ISMCFileHook64.dll

Description: Client Hook DLL

Authors: Copyright (C) 2020 QualitySoft Corporation All Rights Reserved.

Version: 7.4.1.4

Architecture: 64-bit

Operating System: Windows

SHA256: 7eea3d1df7729aab7a99e20436f06bc4

File Size: 248.3 KB

Uploaded At: April 15, 2026, 11:44 a.m.

Views: 14

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: VirtualAllocEx, OpenProcess, WriteProcessMemory

Exported Functions

No exported functions.

Imported DLLs & Functions

ADVAPI32.dll
  • AddAccessAllowedAce (Address: 0x180029000)
  • AllocateAndInitializeSid (Address: 0x180029048)
  • FreeSid (Address: 0x180029038)
  • GetLengthSid (Address: 0x180029030)
  • GetTokenInformation (Address: 0x180029068)
  • InitializeAcl (Address: 0x180029050)
  • InitializeSecurityDescriptor (Address: 0x180029060)
  • LookupAccountSidW (Address: 0x180029018)
  • OpenProcessToken (Address: 0x180029040)
  • RegCloseKey (Address: 0x180029008)
  • RegOpenKeyExW (Address: 0x180029010)
  • RegQueryValueExW (Address: 0x180029020)
  • SetSecurityDescriptorDacl (Address: 0x180029058)
  • SetSecurityDescriptorSacl (Address: 0x180029028)
GDI32.dll
  • StartDocW (Address: 0x180029078)
KERNEL32.dll
  • CloseHandle (Address: 0x1800290c8)
  • CopyFileA (Address: 0x180029178)
  • CopyFileExA (Address: 0x1800291c0)
  • CopyFileExW (Address: 0x1800290f8)
  • CopyFileW (Address: 0x180029148)
  • CreateFileA (Address: 0x1800290f0)
  • CreateFileMappingW (Address: 0x1800292e8)
  • CreateFileW (Address: 0x180029098)
  • CreateMutexW (Address: 0x1800291f8)
  • CreateProcessA (Address: 0x180029150)
  • CreateProcessW (Address: 0x180029108)
  • CreateToolhelp32Snapshot (Address: 0x180029190)
  • DecodePointer (Address: 0x180029410)
  • DeleteCriticalSection (Address: 0x1800292a8)
  • DeleteFileA (Address: 0x1800291c8)
  • DeleteFileW (Address: 0x1800290d0)
  • EncodePointer (Address: 0x180029408)
  • EnterCriticalSection (Address: 0x180029280)
  • ExitProcess (Address: 0x1800293f0)
  • FindClose (Address: 0x1800290b8)
  • FindFirstFileW (Address: 0x180029200)
  • FlsAlloc (Address: 0x180029428)
  • FlsFree (Address: 0x180029420)
  • FlsGetValue (Address: 0x180029418)
  • FlsSetValue (Address: 0x1800293d8)
  • FlushFileBuffers (Address: 0x180029368)
  • FlushInstructionCache (Address: 0x1800291e0)
  • FormatMessageW (Address: 0x1800292d0)
  • FreeEnvironmentStringsA (Address: 0x1800294a0)
  • FreeEnvironmentStringsW (Address: 0x1800294b0)
  • FreeLibrary (Address: 0x180029338)
  • GetACP (Address: 0x180029438)
  • GetCommandLineA (Address: 0x1800293e0)
  • GetConsoleCP (Address: 0x180029378)
  • GetConsoleMode (Address: 0x180029370)
  • GetConsoleOutputCP (Address: 0x180029358)
  • GetCPInfo (Address: 0x180029430)
  • GetCurrentDirectoryW (Address: 0x180029270)
  • GetCurrentProcess (Address: 0x180029210)
  • GetCurrentProcessId (Address: 0x1800291a0)
  • GetCurrentThreadId (Address: 0x180029198)
  • GetEnvironmentStrings (Address: 0x1800294a8)
  • GetEnvironmentStringsW (Address: 0x1800294b8)
  • GetFileType (Address: 0x180029490)
  • GetLastError (Address: 0x1800290a0)
  • GetLocaleInfoA (Address: 0x180029340)
  • GetLongPathNameW (Address: 0x1800290a8)
  • GetModuleFileNameA (Address: 0x180029400)
  • GetModuleFileNameW (Address: 0x180029258)
  • GetModuleHandleW (Address: 0x180029130)
  • GetOEMCP (Address: 0x180029440)
  • GetProcAddress (Address: 0x1800290b0)
  • GetProcessId (Address: 0x180029290)
  • GetStartupInfoA (Address: 0x180029498)
  • GetStdHandle (Address: 0x1800293f8)
  • GetStringTypeA (Address: 0x180029328)
  • GetStringTypeW (Address: 0x180029320)
  • GetSystemInfo (Address: 0x180029318)
  • GetSystemTime (Address: 0x1800290e0)
  • GetSystemTimeAsFileTime (Address: 0x1800294d0)
  • GetThreadContext (Address: 0x1800291d0)
  • GetTickCount (Address: 0x1800294c8)
  • GetVersionExW (Address: 0x180029090)
  • HeapAlloc (Address: 0x180029110)
  • HeapCreate (Address: 0x180029250)
  • HeapDestroy (Address: 0x180029240)
  • HeapFree (Address: 0x180029120)
  • HeapReAlloc (Address: 0x1800290e8)
  • HeapSetInformation (Address: 0x1800293e8)
  • HeapSize (Address: 0x180029450)
  • InitializeCriticalSection (Address: 0x180029228)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180029388)
  • IsDebuggerPresent (Address: 0x1800293b8)
  • IsValidCodePage (Address: 0x180029448)
  • LCMapStringA (Address: 0x180029460)
  • LCMapStringW (Address: 0x180029470)
  • LeaveCriticalSection (Address: 0x180029248)
  • LoadLibraryA (Address: 0x180029390)
  • LoadLibraryW (Address: 0x180029088)
  • LocalAlloc (Address: 0x1800290c0)
  • LocalFree (Address: 0x1800290d8)
  • lstrlenW (Address: 0x180029398)
  • MapViewOfFile (Address: 0x1800292d8)
  • MoveFileA (Address: 0x180029188)
  • MoveFileExA (Address: 0x180029100)
  • MoveFileExW (Address: 0x180029118)
  • MoveFileW (Address: 0x180029170)
  • MoveFileWithProgressA (Address: 0x180029128)
  • MoveFileWithProgressW (Address: 0x1800291a8)
  • MultiByteToWideChar (Address: 0x180029260)
  • OpenFileMappingW (Address: 0x1800292f0)
  • OpenMutexW (Address: 0x180029268)
  • OpenProcess (Address: 0x180029238)
  • OpenThread (Address: 0x180029180)
  • Process32FirstW (Address: 0x180029288)
  • Process32NextW (Address: 0x1800292a0)
  • ProcessIdToSessionId (Address: 0x180029298)
  • QueryPerformanceCounter (Address: 0x1800294c0)
  • RaiseException (Address: 0x180029478)
  • ReleaseMutex (Address: 0x1800292b0)
  • ReplaceFileA (Address: 0x180029168)
  • ReplaceFileW (Address: 0x180029158)
  • ResumeThread (Address: 0x1800291b8)
  • RtlCaptureContext (Address: 0x1800293d0)
  • RtlLookupFunctionEntry (Address: 0x1800293c8)
  • RtlPcToFileHeader (Address: 0x180029480)
  • RtlUnwindEx (Address: 0x180029458)
  • RtlVirtualUnwind (Address: 0x1800293c0)
  • SetFilePointer (Address: 0x180029380)
  • SetHandleCount (Address: 0x180029488)
  • SetHandleInformation (Address: 0x180029218)
  • SetLastError (Address: 0x180029278)
  • SetStdHandle (Address: 0x180029348)
  • SetThreadContext (Address: 0x1800291d8)
  • SetUnhandledExceptionFilter (Address: 0x1800293b0)
  • Sleep (Address: 0x1800292c8)
  • SuspendThread (Address: 0x1800291b0)
  • SystemTimeToFileTime (Address: 0x180029330)
  • TerminateProcess (Address: 0x1800293a0)
  • Thread32First (Address: 0x180029140)
  • Thread32Next (Address: 0x180029160)
  • TlsAlloc (Address: 0x1800292b8)
  • TlsFree (Address: 0x1800292c0)
  • TlsGetValue (Address: 0x180029208)
  • TlsSetValue (Address: 0x180029230)
  • UnhandledExceptionFilter (Address: 0x1800293a8)
  • UnmapViewOfFile (Address: 0x1800292e0)
  • VirtualAlloc (Address: 0x180029310)
  • VirtualAllocEx (Address: 0x1800291e8)
  • VirtualFree (Address: 0x180029308)
  • VirtualProtect (Address: 0x1800292f8)
  • VirtualQuery (Address: 0x180029300)
  • WaitForSingleObject (Address: 0x180029220)
  • WideCharToMultiByte (Address: 0x180029468)
  • WriteConsoleA (Address: 0x180029350)
  • WriteConsoleW (Address: 0x180029360)
  • WriteFile (Address: 0x180029138)
  • WriteProcessMemory (Address: 0x1800291f0)
MPR.dll
  • WNetGetUniversalNameW (Address: 0x1800294e0)
ole32.dll
  • CoCreateInstance (Address: 0x180029590)
  • CoCreateInstanceEx (Address: 0x180029598)
  • CoGetClassObject (Address: 0x180029580)
  • CoTaskMemFree (Address: 0x180029588)
SHELL32.dll
  • SHGetSpecialFolderPathW (Address: 0x1800294f0)
SHLWAPI.dll
  • (Address: 0x180029528)
  • PathCombineW (Address: 0x180029530)
  • PathFileExistsW (Address: 0x180029540)
  • PathFindExtensionW (Address: 0x180029500)
  • PathFindFileNameW (Address: 0x180029508)
  • PathIsDirectoryW (Address: 0x180029518)
  • PathRemoveExtensionW (Address: 0x180029538)
  • PathRemoveFileSpecW (Address: 0x180029510)
  • PathSearchAndQualifyW (Address: 0x180029520)
USER32.dll
  • LoadStringW (Address: 0x180029550)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x180029560)
  • GetFileVersionInfoW (Address: 0x180029570)
  • VerQueryValueW (Address: 0x180029568)