ISMCFileHook64.dll
Description: Client Hook DLL
Authors: Copyright (C) 2020 QualitySoft Corporation All Rights Reserved.
Version: 7.4.1.4
Architecture: 64-bit
Operating System: Windows
SHA256: 7eea3d1df7729aab7a99e20436f06bc4
File Size: 248.3 KB
Uploaded At: April 15, 2026, 11:44 a.m.
Views: 14
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, OpenProcess, WriteProcessMemory
Exported Functions
No exported functions.
Imported DLLs & Functions
ADVAPI32.dll
- AddAccessAllowedAce (Address: 0x180029000)
- AllocateAndInitializeSid (Address: 0x180029048)
- FreeSid (Address: 0x180029038)
- GetLengthSid (Address: 0x180029030)
- GetTokenInformation (Address: 0x180029068)
- InitializeAcl (Address: 0x180029050)
- InitializeSecurityDescriptor (Address: 0x180029060)
- LookupAccountSidW (Address: 0x180029018)
- OpenProcessToken (Address: 0x180029040)
- RegCloseKey (Address: 0x180029008)
- RegOpenKeyExW (Address: 0x180029010)
- RegQueryValueExW (Address: 0x180029020)
- SetSecurityDescriptorDacl (Address: 0x180029058)
- SetSecurityDescriptorSacl (Address: 0x180029028)
GDI32.dll
- StartDocW (Address: 0x180029078)
KERNEL32.dll
- CloseHandle (Address: 0x1800290c8)
- CopyFileA (Address: 0x180029178)
- CopyFileExA (Address: 0x1800291c0)
- CopyFileExW (Address: 0x1800290f8)
- CopyFileW (Address: 0x180029148)
- CreateFileA (Address: 0x1800290f0)
- CreateFileMappingW (Address: 0x1800292e8)
- CreateFileW (Address: 0x180029098)
- CreateMutexW (Address: 0x1800291f8)
- CreateProcessA (Address: 0x180029150)
- CreateProcessW (Address: 0x180029108)
- CreateToolhelp32Snapshot (Address: 0x180029190)
- DecodePointer (Address: 0x180029410)
- DeleteCriticalSection (Address: 0x1800292a8)
- DeleteFileA (Address: 0x1800291c8)
- DeleteFileW (Address: 0x1800290d0)
- EncodePointer (Address: 0x180029408)
- EnterCriticalSection (Address: 0x180029280)
- ExitProcess (Address: 0x1800293f0)
- FindClose (Address: 0x1800290b8)
- FindFirstFileW (Address: 0x180029200)
- FlsAlloc (Address: 0x180029428)
- FlsFree (Address: 0x180029420)
- FlsGetValue (Address: 0x180029418)
- FlsSetValue (Address: 0x1800293d8)
- FlushFileBuffers (Address: 0x180029368)
- FlushInstructionCache (Address: 0x1800291e0)
- FormatMessageW (Address: 0x1800292d0)
- FreeEnvironmentStringsA (Address: 0x1800294a0)
- FreeEnvironmentStringsW (Address: 0x1800294b0)
- FreeLibrary (Address: 0x180029338)
- GetACP (Address: 0x180029438)
- GetCommandLineA (Address: 0x1800293e0)
- GetConsoleCP (Address: 0x180029378)
- GetConsoleMode (Address: 0x180029370)
- GetConsoleOutputCP (Address: 0x180029358)
- GetCPInfo (Address: 0x180029430)
- GetCurrentDirectoryW (Address: 0x180029270)
- GetCurrentProcess (Address: 0x180029210)
- GetCurrentProcessId (Address: 0x1800291a0)
- GetCurrentThreadId (Address: 0x180029198)
- GetEnvironmentStrings (Address: 0x1800294a8)
- GetEnvironmentStringsW (Address: 0x1800294b8)
- GetFileType (Address: 0x180029490)
- GetLastError (Address: 0x1800290a0)
- GetLocaleInfoA (Address: 0x180029340)
- GetLongPathNameW (Address: 0x1800290a8)
- GetModuleFileNameA (Address: 0x180029400)
- GetModuleFileNameW (Address: 0x180029258)
- GetModuleHandleW (Address: 0x180029130)
- GetOEMCP (Address: 0x180029440)
- GetProcAddress (Address: 0x1800290b0)
- GetProcessId (Address: 0x180029290)
- GetStartupInfoA (Address: 0x180029498)
- GetStdHandle (Address: 0x1800293f8)
- GetStringTypeA (Address: 0x180029328)
- GetStringTypeW (Address: 0x180029320)
- GetSystemInfo (Address: 0x180029318)
- GetSystemTime (Address: 0x1800290e0)
- GetSystemTimeAsFileTime (Address: 0x1800294d0)
- GetThreadContext (Address: 0x1800291d0)
- GetTickCount (Address: 0x1800294c8)
- GetVersionExW (Address: 0x180029090)
- HeapAlloc (Address: 0x180029110)
- HeapCreate (Address: 0x180029250)
- HeapDestroy (Address: 0x180029240)
- HeapFree (Address: 0x180029120)
- HeapReAlloc (Address: 0x1800290e8)
- HeapSetInformation (Address: 0x1800293e8)
- HeapSize (Address: 0x180029450)
- InitializeCriticalSection (Address: 0x180029228)
- InitializeCriticalSectionAndSpinCount (Address: 0x180029388)
- IsDebuggerPresent (Address: 0x1800293b8)
- IsValidCodePage (Address: 0x180029448)
- LCMapStringA (Address: 0x180029460)
- LCMapStringW (Address: 0x180029470)
- LeaveCriticalSection (Address: 0x180029248)
- LoadLibraryA (Address: 0x180029390)
- LoadLibraryW (Address: 0x180029088)
- LocalAlloc (Address: 0x1800290c0)
- LocalFree (Address: 0x1800290d8)
- lstrlenW (Address: 0x180029398)
- MapViewOfFile (Address: 0x1800292d8)
- MoveFileA (Address: 0x180029188)
- MoveFileExA (Address: 0x180029100)
- MoveFileExW (Address: 0x180029118)
- MoveFileW (Address: 0x180029170)
- MoveFileWithProgressA (Address: 0x180029128)
- MoveFileWithProgressW (Address: 0x1800291a8)
- MultiByteToWideChar (Address: 0x180029260)
- OpenFileMappingW (Address: 0x1800292f0)
- OpenMutexW (Address: 0x180029268)
- OpenProcess (Address: 0x180029238)
- OpenThread (Address: 0x180029180)
- Process32FirstW (Address: 0x180029288)
- Process32NextW (Address: 0x1800292a0)
- ProcessIdToSessionId (Address: 0x180029298)
- QueryPerformanceCounter (Address: 0x1800294c0)
- RaiseException (Address: 0x180029478)
- ReleaseMutex (Address: 0x1800292b0)
- ReplaceFileA (Address: 0x180029168)
- ReplaceFileW (Address: 0x180029158)
- ResumeThread (Address: 0x1800291b8)
- RtlCaptureContext (Address: 0x1800293d0)
- RtlLookupFunctionEntry (Address: 0x1800293c8)
- RtlPcToFileHeader (Address: 0x180029480)
- RtlUnwindEx (Address: 0x180029458)
- RtlVirtualUnwind (Address: 0x1800293c0)
- SetFilePointer (Address: 0x180029380)
- SetHandleCount (Address: 0x180029488)
- SetHandleInformation (Address: 0x180029218)
- SetLastError (Address: 0x180029278)
- SetStdHandle (Address: 0x180029348)
- SetThreadContext (Address: 0x1800291d8)
- SetUnhandledExceptionFilter (Address: 0x1800293b0)
- Sleep (Address: 0x1800292c8)
- SuspendThread (Address: 0x1800291b0)
- SystemTimeToFileTime (Address: 0x180029330)
- TerminateProcess (Address: 0x1800293a0)
- Thread32First (Address: 0x180029140)
- Thread32Next (Address: 0x180029160)
- TlsAlloc (Address: 0x1800292b8)
- TlsFree (Address: 0x1800292c0)
- TlsGetValue (Address: 0x180029208)
- TlsSetValue (Address: 0x180029230)
- UnhandledExceptionFilter (Address: 0x1800293a8)
- UnmapViewOfFile (Address: 0x1800292e0)
- VirtualAlloc (Address: 0x180029310)
- VirtualAllocEx (Address: 0x1800291e8)
- VirtualFree (Address: 0x180029308)
- VirtualProtect (Address: 0x1800292f8)
- VirtualQuery (Address: 0x180029300)
- WaitForSingleObject (Address: 0x180029220)
- WideCharToMultiByte (Address: 0x180029468)
- WriteConsoleA (Address: 0x180029350)
- WriteConsoleW (Address: 0x180029360)
- WriteFile (Address: 0x180029138)
- WriteProcessMemory (Address: 0x1800291f0)
MPR.dll
- WNetGetUniversalNameW (Address: 0x1800294e0)
ole32.dll
- CoCreateInstance (Address: 0x180029590)
- CoCreateInstanceEx (Address: 0x180029598)
- CoGetClassObject (Address: 0x180029580)
- CoTaskMemFree (Address: 0x180029588)
SHELL32.dll
- SHGetSpecialFolderPathW (Address: 0x1800294f0)
SHLWAPI.dll
- (Address: 0x180029528)
- PathCombineW (Address: 0x180029530)
- PathFileExistsW (Address: 0x180029540)
- PathFindExtensionW (Address: 0x180029500)
- PathFindFileNameW (Address: 0x180029508)
- PathIsDirectoryW (Address: 0x180029518)
- PathRemoveExtensionW (Address: 0x180029538)
- PathRemoveFileSpecW (Address: 0x180029510)
- PathSearchAndQualifyW (Address: 0x180029520)
USER32.dll
- LoadStringW (Address: 0x180029550)
VERSION.dll
- GetFileVersionInfoSizeW (Address: 0x180029560)
- GetFileVersionInfoW (Address: 0x180029570)
- VerQueryValueW (Address: 0x180029568)