mscordbi.dll

Description: Microsoft .NET Runtime Debugging Services

Authors: © Microsoft Corporation. All rights reserved.

Version: 4.8.9310.0

Architecture: 32-bit

Operating System: Windows

SHA256: 6205013544452d057f94c2254796c7a1

File Size: 1.2 MB

Uploaded At: Dec. 1, 2025, 7:19 a.m.

Views: 28

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory, OpenProcess

Exported Functions

  • CreateCordbObject (Ordinal: 1, Address: 0x1e690)
  • DllGetClassObjectInternal (Ordinal: 2, Address: 0x1e6c0)
  • OpenVirtualProcess2 (Ordinal: 3, Address: 0x1ecf0)
  • OpenVirtualProcess (Ordinal: 4, Address: 0x1ed40)
  • OpenVirtualProcessImpl (Ordinal: 5, Address: 0x1ea60)

Imported DLLs & Functions

ADVAPI32.dll
  • AdjustTokenPrivileges (Address: 0x1011e03c)
  • CopySid (Address: 0x1011e00c)
  • DeregisterEventSource (Address: 0x1011e048)
  • EqualSid (Address: 0x1011e004)
  • EventWrite (Address: 0x1011e02c)
  • GetKernelObjectSecurity (Address: 0x1011e014)
  • GetLengthSid (Address: 0x1011e01c)
  • GetSecurityDescriptorOwner (Address: 0x1011e010)
  • GetSidSubAuthority (Address: 0x1011e018)
  • GetSidSubAuthorityCount (Address: 0x1011e050)
  • GetTokenInformation (Address: 0x1011e028)
  • LookupPrivilegeValueW (Address: 0x1011e044)
  • OpenProcessToken (Address: 0x1011e040)
  • OpenThreadToken (Address: 0x1011e024)
  • RegCloseKey (Address: 0x1011e030)
  • RegisterEventSourceW (Address: 0x1011e000)
  • RegOpenKeyExW (Address: 0x1011e034)
  • RegQueryValueExW (Address: 0x1011e038)
  • ReportEventW (Address: 0x1011e008)
  • RevertToSelf (Address: 0x1011e04c)
  • SetThreadToken (Address: 0x1011e020)
KERNEL32.dll
  • ActivateActCtx (Address: 0x1011e160)
  • CloseHandle (Address: 0x1011e23c)
  • ContinueDebugEvent (Address: 0x1011e258)
  • CreateActCtxW (Address: 0x1011e15c)
  • CreateEventW (Address: 0x1011e234)
  • CreateFileMappingW (Address: 0x1011e074)
  • CreateFileW (Address: 0x1011e06c)
  • CreateMutexW (Address: 0x1011e134)
  • CreateProcessW (Address: 0x1011e118)
  • CreateSemaphoreW (Address: 0x1011e148)
  • CreateThread (Address: 0x1011e208)
  • CreateToolhelp32Snapshot (Address: 0x1011e084)
  • DeactivateActCtx (Address: 0x1011e168)
  • DebugActiveProcess (Address: 0x1011e0a0)
  • DebugBreak (Address: 0x1011e0dc)
  • DecodePointer (Address: 0x1011e17c)
  • DeleteCriticalSection (Address: 0x1011e24c)
  • DuplicateHandle (Address: 0x1011e20c)
  • EncodePointer (Address: 0x1011e178)
  • EnterCriticalSection (Address: 0x1011e240)
  • ExitProcess (Address: 0x1011e198)
  • FindClose (Address: 0x1011e0f0)
  • FindFirstFileExA (Address: 0x1011e1c4)
  • FindNextFileA (Address: 0x1011e1c8)
  • FlushFileBuffers (Address: 0x1011e1b0)
  • FlushInstructionCache (Address: 0x1011e21c)
  • FormatMessageW (Address: 0x1011e108)
  • FreeEnvironmentStringsW (Address: 0x1011e0e4)
  • FreeLibrary (Address: 0x1011e05c)
  • GetACP (Address: 0x1011e104)
  • GetCommandLineA (Address: 0x1011e1d4)
  • GetCommandLineW (Address: 0x1011e1d8)
  • GetConsoleCP (Address: 0x1011e1b8)
  • GetConsoleMode (Address: 0x1011e1bc)
  • GetCPInfo (Address: 0x1011e100)
  • GetCurrentProcess (Address: 0x1011e220)
  • GetCurrentProcessId (Address: 0x1011e0ac)
  • GetCurrentThread (Address: 0x1011e0f8)
  • GetCurrentThreadId (Address: 0x1011e224)
  • GetEnvironmentStringsW (Address: 0x1011e0e8)
  • GetEnvironmentVariableW (Address: 0x1011e0e0)
  • GetFileAttributesExW (Address: 0x1011e1f8)
  • GetFileSize (Address: 0x1011e070)
  • GetFileType (Address: 0x1011e1a8)
  • GetLastError (Address: 0x1011e22c)
  • GetModuleFileNameA (Address: 0x1011e1a0)
  • GetModuleFileNameW (Address: 0x1011e098)
  • GetModuleHandleExW (Address: 0x1011e19c)
  • GetModuleHandleW (Address: 0x1011e218)
  • GetOEMCP (Address: 0x1011e1d0)
  • GetProcAddress (Address: 0x1011e250)
  • GetProcessHeap (Address: 0x1011e0c8)
  • GetStartupInfoW (Address: 0x1011e194)
  • GetStdHandle (Address: 0x1011e1a4)
  • GetStringTypeW (Address: 0x1011e1ac)
  • GetSystemInfo (Address: 0x1011e0d0)
  • GetSystemTimeAsFileTime (Address: 0x1011e0bc)
  • GetThreadContext (Address: 0x1011e204)
  • GetWindowsDirectoryW (Address: 0x1011e16c)
  • HeapAlloc (Address: 0x1011e0c4)
  • HeapCreate (Address: 0x1011e11c)
  • HeapDestroy (Address: 0x1011e144)
  • HeapFree (Address: 0x1011e0c0)
  • HeapReAlloc (Address: 0x1011e1ec)
  • HeapSize (Address: 0x1011e1e8)
  • HeapValidate (Address: 0x1011e138)
  • InitializeCriticalSection (Address: 0x1011e238)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1011e1c0)
  • InitializeSListHead (Address: 0x1011e190)
  • InterlockedFlushSList (Address: 0x1011e1f0)
  • IsDBCSLeadByte (Address: 0x1011e10c)
  • IsDebuggerPresent (Address: 0x1011e174)
  • IsProcessorFeaturePresent (Address: 0x1011e188)
  • IsValidCodePage (Address: 0x1011e1cc)
  • IsWow64Process (Address: 0x1011e0b0)
  • LCMapStringW (Address: 0x1011e114)
  • LeaveCriticalSection (Address: 0x1011e244)
  • LoadLibraryExW (Address: 0x1011e058)
  • LocalFree (Address: 0x1011e110)
  • MapViewOfFile (Address: 0x1011e078)
  • Module32FirstW (Address: 0x1011e090)
  • Module32NextW (Address: 0x1011e094)
  • MultiByteToWideChar (Address: 0x1011e0f4)
  • OpenFileMappingW (Address: 0x1011e1f4)
  • OpenProcess (Address: 0x1011e060)
  • OpenThread (Address: 0x1011e0a8)
  • OutputDebugStringW (Address: 0x1011e0d8)
  • QueryPerformanceCounter (Address: 0x1011e18c)
  • RaiseException (Address: 0x1011e0cc)
  • ReadFile (Address: 0x1011e200)
  • ReadProcessMemory (Address: 0x1011e068)
  • ReleaseActCtx (Address: 0x1011e170)
  • ReleaseMutex (Address: 0x1011e064)
  • ReleaseSemaphore (Address: 0x1011e25c)
  • ResetEvent (Address: 0x1011e228)
  • ResumeThread (Address: 0x1011e210)
  • SetErrorMode (Address: 0x1011e260)
  • SetEvent (Address: 0x1011e230)
  • SetFilePointer (Address: 0x1011e1fc)
  • SetFilePointerEx (Address: 0x1011e1e0)
  • SetLastError (Address: 0x1011e0b8)
  • SetStdHandle (Address: 0x1011e1dc)
  • SetThreadContext (Address: 0x1011e12c)
  • SetUnhandledExceptionFilter (Address: 0x1011e184)
  • Sleep (Address: 0x1011e080)
  • SleepEx (Address: 0x1011e14c)
  • SuspendThread (Address: 0x1011e214)
  • SwitchToThread (Address: 0x1011e0fc)
  • TerminateProcess (Address: 0x1011e164)
  • Thread32First (Address: 0x1011e088)
  • Thread32Next (Address: 0x1011e08c)
  • TlsAlloc (Address: 0x1011e140)
  • TlsFree (Address: 0x1011e154)
  • TlsGetValue (Address: 0x1011e150)
  • TlsSetValue (Address: 0x1011e120)
  • UnhandledExceptionFilter (Address: 0x1011e180)
  • UnmapViewOfFile (Address: 0x1011e07c)
  • VerifyVersionInfoW (Address: 0x1011e0d4)
  • VirtualAlloc (Address: 0x1011e130)
  • VirtualFree (Address: 0x1011e128)
  • VirtualProtect (Address: 0x1011e124)
  • VirtualQuery (Address: 0x1011e158)
  • VirtualQueryEx (Address: 0x1011e09c)
  • WaitForDebugEvent (Address: 0x1011e0a4)
  • WaitForMultipleObjectsEx (Address: 0x1011e248)
  • WaitForSingleObject (Address: 0x1011e254)
  • WaitForSingleObjectEx (Address: 0x1011e13c)
  • WideCharToMultiByte (Address: 0x1011e0ec)
  • WriteConsoleW (Address: 0x1011e1e4)
  • WriteFile (Address: 0x1011e1b4)
  • WriteProcessMemory (Address: 0x1011e0b4)
ntdll.dll
  • RtlUnwind (Address: 0x1011e294)
  • VerSetConditionMask (Address: 0x1011e298)
ole32.dll
  • CoCreateFreeThreadedMarshaler (Address: 0x1011e2ac)
  • CoCreateGuid (Address: 0x1011e2b0)
  • CoTaskMemAlloc (Address: 0x1011e2b4)
  • CoTaskMemFree (Address: 0x1011e2a4)
  • CreateStreamOnHGlobal (Address: 0x1011e2a8)
  • IIDFromString (Address: 0x1011e2a0)
OLEAUT32.dll
  • CreateErrorInfo (Address: 0x1011e270)
  • SetErrorInfo (Address: 0x1011e26c)
  • VariantInit (Address: 0x1011e268)
USER32.dll
  • GetProcessWindowStation (Address: 0x1011e27c)
  • GetUserObjectInformationW (Address: 0x1011e278)
  • LoadStringW (Address: 0x1011e280)
WTSAPI32.dll
  • WTSEnumerateProcessesW (Address: 0x1011e28c)
  • WTSFreeMemory (Address: 0x1011e288)