultiByte (Address: 0x1800112a0)
- WriteConsoleW (Address: 0x180011008)
- WriteFile (Address: 0x180011308)
USER32.dll
- DispatchMessageW (Address: 0x180011350)
- GetWindowThreadProcessId (Address: 0x180011340)
- MsgWaitForMultipleObjects (Address: 0x180011348)
- PeekMessageW (Address: 0x180011320)
- RealGetWindowClassW (Address: 0x180011328)
- SetWinEventHook (Address: 0x180011338)
- UnhookWinEvent (Address: 0x180011330)