Windows.System.Profile.SystemManufacturers.dll
Description: Windows.System.Profile.SystemManufacturers
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.5794
Architecture: 64-bit
Operating System: Windows NT
SHA256: 5a1fcfb383e2930552301341577b08cc
File Size: 53.5 KB
Uploaded At: Dec. 1, 2025, 7:44 a.m.
Views: 4
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllGetActivationFactory (Ordinal: 1, Address: 0x1450)
- DllCanUnloadNow (Ordinal: 2, Address: 0x1630)
- DllGetClassObject (Ordinal: 3, Address: 0x16a0)
Imported DLLs & Functions
api-ms-win-appmodel-identity-l1-2-0.dll
- AppContainerDeriveSidFromMoniker (Address: 0x18000a888)
- AppContainerFreeMemory (Address: 0x18000a878)
- AppContainerLookupMoniker (Address: 0x18000a880)
api-ms-win-core-com-l1-1-0.dll
- CoCreateFreeThreadedMarshaler (Address: 0x18000a898)
- CoTaskMemAlloc (Address: 0x18000a8a0)
api-ms-win-core-debug-l1-1-0.dll
- DebugBreak (Address: 0x18000a8b8)
- IsDebuggerPresent (Address: 0x18000a8c0)
- OutputDebugStringW (Address: 0x18000a8b0)
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x18000a8e8)
- SetLastError (Address: 0x18000a8d0)
- SetUnhandledExceptionFilter (Address: 0x18000a8e0)
- UnhandledExceptionFilter (Address: 0x18000a8d8)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x18000a8f8)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x18000a918)
- HeapAlloc (Address: 0x18000a910)
- HeapFree (Address: 0x18000a908)
api-ms-win-core-libraryloader-l1-2-0.dll
- DisableThreadLibraryCalls (Address: 0x18000a940)
- GetModuleFileNameA (Address: 0x18000a938)
- GetModuleHandleExW (Address: 0x18000a950)
- GetModuleHandleW (Address: 0x18000a930)
- GetProcAddress (Address: 0x18000a928)
- LoadStringW (Address: 0x18000a948)
api-ms-win-core-localization-l1-2-0.dll
- FormatMessageW (Address: 0x18000a960)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x18000a980)
- GetCurrentProcessId (Address: 0x18000a990)
- GetCurrentThreadId (Address: 0x18000a988)
- OpenProcessToken (Address: 0x18000a970)
- TerminateProcess (Address: 0x18000a978)
api-ms-win-core-processthreads-l1-1-1.dll
- OpenProcess (Address: 0x18000a9a0)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x18000a9b0)
api-ms-win-core-rtlsupport-l1-1-0.dll
- RtlCaptureContext (Address: 0x18000a9c8)
- RtlLookupFunctionEntry (Address: 0x18000a9c0)
- RtlVirtualUnwind (Address: 0x18000a9d0)
api-ms-win-core-string-l1-1-0.dll
- MultiByteToWideChar (Address: 0x18000a9e0)
api-ms-win-core-string-obsolete-l1-1-0.dll
- lstrcmpiW (Address: 0x18000a9f0)
api-ms-win-core-synch-l1-1-0.dll
- AcquireSRWLockExclusive (Address: 0x18000aa28)
- AcquireSRWLockShared (Address: 0x18000aa40)
- CreateMutexExW (Address: 0x18000aa60)
- CreateSemaphoreExW (Address: 0x18000aa00)
- DeleteCriticalSection (Address: 0x18000aa68)
- EnterCriticalSection (Address: 0x18000aa08)
- InitializeCriticalSectionEx (Address: 0x18000aa18)
- LeaveCriticalSection (Address: 0x18000aa70)
- OpenSemaphoreW (Address: 0x18000aa58)
- ReleaseMutex (Address: 0x18000aa48)
- ReleaseSemaphore (Address: 0x18000aa10)
- ReleaseSRWLockExclusive (Address: 0x18000aa20)
- ReleaseSRWLockShared (Address: 0x18000aa38)
- WaitForSingleObject (Address: 0x18000aa30)
- WaitForSingleObjectEx (Address: 0x18000aa50)
api-ms-win-core-synch-l1-2-0.dll
- InitOnceExecuteOnce (Address: 0x18000aa90)
- Sleep (Address: 0x18000aa80)
- SleepConditionVariableSRW (Address: 0x18000aa98)
- WakeAllConditionVariable (Address: 0x18000aa88)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemTimeAsFileTime (Address: 0x18000aab0)
- GetTickCount (Address: 0x18000aaa8)
api-ms-win-core-sysinfo-l1-2-0.dll
- GetSystemFirmwareTable (Address: 0x18000aac0)
api-ms-win-core-threadpool-l1-2-0.dll
- CloseThreadpoolTimer (Address: 0x18000aae0)
- CreateThreadpoolTimer (Address: 0x18000aad8)
- SetThreadpoolTimer (Address: 0x18000aad0)
- WaitForThreadpoolTimerCallbacks (Address: 0x18000aae8)
api-ms-win-core-util-l1-1-0.dll
- DecodePointer (Address: 0x18000aaf8)
- EncodePointer (Address: 0x18000ab00)
api-ms-win-core-winrt-error-l1-1-0.dll
- RoOriginateError (Address: 0x18000ab18)
- RoOriginateErrorW (Address: 0x18000ab10)
api-ms-win-core-winrt-string-l1-1-0.dll
- HSTRING_UserFree (Address: 0x18000ab58)
- HSTRING_UserFree64 (Address: 0x18000ab48)
- HSTRING_UserMarshal (Address: 0x18000ab80)
- HSTRING_UserMarshal64 (Address: 0x18000ab40)
- HSTRING_UserSize (Address: 0x18000ab30)
- HSTRING_UserSize64 (Address: 0x18000ab60)
- HSTRING_UserUnmarshal (Address: 0x18000ab38)
- HSTRING_UserUnmarshal64 (Address: 0x18000ab28)
- WindowsCreateString (Address: 0x18000ab50)
- WindowsGetStringRawBuffer (Address: 0x18000ab78)
- WindowsIsStringEmpty (Address: 0x18000ab68)
- WindowsStringHasEmbeddedNull (Address: 0x18000ab70)
api-ms-win-devices-query-l1-1-0.dll
- DevFreeObjectProperties (Address: 0x18000ab98)
- DevGetObjectProperties (Address: 0x18000ab90)
api-ms-win-eventing-classicprovider-l1-1-0.dll
- GetTraceEnableFlags (Address: 0x18000abb0)
- GetTraceEnableLevel (Address: 0x18000abb8)
- GetTraceLoggerHandle (Address: 0x18000abc0)
- RegisterTraceGuidsW (Address: 0x18000aba8)
- TraceMessage (Address: 0x18000abc8)
- UnregisterTraceGuids (Address: 0x18000abd0)
api-ms-win-security-base-l1-1-0.dll
- DuplicateToken (Address: 0x18000abf8)
- EqualSid (Address: 0x18000abf0)
- FreeSid (Address: 0x18000abe8)
- GetTokenInformation (Address: 0x18000abe0)
api-ms-win-security-capability-l1-1-0.dll
- CapabilityCheck (Address: 0x18000ac08)
api-ms-win-security-sddl-l1-1-0.dll
- ConvertSidToStringSidW (Address: 0x18000ac20)
- ConvertStringSidToSidW (Address: 0x18000ac18)
combase.dll
- (Address: 0x18000ac30)
- (Address: 0x18000ac48)
- (Address: 0x18000ac70)
- (Address: 0x18000ac78)
- CStdStubBuffer_AddRef (Address: 0x18000ac90)
- CStdStubBuffer_DebugServerQueryInterface (Address: 0x18000ac80)
- CStdStubBuffer_DebugServerRelease (Address: 0x18000ac38)
- CStdStubBuffer_Invoke (Address: 0x18000ac40)
- CStdStubBuffer_IsIIDSupported (Address: 0x18000ac58)
- CStdStubBuffer2_Connect (Address: 0x18000ac60)
- CStdStubBuffer2_CountRefs (Address: 0x18000ac50)
- CStdStubBuffer2_Disconnect (Address: 0x18000ac88)
- CStdStubBuffer2_QueryInterface (Address: 0x18000ac98)
- NdrCStdStubBuffer2_Release (Address: 0x18000ac68)
msvcrt.dll
- __C_specific_handler (Address: 0x18000acf8)
- __CxxFrameHandler3 (Address: 0x18000acf0)
- __dllonexit (Address: 0x18000acd8)
- _amsg_exit (Address: 0x18000acd0)
- _initterm (Address: 0x18000ace8)
- _lock (Address: 0x18000ace0)
- _onexit (Address: 0x18000acb0)
- _purecall (Address: 0x18000acc0)
- _unlock (Address: 0x18000acb8)
- _vsnwprintf (Address: 0x18000ad00)
- _vsnwprintf_s (Address: 0x18000ad08)
- _XcptFilter (Address: 0x18000aca8)
- free (Address: 0x18000ad18)
- malloc (Address: 0x18000ad10)
- memcmp (Address: 0x18000acc8)
- memcpy_s (Address: 0x18000ad20)
- memmove_s (Address: 0x18000ad28)
- memset (Address: 0x18000ad30)
ntdll.dll
- RtlAllocateHeap (Address: 0x18000ad60)
- RtlFreeHeap (Address: 0x18000ad58)
- RtlFreeSid (Address: 0x18000ad40)
- RtlGetAppContainerParent (Address: 0x18000ad50)
- RtlGetAppContainerSidType (Address: 0x18000ad48)
- RtlNtStatusToDosError (Address: 0x18000ad68)
RPCRT4.dll
- IUnknown_AddRef_Proxy (Address: 0x18000a838)
- IUnknown_QueryInterface_Proxy (Address: 0x18000a858)
- IUnknown_Release_Proxy (Address: 0x18000a848)
- NdrDllCanUnloadNow (Address: 0x18000a828)
- NdrDllGetClassObject (Address: 0x18000a820)
- NdrOleAllocate (Address: 0x18000a850)
- NdrOleFree (Address: 0x18000a840)
- NdrStubCall3 (Address: 0x18000a860)
- NdrStubForwardingFunction (Address: 0x18000a830)
- RpcServerInqCallAttributesW (Address: 0x18000a868)