FileTracker.dll
Description: FileTracker
Authors: © Microsoft Corporation. All rights reserved.
Version: 14.8.9037.0
Architecture: 32-bit
Operating System: Windows
SHA256: c701ae5652fe7ac6d70e882523ed0f98
File Size: 224.4 KB
Uploaded At: Dec. 1, 2025, 7:19 a.m.
Views: 17
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, VirtualAllocEx
Exported Functions
- TrackerExportOne (Ordinal: 1, Address: 0xf470)
- StartTrackingContext (Ordinal: 2, Address: 0xf480)
- StartTrackingContextWithRoot (Ordinal: 3, Address: 0xf520)
- EndTrackingContext (Ordinal: 4, Address: 0xf5b0)
- StopTrackingAndCleanup (Ordinal: 5, Address: 0xf5f0)
- SuspendTracking (Ordinal: 6, Address: 0xf630)
- ResumeTracking (Ordinal: 7, Address: 0xf660)
- WriteAllTLogs (Ordinal: 8, Address: 0xf6a0)
- WriteContextTLogs (Ordinal: 9, Address: 0xf730)
- SetThreadCount (Ordinal: 10, Address: 0xf800)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x10034110)
- CompareFileTime (Address: 0x10034130)
- CopyFileA (Address: 0x1003402c)
- CopyFileExA (Address: 0x10034034)
- CopyFileExW (Address: 0x10034038)
- CopyFileW (Address: 0x10034030)
- CreateDirectoryA (Address: 0x1003406c)
- CreateDirectoryW (Address: 0x10034068)
- CreateEventW (Address: 0x1003410c)
- CreateFileA (Address: 0x10034024)
- CreateFileW (Address: 0x10034028)
- CreateHardLinkA (Address: 0x1003403c)
- CreateHardLinkW (Address: 0x10034040)
- CreateProcessA (Address: 0x10034044)
- CreateProcessW (Address: 0x10034048)
- CreateThread (Address: 0x1003404c)
- DecodePointer (Address: 0x10034138)
- DeleteCriticalSection (Address: 0x100340fc)
- DeleteFileA (Address: 0x10034074)
- DeleteFileW (Address: 0x10034070)
- DisableThreadLibraryCalls (Address: 0x10034080)
- EncodePointer (Address: 0x10034174)
- EnterCriticalSection (Address: 0x1003401c)
- ExitProcess (Address: 0x1003407c)
- FindClose (Address: 0x100341a4)
- FindFirstFileExA (Address: 0x100341a8)
- FindFirstFileW (Address: 0x10034214)
- FindNextFileA (Address: 0x100341ac)
- FindNextFileW (Address: 0x100341b0)
- FindResourceExW (Address: 0x100340bc)
- FindResourceW (Address: 0x100340b8)
- FlushFileBuffers (Address: 0x1003418c)
- FlushInstructionCache (Address: 0x100341fc)
- FormatMessageW (Address: 0x10034220)
- FreeEnvironmentStringsA (Address: 0x100340f8)
- FreeEnvironmentStringsW (Address: 0x100340ec)
- FreeLibrary (Address: 0x1003417c)
- GetACP (Address: 0x10034188)
- GetCommandLineA (Address: 0x100341c0)
- GetCommandLineW (Address: 0x100340dc)
- GetConsoleCP (Address: 0x10034190)
- GetConsoleMode (Address: 0x10034194)
- GetConsoleOutputCP (Address: 0x10034228)
- GetCPInfo (Address: 0x100341bc)
- GetCurrentProcess (Address: 0x10034154)
- GetCurrentProcessId (Address: 0x10034088)
- GetCurrentThread (Address: 0x100340a8)
- GetCurrentThreadId (Address: 0x100340c8)
- GetEnvironmentStrings (Address: 0x100340f4)
- GetEnvironmentStringsW (Address: 0x100340e8)
- GetEnvironmentVariableA (Address: 0x100340f0)
- GetEnvironmentVariableW (Address: 0x10034018)
- GetFileAttributesA (Address: 0x10034054)
- GetFileAttributesExA (Address: 0x1003405c)
- GetFileAttributesExW (Address: 0x10034058)
- GetFileAttributesW (Address: 0x10034050)
- GetFileType (Address: 0x10034094)
- GetFullPathNameW (Address: 0x10034218)
- GetLastError (Address: 0x10034090)
- GetLocaleInfoW (Address: 0x1003419c)
- GetModuleFileNameA (Address: 0x100340e4)
- GetModuleFileNameW (Address: 0x100340a4)
- GetModuleHandleA (Address: 0x10034210)
- GetModuleHandleExW (Address: 0x10034184)
- GetModuleHandleW (Address: 0x10034148)
- GetOEMCP (Address: 0x100341b8)
- GetProcAddress (Address: 0x10034108)
- GetProcessHeap (Address: 0x10034014)
- GetProcessId (Address: 0x1003409c)
- GetStartupInfoW (Address: 0x10034164)
- GetStdHandle (Address: 0x100341a0)
- GetStringTypeW (Address: 0x100341c4)
- GetSystemTimeAsFileTime (Address: 0x10034120)
- GetThreadContext (Address: 0x100341f4)
- GetTickCount (Address: 0x10034200)
- GetUserDefaultUILanguage (Address: 0x10034224)
- HeapAlloc (Address: 0x10034010)
- HeapDestroy (Address: 0x10034000)
- HeapFree (Address: 0x1003400c)
- HeapReAlloc (Address: 0x10034008)
- HeapSize (Address: 0x10034004)
- InitializeCriticalSection (Address: 0x100340d8)
- InitializeCriticalSectionAndSpinCount (Address: 0x10034140)
- InitializeCriticalSectionEx (Address: 0x10034134)
- InitializeSListHead (Address: 0x1003415c)
- InterlockedCompareExchange (Address: 0x100341ec)
- InterlockedFlushSList (Address: 0x1003416c)
- IsDebuggerPresent (Address: 0x10034160)
- IsProcessorFeaturePresent (Address: 0x10034158)
- IsValidCodePage (Address: 0x100341b4)
- LCMapStringW (Address: 0x10034198)
- LeaveCriticalSection (Address: 0x10034020)
- LoadLibraryExW (Address: 0x10034180)
- LoadLibraryW (Address: 0x100340a0)
- LoadResource (Address: 0x100340b4)
- LocalFree (Address: 0x1003421c)
- LockResource (Address: 0x100340b0)
- MultiByteToWideChar (Address: 0x10034100)
- OutputDebugStringW (Address: 0x100341d4)
- QueryPerformanceCounter (Address: 0x100340cc)
- QueryPerformanceFrequency (Address: 0x100340d0)
- RaiseException (Address: 0x10034170)
- ReadConsoleW (Address: 0x1003413c)
- ReadFile (Address: 0x10034128)
- ReadProcessMemory (Address: 0x100341e4)
- RemoveDirectoryA (Address: 0x10034064)
- RemoveDirectoryW (Address: 0x10034060)
- ResetEvent (Address: 0x10034118)
- ResumeThread (Address: 0x1003408c)
- RtlUnwind (Address: 0x10034168)
- SetDllDirectoryW (Address: 0x100340e0)
- SetEndOfFile (Address: 0x1003422c)
- SetEnvironmentVariableW (Address: 0x10034084)
- SetEvent (Address: 0x1003411c)
- SetFilePointer (Address: 0x1003412c)
- SetFilePointerEx (Address: 0x100341cc)
- SetLastError (Address: 0x10034098)
- SetStdHandle (Address: 0x100341c8)
- SetThreadContext (Address: 0x100341f8)
- SetUnhandledExceptionFilter (Address: 0x10034150)
- SizeofResource (Address: 0x100340ac)
- SuspendThread (Address: 0x100341f0)
- TerminateProcess (Address: 0x10034078)
- TlsAlloc (Address: 0x100340d4)
- TlsFree (Address: 0x10034178)
- TlsGetValue (Address: 0x100340c0)
- TlsSetValue (Address: 0x100340c4)
- UnhandledExceptionFilter (Address: 0x1003414c)
- VirtualAlloc (Address: 0x10034204)
- VirtualAllocEx (Address: 0x100341d8)
- VirtualProtect (Address: 0x10034208)
- VirtualProtectEx (Address: 0x100341dc)
- VirtualQuery (Address: 0x1003420c)
- VirtualQueryEx (Address: 0x100341e0)
- WaitForSingleObject (Address: 0x10034114)
- WaitForSingleObjectEx (Address: 0x10034144)
- WideCharToMultiByte (Address: 0x10034104)
- WriteConsoleW (Address: 0x100341d0)
- WriteFile (Address: 0x10034124)
- WriteProcessMemory (Address: 0x100341e8)